You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-identity-configure-file-level-permissions.md
+21-23Lines changed: 21 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,34 +78,17 @@ The root directory of a file share includes the following permissions:
78
78
79
79
For more information on these permissions, see the [command-line reference for icacls](/windows-server/administration/windows-commands/icacls).
80
80
81
-
## Configure Windows ACLs
82
-
83
-
The process for configuring Windows ACLs varies depending on whether you're authenticating hybrid or cloud-only identities:
84
-
85
-
- For cloud-only identities (preview), you must use the Azure portal or PowerShell. Windows File Explorer and icacls aren't currently supported for cloud-only identities.
86
-
87
-
- For hybrid identities, you can configure Windows ACLs by using icacls, or you can use Windows File Explorer. You can also use the [Set-ACL](/powershell/module/microsoft.powershell.security/set-acl) PowerShell command.
88
-
89
-
If you have directories or files in on-premises file servers with Windows ACLs configured against the AD DS identities, you can copy them over to Azure Files while preserving the ACLs by using traditional file copy tools like Robocopy or the latest version of [Azure AzCopy](https://github.com/Azure/azure-storage-azcopy/releases). If you tier directories and files to Azure Files through Azure File Sync, your ACLs are carried over and persisted in their native format.
90
-
91
-
> [!IMPORTANT]
92
-
> If you're using Microsoft Entra Kerberos to authenticate hybrid identities, the hybrid identities must be synced to Microsoft Entra ID for ACLs to be enforced.
93
-
>
94
-
> You can set file-level and directory-level ACLs for identities that aren't synced to Microsoft Entra ID. However, these ACLs aren't enforced because the Kerberos ticket used for authentication and authorization doesn't contain the not-synced identities. If you're using on-premises AD DS as your identity source, you can include not-synced identities in the ACLs. AD DS puts those security identifiers (SIDs) in the Kerberos ticket, and ACLs are enforced.
95
-
96
-
## Configure Windows ACLs with Windows File Explorer or icacls
97
-
98
-
### Mount the file share with admin-level access
81
+
## Mount the file share with admin-level access
99
82
100
-
Before you configure Windows ACLs with File Explorer or icacls, mount the file share with admin-level access. You can take two approaches:
83
+
Before you configure Windows ACLs with File Explorer or icacls, mount the file share with admin-level access. If you will be configuring ACLs with Azure portal or the RestSetAcls PowerShell module, skip this section. You have two options for mounting with admin-level access.
101
84
102
85
-**Use the Windows permission model for SMB admin (recommended)**: Assign the built-in RBAC role [Storage File Data SMB Admin](/azure/role-based-access-control/built-in-roles/storage#storage-file-data-smb-admin) to admin users who will configure ACLs. Then mount the file share by using [identity-based authentication](storage-files-active-directory-overview.md) and configure ACLs. If an existing ACL on a file or directory denies the admin access, the admin can use the Windows `takeown` command to take ownership of the file or directory and then modify the ACL. This approach is more secure because it doesn't require your storage account key to mount the file share.
103
86
104
87
-**Use the storage account key (less secure)**: Use your storage account key to mount the file share and then configure ACLs. Mounting with a storage account key gives you immediate full access without needing to take ownership of files or directories. The storage account key is a sensitive credential. For security reasons, use this option only if you can't use identity-based authentication.
105
88
106
89
If a user has the Full Control ACL and the [Storage File Data SMB Share Elevated Contributor](/azure/role-based-access-control/built-in-roles/storage#storage-file-data-smb-share-elevated-contributor) role (or a custom role with the required permissions), they can configure ACLs without using the Windows permission model for SMB admin or the storage account key.
107
90
108
-
####Use the Windows permission model for SMB admin
91
+
### Use the Windows permission model for SMB admin
109
92
110
93
Use the Windows permission model for SMB admin instead of the storage account key. This feature enables you to assign the built-in RBAC role [Storage File Data SMB Admin](/azure/role-based-access-control/built-in-roles/storage#storage-file-data-smb-admin) to admin users, so they can mount the share using identity-based authentication and configure ACLs.
111
94
@@ -136,7 +119,7 @@ To use the Windows permission model for SMB admin, follow these steps:
136
119
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName>
137
120
```
138
121
139
-
#### Mount the file share by using your storage account key (not recommended)
122
+
### Mount the file share by using your storage account key (not recommended)
140
123
141
124
> [!WARNING]
142
125
> If possible, use the [Windows permission model for SMB admin](#use-the-windows-permission-model-for-smb-admin) to mount the share instead of using the storage account key.
@@ -151,6 +134,21 @@ Use the `net use` command to mount the share at this stage and not PowerShell. I
151
134
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /user:localhost\<YourStorageAccountName> <YourStorageAccountKey>
152
135
```
153
136
137
+
## Configure Windows ACLs
138
+
139
+
The process for configuring Windows ACLs varies depending on whether you're authenticating hybrid or cloud-only identities:
140
+
141
+
- For cloud-only identities (preview), you must use the Azure portal or PowerShell. Windows File Explorer and icacls aren't currently supported for cloud-only identities.
142
+
143
+
- For hybrid identities, you can configure Windows ACLs by using icacls, or you can use Windows File Explorer. You can also use the [Set-ACL](/powershell/module/microsoft.powershell.security/set-acl) PowerShell command.
144
+
145
+
If you have directories or files in on-premises file servers with Windows ACLs configured against the AD DS identities, you can copy them over to Azure Files while preserving the ACLs by using traditional file copy tools like Robocopy or the latest version of [Azure AzCopy](https://github.com/Azure/azure-storage-azcopy/releases). If you tier directories and files to Azure Files through Azure File Sync, your ACLs are carried over and persisted in their native format.
146
+
147
+
> [!IMPORTANT]
148
+
> If you're using Microsoft Entra Kerberos to authenticate hybrid identities, the hybrid identities must be synced to Microsoft Entra ID for ACLs to be enforced.
149
+
>
150
+
> You can set file-level and directory-level ACLs for identities that aren't synced to Microsoft Entra ID. However, these ACLs aren't enforced because the Kerberos ticket used for authentication and authorization doesn't contain the not-synced identities. If you're using on-premises AD DS as your identity source, you can include not-synced identities in the ACLs. AD DS puts those security identifiers (SIDs) in the Kerberos ticket, and ACLs are enforced.
151
+
154
152
### Configure Windows ACLs by using icacls
155
153
156
154
> [!IMPORTANT]
@@ -191,7 +189,7 @@ To configure ACLs by using Windows File Explorer, follow these steps:
191
189
192
190
1. Select **Apply**.
193
191
194
-
## Configure Windows ACLs by using the Azure portal
192
+
### Configure Windows ACLs by using the Azure portal
195
193
196
194
If you configure Entra Kerberos as your identity source, you can configure Windows ACLs for each Entra user or group by using the Azure portal. This method works for both hybrid and cloud-only identities only when Entra Kerberos is used as the identity source.
197
195
@@ -217,7 +215,7 @@ If you configure Entra Kerberos as your identity source, you can configure Windo
217
215
218
216
1. Select **Save** to set the ACL.
219
217
220
-
## Configure Windows ACLs for cloud-only identities by using PowerShell
218
+
### Configure Windows ACLs for cloud-only identities by using PowerShell
221
219
222
220
If you need to assign ACLs in bulk to cloud-only users, use the [RestSetAcls PowerShell module](https://www.powershellgallery.com/packages/RestSetAcls/) to automate the process by using the Azure Files REST API. This module does not require network connectivity to Active Directory.
0 commit comments