Configure NTFS Permissions (Windows ACLs) on Azure File Share Folders - NETSEC

Latest

Learning, Sharing, Creating

Cybersecurity Memo

Saturday, December 17, 2022

Configure NTFS Permissions (Windows ACLs) on Azure File Share Folders

We can configure Windows access control lists (ACLs), also known as NTFS permissions, at the root, directory, or file level on directory and file level over mounted file share(s). While share-level permissions act as a high-level gatekeeper that determines whether a user can access the share, Windows ACLs operate at a more granular level to control what operations the user can do at the directory or file level.



Both share-level and file/directory-level permissions are enforced when a user attempts to access a file/directory, so if there's a difference between either of them, only the most restrictive one will be applied. For example, if a user has read/write access at the file level, but only read at a share level, then they can only read that file. The same would be true if it was reversed: if a user had read/write access at the share-level, but only read at the file-level, they can still only read the file.

There are multiple ways we can apply NTFS permission during your data migration by using other tools such as azcopy or robocopy. Here are some related posts from this blog:
In this post, I am going to show you another way, Mount the file share using storage account key.

Azure Share-Level Permission Mapping to NTFS Permission 

Share-level permission = RBAC permissions.= IAM Access Control

The following table contains the Azure RBAC permissions related to this configuration. If you're using Azure Storage Explorer, you'll also need the Reader and Data Access role in order to read/access the file share.

Table for NTFS Permission (RBAC) + SMB Roles:

Share-level permission (built-in role)NTFS permissionResulting access
Storage File Data SMB Share ReaderFull control, Modify, Read, Write, ExecuteRead & execute
ReadRead
Storage File Data SMB Share ContributorFull controlModify, Read, Write, Execute
ModifyModify
Read & executeRead & execute
ReadRead
WriteWrite
Storage File Data SMB Share Elevated ContributorFull controlModify, Read, Write, Edit (Change permissions), Execute
ModifyModify
Read & executeRead & execute
ReadRead
WriteWrite

Permission Mtrix for RBAC with SMB Roles (Reader, Contributor, Elevated Contributor):



Supported Windows ACLS (NTFS)

Azure Files supports the full set of basic and advanced Windows ACLs.
UsersDefinition
BUILTIN\AdministratorsBuilt-in security group representing administrators of the file server. This group is empty, and no one can be added to it.
BUILTIN\UsersBuilt-in security group representing users of the file server. It includes NT AUTHORITY\Authenticated Users by default. For a traditional file server, you can configure the membership definition per server. For Azure Files, there isn't a hosting server, hence BUILTIN\Users includes the same set of users as NT AUTHORITY\Authenticated Users.
NT AUTHORITY\SYSTEMThe service account of the operating system of the file server. Such service account doesn't apply in Azure Files context. It is included in the root directory to be consistent with Windows Files Server experience for hybrid scenarios.
NT AUTHORITY\Authenticated UsersAll users in AD that can get a valid Kerberos token.
CREATOR OWNEREach object either directory or file has an owner for that object. If there are ACLs assigned to CREATOR OWNER on that object, then the user that is the owner of this object has the permissions to the object defined by the ACL.

The following permissions are included on the root directory of a file share:

  • BUILTIN\Administrators:(OI)(CI)(F)
  • BUILTIN\Users:(RX)
  • BUILTIN\Users:(OI)(CI)(IO)(GR,GE)
  • NT AUTHORITY\Authenticated Users:(OI)(CI)(M)
  • NT AUTHORITY\SYSTEM:(OI)(CI)(F)
  • NT AUTHORITY\SYSTEM:(F)
  • CREATOR OWNER:(OI)(CI)(IO)(F)


Mount the file share using storage account key


Before you configure Windows ACLs, you must first mount the file share by using your storage account key. To do this, log into a domain-joined device, open a Windows command prompt, and run the following command. Remember to replace <YourStorageAccountName>, <FileShareName>, and <YourStorageAccountKey> with your own values. If Z: is already in use, replace it with an available drive letter. You can find your storage account key in the Azure portal by navigating to the storage account and selecting Security + networking > Access keys, or you can use the Get-AzStorageAccountKey PowerShell cmdlet.

It's important that you use the net use Windows command to mount the share at this stage and not PowerShell. If you use PowerShell to mount the share, then the share won't be visible to Windows File Explorer or cmd.exe, and you'll have difficulty configuring Windows ACLs.


net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /user:localhost\<YourStorageAccountName> <YourStorageAccountKey>


To get your access key, you will find the Access keys menu from left panel of your storage account page:



net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /user:localhost\<YourStorageAccountName> <YourStorageAccountKey>

Example::

net use R: \\fileshare4test.file.core.windows.net\fstest /user:localhost\fileshare4test h1GUuy3YasaG1LLNjQLQ8wD9PpYtyeVY1MY6s4s11BJLJQTzyUaX69LzYsDVyYOKm3cXgrsvYOpX+AStkQD+zW==

Other Command:
  • net use 

Robocopy Command with permission to copy

Robocopy "F:\testshare" "R:\test" /COPY:DAT /SEC /MIR /R:10 /W:5 /V /ETA



azcopy Command with permission to copy

./azcopy.exe copy "F:\testshare\" "https://fileshare4test.file.core.windows.net/fstest/testfolder/?sv=2021-06-08&ss=bfqt&srt=sco&sp=rwdlacupiytfx&se=2022-09-13T05:11:14Z&st=2022-09-12T21:11:14Z&spr=https&sig=85MdmVM%2FGwPmAQSay0sDC1mCboxZZP62UdFnYmW1HHR%3D" --preserve-smb-info=true --preserve-smb-permissions=true --disable-auto-decoding=false --recursive --log-level=INFO

Assign proper NTFS permission to mounted file shares drive which you did that using storage account name and access key


Monunt File Shares Using Storage Account and Key First to Assign NTFS ACL

For file shares created in Azure storage account, the users who will control NTFS ACL permission will need to have a role "Storage File Data SMB Share Elevated Contributor" which can give / delete / modify user's NTFS permission.


After you have completed above steps:
1. mounted Azure File Shares using storage account and key, and assigned a user to have full control NTFS permission. 
2. For that user you give full control NTFS ACL permission, you have assigned that user a "Storage File Data SMB Share Elevated Contributor" role

you should be able to sync all NTFS ACL from on-prem files to Azure File shares using the tools like Robocopy or Azcopy. 

The key is to give a user full control first using storage account name and key to mount file shares. 


Multiple Role Assignments - Higher-Level Permissions WIN

What happens if you use both configurations

You could also assign permissions to all authenticated Azure AD users and specific Azure AD users/groups. With this configuration, a specific user or group will have whichever is the higher-level permission from the default share-level permission and RBAC assignment. In other words, say you granted a user the Storage File Data SMB Reader role on the target file share. You also granted the default share-level permission Storage File Data SMB Share Elevated Contributor to all authenticated users. With this configuration, that particular user will have Storage File Data SMB Share Elevated Contributor level of access to the file share. Higher-level permissions always take precedence.

No comments:

Post a Comment