Use your Microsoft Entra account

To access file data from the Azure portal using your Microsoft Entra account, both of the following statements must be true:

  • You're assigned either a built-in or custom role that provides access to file data.
  • You're assigned the Azure Resource Manager Reader role, at a minimum, scoped to the level of the storage account or higher. The Reader role grants the most restricted permissions, but another Azure Resource Manager role that grants access to storage account management resources is also acceptable.

The Azure Resource Manager Reader role permits users to view storage account resources, but not modify them. It doesn't provide read permissions to data in Azure Storage, but only to account management resources. The Reader role is necessary so that users can navigate to file shares in the Azure portal.

There are two new built-in roles that have the required permissions to access file data with OAuth:

  • Storage File Data Privileged Reader
  • Storage File Data Privileged Contributor

The Storage File Data Privileged Contributor role has permissions to read, write, delete, and modify ACLs/NTFS permissions on files/directories in Azure file shares. Modifying ACLs/NTFS permissions isn't supported via the Azure portal.

Custom roles can support different combinations of the same permissions provided by the built-in roles. 



Comments

Popular posts from this blog

Azure built-in roles for tables

Explore Dataflows Gen2 in Microsoft Fabric

Select and configure an appropriate method for access to Azure Blobs