Skip to content

Commit 88a6773

Browse files
authored
Update storage-files-identity-ad-ds-configure-permissions.md
1 parent 3abdde5 commit 88a6773

1 file changed

Lines changed: 2 additions & 0 deletions

File tree

articles/storage/files/storage-files-identity-ad-ds-configure-permissions.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,8 @@ You can configure the Windows ACLs using either [icacls](#configure-windows-acls
107107
108108
If you have directories or files in on-premises file servers with Windows ACLs configured against the AD DS identities, you can copy them over to Azure Files persisting the ACLs with traditional file copy tools like Robocopy or [Azure AzCopy v 10.4+](https://github.com/Azure/azure-storage-azcopy/releases). If your directories and files are tiered to Azure Files through Azure File Sync, your ACLs are carried over and persisted in their native format.
109109

110+
Remember to sync your identities in order for the set permissions to take effect. You can set ACLs for not-synced identities, but these ACLs will not be enforced as the not-synced identities will not be present in the Kerberos ticket used for authentication/authorization
111+
110112
### Configure Windows ACLs with icacls
111113

112114
To grant full permissions to all directories and files under the file share, including the root directory, run the following Windows command from a machine that has line-of-sight to the AD domain controller. Remember to replace the placeholder values in the example with your own values.

0 commit comments

Comments
 (0)