You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/authorize-data-operations-portal.md
+26-15Lines changed: 26 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Authorize Access to Azure File Share Data in the Azure portal
2
+
title: Authorize Access to Azure File Share Data in the Azure Portal
3
3
description: When you access file data using the Azure portal, the portal makes requests to Azure Files behind the scenes. These requests can be authenticated and authorized using either your Microsoft Entra account or the storage account access key.
4
4
author: khdownie
5
5
ms.service: azure-file-storage
@@ -9,19 +9,20 @@ ms.author: kendownie
9
9
# Customer intent: "As a cloud administrator, I want to configure authorization access for Azure file share data so that I can securely manage user permissions and control data access through the Azure portal."
10
10
---
11
11
12
-
# Choose how to authorize access to file data in the Azure portal
12
+
# Authorize access to file data in the Azure portal
13
13
14
14
**Applies to:**:heavy_check_mark: SMB file shares
15
15
16
-
When you access file data by using the [Azure portal](https://portal.azure.com?azure-portal=true), the portal makes requests to the Azure Files service behind the scenes. You can authorize these requests by using either your Microsoft Entra account (preferred) or the storage account access key (less secure). The portal shows which method you're using and enables you to switch between the two methods if you have the appropriate permissions. By default, the portal uses whichever method you're already using to authorize all file shares, but you can change this setting for individual file share operations.
16
+
When you access file data by using the [Azure portal](https://portal.azure.com?azure-portal=true), the portal makes requests to the Azure Files service behind the scenes. You can authorize these requests by using either your Microsoft Entra account (preferred) or the storage account access key (less secure).
17
17
18
-
> [!IMPORTANT]
19
-
> This article explains how to authorize access to file data in the Azure portal. It doesn't cover how to set up identity-based authentication to file shares for end users. To learn about identity-based authentication, see [Overview of Azure Files identity-based authentication](storage-files-active-directory-overview.md).
18
+
The portal shows which method you're using and enables you to switch between the two methods if you have the appropriate permissions. By default, the portal uses whichever method you're already using to authorize all file shares, but you can change this setting for individual file share operations.
19
+
20
+
This article explains how to authorize access to file data in the Azure portal. It doesn't cover how to set up identity-based authentication to file shares for end users. To learn about identity-based authentication, see [Overview of Azure Files identity-based authentication](storage-files-active-directory-overview.md).
20
21
21
22
> [!WARNING]
22
23
> Accessing a file share by using storage account keys has inherent security risks. Always authenticate by using Microsoft Entra when possible. For information on how to protect and manage your keys, see [Manage storage account access keys](../common/storage-account-keys-manage.md).
23
24
24
-
## Permissions needed to access file data
25
+
## Get permissions to access file data
25
26
26
27
Depending on how you want to authorize access to file data in the Azure portal, you need specific permissions. In most cases, you get these permissions through [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md).
27
28
@@ -37,6 +38,7 @@ To access file data from the Azure portal by using your Entra account, both of t
37
38
The Azure Resource Manager **Reader** role permits users to view storage account resources, but not modify them. It doesn't provide read permissions to data in Azure Storage, but only to account management resources. The **Reader** role is necessary so that users can navigate to file shares in the Azure portal.
38
39
39
40
Two built-in roles have the required permissions to access file data by using OAuth:
41
+
40
42
-[Storage File Data Privileged Reader](../../role-based-access-control/built-in-roles.md#storage-file-data-privileged-reader)
41
43
-[Storage File Data Privileged Contributor](../../role-based-access-control/built-in-roles.md#storage-file-data-privileged-contributor)
42
44
@@ -61,20 +63,25 @@ When you attempt to access file data in the Azure portal, the portal first check
61
63
> [!IMPORTANT]
62
64
> When you lock a storage account by using a Resource Manager **ReadOnly** lock, you can't perform the [List Keys](/rest/api/storagerp/storageaccounts/listkeys) operation for that storage account. **List Keys** is a POST operation, and all POST operations are prevented when a **ReadOnly** lock is configured for the account. For this reason, when you lock the account by using a **ReadOnly** lock, you must use Entra credentials to access file data in the portal. For information about accessing file data in the Azure portal by using Microsoft Entra ID, see [Use your Microsoft Entra account](#use-your-azure-ad-account).
63
65
64
-
> [!NOTE]
65
-
> The classic subscription administrator roles **Service Administrator** and **Co-Administrator** include the equivalent of the Azure Resource Manager [Owner](../../role-based-access-control/built-in-roles.md#owner) role. The **Owner** role includes all actions, including the **Microsoft.Storage/storageAccounts/listkeys/action** action, so a user with one of these administrative roles can also access file data by using the storage account key. For more information, see [Azure roles, Microsoft Entra roles, and classic subscription administrator roles](../../role-based-access-control/rbac-and-directory-admin-roles.md#classic-subscription-administrator-roles).
66
+
The classic subscription administrator roles **Service Administrator** and **Co-Administrator** include the equivalent of the Azure Resource Manager [Owner](../../role-based-access-control/built-in-roles.md#owner) role. The **Owner** role includes all actions, including the **Microsoft.Storage/storageAccounts/listkeys/action** action, so a user with one of these administrative roles can also access file data by using the storage account key. For more information, see [Azure roles, Microsoft Entra roles, and classic subscription administrator roles](../../role-based-access-control/rbac-and-directory-admin-roles.md#classic-subscription-administrator-roles).
66
67
67
68
## Specify how to authorize operations on a specific file share
68
69
69
70
You can change the authentication method for individual file shares. By default, the portal uses the current authentication method. To determine the current authentication method, follow these steps.
70
71
71
-
1. Go to your storage account in the Azure portal.
72
-
1. In the service menu, under **Data storage**, select **File shares**.
72
+
1. In the Azure portal, go to your storage account.
73
+
74
+
1. On the service menu, under **Data storage**, select **File shares**.
75
+
73
76
1. Select a file share.
77
+
74
78
1. Select **Browse**.
75
-
1. The **Authentication method** shows whether you're currently using the storage account access key or your Entra account to authenticate and authorize file share operations. If you're currently authenticating by using the storage account access key, you see **Access Key** specified as the authentication method, as in the following image. If you're authenticating by using your Entra account, you see **Microsoft Entra user account** specified instead.
76
79
77
-
:::image type="content" source="media/authorize-data-operations-portal/auth-method-access-key.png" alt-text="Screenshot showing the authentication method set to access key.":::
80
+
1. The **Authentication method** shows whether you're currently using the storage account access key or your Entra account to authenticate and authorize file share operations.
81
+
82
+
If you're currently authenticating by using the storage account access key, **Access Key** is specified as the authentication method, as shown in the following image. If you're authenticating by using your Entra account, **Microsoft Entra user account** is specified instead.
83
+
84
+
:::image type="content" source="media/authorize-data-operations-portal/auth-method-access-key.png" alt-text="Screenshot that shows the authentication method set to access key.":::
@@ -83,6 +90,7 @@ You can change the authentication method for individual file shares. By default,
83
90
To switch to using your Entra account, select the link highlighted in the image that says **Switch to Microsoft Entra user account**. If you have the appropriate permissions through the Azure roles that are assigned to you, you can proceed. However, if you lack the necessary permissions, you see an error message that you don't have permissions to list the data by using your user account with Entra ID.
84
91
85
92
Two additional RBAC permissions are required to use your Entra account:
@@ -102,20 +110,23 @@ When you create a new storage account, you can specify that the Azure portal def
102
110
103
111
To specify that the portal uses Entra authorization by default for data access when you create a storage account, follow these steps:
104
112
105
-
1. Create a new storage account, following the instructions in [Create a storage account](../common/storage-account-create.md).
113
+
1. Create a new storage account by following the instructions in [Create an Azure storage account](../common/storage-account-create.md).
114
+
106
115
1. On the **Advanced** tab, in the **Security** section, check the box next to **Default to Microsoft Entra authorization in the Azure portal**.
107
116
108
-
:::image type="content" source="media/authorize-data-operations-portal/default-auth-account-create-portal.png" alt-text="Screenshot showing how to configure default Microsoft Entra authorization in Azure portal for new account.":::
117
+
:::image type="content" source="media/authorize-data-operations-portal/default-auth-account-create-portal.png" alt-text="Screenshot that shows how to configure default Microsoft Entra authorization in Azure portal for new account.":::
109
118
110
119
1. Select **Review + create** to run validation and create the storage account.
111
120
112
121
To update this setting for an existing storage account, follow these steps:
113
122
114
123
1. Go to the storage account overview in the Azure portal.
124
+
115
125
1. Under **Settings**, select **Configuration**.
126
+
116
127
1. Set **Default to Microsoft Entra authorization in the Azure portal** to **Enabled**.
117
128
118
-
## See also
129
+
## Related content
119
130
120
131
-[Access Azure file shares using Microsoft Entra ID with Azure Files OAuth over REST](authorize-oauth-rest.md)
121
132
-[Authorize access to data in Azure Storage](../common/authorize-data-access.md)
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-authorization-overview.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,19 +15,19 @@ ms.author: kendownie
15
15
16
16
Regardless of which identity source you choose for [identity-based authentication](storage-files-active-directory-overview.md) on your storage account, you need to configure authorization and access control. Azure Files enforces authorization on user access at both the share level and the directory/file level.
17
17
18
-
You can assign share-level permissions to Microsoft Entra users or groups that are managed through [Azure RBAC](/azure/role-based-access-control/overview). With Azure RBAC, the credentials you use for file access should be available or synced to Microsoft Entra ID. You can assign Azure built-in roles like **Storage File Data SMB Share Reader** to users or groups in Microsoft Entra ID to grant access to a file share.
18
+
You can assign share-level permissions to Microsoft Entra users or groups that are managed through [Azure RBAC](/azure/role-based-access-control/overview). With Azure RBAC, the credentials that you use for file access should be available or synced to Microsoft Entra ID. You can assign Azure built-in roles like **Storage File Data SMB Share Reader** to users or groups in Microsoft Entra ID to grant access to a file share.
19
19
20
-
At the directory and file level, Azure Files supports preserving, inheriting, and enforcing [Windows ACLs](/windows/win32/secauthz/access-control-lists). You can choose to keep Windows ACLs when copying data over SMB between your existing file share and your Azure file shares. Whether you plan to enforce authorization or not, you can use Azure Files to back up ACLs along with your data.
20
+
At the directory and file levels, Azure Files supports preserving, inheriting, and enforcing [Windows ACLs](/windows/win32/secauthz/access-control-lists). You can choose to keep Windows ACLs when you copy data over SMB between your existing file share and your Azure file shares. Whether you plan to enforce authorization or not, you can use Azure Files to back up ACLs along with your data.
21
21
22
22
## Configure share-level permissions
23
23
24
-
After you enable an identity source on your storage account, you must do one of the following to access the file share:
24
+
After you enable an identity source on your storage account, you must do one of the following tasks to access the file share:
25
25
26
26
- Set a [default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities) that applies to all authenticated users and groups.
27
27
- Assign built-in Azure RBAC roles to users and groups.
28
28
- Configure custom roles for Entra identities and assign access rights to file shares in your storage account.
29
29
30
-
The assigned share-level permission grants the identity access to the share only, nothing else, not even the root directory. You still need to separately configure directory and file-level permissions.
30
+
The assigned share-level permission grants the identity access to the share only and nothing else, not even the root directory. You still need to separately configure directory and file-level permissions.
31
31
32
32
For more information, see [Assign share-level permissions](storage-files-identity-assign-share-level-permissions.md).
33
33
@@ -36,17 +36,15 @@ For more information, see [Assign share-level permissions](storage-files-identit
36
36
37
37
## Configure directory and file-level permissions
38
38
39
-
Azure Files enforces standard Windows ACLs at both the directory and file level, including the root directory. You can configure directory or file-level permissions over both SMB and REST.
39
+
Azure Files enforces standard Windows ACLs at both the directory and file levels, including the root directory. You can configure directory or file-level permissions over both SMB and REST.
40
40
41
41
For more information, see [Configure directory and file-level permissions](storage-files-identity-configure-file-level-permissions.md).
42
42
43
43
### Preserve directory and file ACLs when importing data to Azure Files
44
44
45
-
Azure Files supports preserving directory or file-level ACLs when copying data to Azure file shares. You can copy ACLs on a directory or file to Azure file shares by using either Azure File Sync or common filemovement toolsets. For example, you can use [robocopy](/windows-server/administration/windows-commands/robocopy) with the `/copy:s` flag to copy data as well as ACLs to an Azure file share. ACLs are preserved by default, so you don't need to enable identity-based authentication on your storage account to preserve ACLs.
45
+
Azure Files supports preserving directory or file-level ACLs when you copy data to Azure file shares. You can copy ACLs on a directory or file to Azure file shares by using either Azure File Sync or common file-movement toolsets. For example, you can use [robocopy](/windows-server/administration/windows-commands/robocopy) with the `/copy:s` flag to copy data and ACLs to an Azure file share. ACLs are preserved by default, so you don't need to enable identity-based authentication on your storage account to preserve ACLs.
46
46
47
-
## Next step
48
-
49
-
For more information, see:
47
+
## Related content
50
48
51
49
-[Assign share-level permissions for Azure file shares](storage-files-identity-assign-share-level-permissions.md)
52
50
-[Configure directory and file-level permissions for Azure file shares](storage-files-identity-configure-file-level-permissions.md)
0 commit comments