Can't apply ACL to folder in mounted Azure file share

C3 Fuels Azure Admin 0 Reputation points
2025-03-07T00:07:56.7333333+00:00

I've created a security group via my Azure portal, but when I mount my Azure Files share and right click and select Properties\Security\Edit permissions\Add on a folder in that share I cannot add that security group. The Enter Network Credentials dialog keeps appearing and no account seems to work to get past that.

Azure Files
Azure Files
An Azure service that offers file shares in the cloud.
1,381 questions
{count} votes

1 answer

Sort by: Most helpful
  1. Venkatesan S 430 Reputation points Microsoft External Staff
    2025-03-12T09:53:50.6833333+00:00

    Hi @C3 Fuels Azure Admin

    To apply ACLs to a folder in a mounted Azure file share, you need to ensure that you are using the correct credentials and that the necessary permissions are assigned. Since you mentioned that your Entra ID has the role of Storage File Data SMB Share Elevated Contributor, this role should allow you to assign permissions on new files or directories created under that share and ensure assigned at share level permission.

    • If Entra ID Kerberos authentication is not set up, Windows might prompt for credentials. Ensure that Azure AD DS (Domain Services) or Hybrid AD Join is enabled for your environment.

    If you intend to use a specific Microsoft Entra user or group to access Azure file share resources, that identity must be a hybrid identity that exists in both on-premises AD DS and Microsoft Entra ID. For example, say you have a user in your AD that is ******@onprem.contoso.com and you have synced to Microsoft Entra ID as ******@contoso.com using Microsoft Entra Connect Sync or Microsoft Entra Connect cloud sync. For this user to access Azure Files, you must assign the share-level permissions to ******@contoso.com. The same concept applies to groups and service principals.

    Configure ACLs with icacls:

    If your AD source is Microsoft Entra Domain Services, then <user-upn> will be <user-email>.

    icacls <mapped-drive-letter>: /grant <user-upn>:(f)
    

    Reference:

    Check all the reference links I shared above; they will be useful, and you can resolve the issue by applying ACLs to your Azure file share.

    Hope the above answer helps! Please let us know do you have any further queries.

    Please do consider to “up-vote” wherever the information provided helps you, this can be beneficial to other community members.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.