Azure Files Identity based authentication -Active Directory Domain Services (AAD DS)
Prerequisites
Select or
create an Azure AD tenant.
Enable Azure AD Domain Services on the Azure AD tenant.
Domain-join
an Azure VM with Azure AD DS.
Select or
create an Azure file share.
Verify
Azure Files connectivity by mounting Azure file shares using your storage
account key.
Part one: enable AD DS authentication on your storage account
Part two: assign access permissions for a share to
the Azure AD identity (a user, group, or service principal) that is in sync
with the target AD identity
·
Storage File Data SMB Share Reader allows read access in Azure Storage file
shares over SMB.
·
Storage File Data SMB Share Contributor allows read, write, and delete access in
Azure Storage file shares over SMB.
·
Storage File Data SMB Share Elevated Contributor allows read, write, delete and modify NTFS permissions in Azure Storage file
shares over SMB.
Part three: configure Windows ACLs over SMB for directories and files
Administrator with full access to the share can mount the share into a domain joined computer and set necessary NTFS permissions using the following.
Configure Windows ACLs with Windows File Explorer or icals
Ex: icacls <mounted-drive-letter>: /grant <user-email>:(f)
The following permissions are included on the root directory of a file share:
· BUILTIN\Administrators:(OI)(CI)(F)
· BUILTIN\Users:(RX)
· BUILTIN\Users:(OI)(CI)(IO)(GR,GE)
· NT AUTHORITY\Authenticated Users:(OI)(CI)(M)
· NT AUTHORITY\SYSTEM:(OI)(CI)(F)
· NT AUTHORITY\SYSTEM:(F)
· CREATOR OWNER:(OI)(CI)(IO)(F)
Note: Port 445 should be allowed in nsg/firewall rules
Similarly if you want to give read access to a group/users into Azure File Share assign them with the below role
- Storage File Data SMB Share Reader allows read access in Azure Storage file shares over SMB.
No comments:
Post a Comment