Illustrated Example of Applying ACLs Recursively with Storage Explorer

This post has been republished via RSS; it originally appeared at: New blog articles in Microsoft Community Hub.

Scenario:
The Propagate Access Control Lists option is now available in Storage Explorer 1.28.1 or later versions. It is a convenient feature to apply ACL entries recursively on the existing child items of a parent directory without having to make these changes individually for each child item.

 

Objective:
To demonstrate how ACLs propagation works with the help of the Propagate Access Control Lists option in Storage Explorer 1.28.1+.

Pre-requisites:

For this example, you would need:

  1. An Azure Data Lake Storage.
  2. Storage Explorer 1.28.1 or later versions.

Storage File Structure:

 

charleswang_0-1682186614496.png

 

How to Propagate ACLs:

To apply ACL entries recursively, open Storage Explorer, right-click the container or a parent directory, and then select Propagate Access Control Lists.

 

charleswang_0-1682189107160.png

 

Example:

 

propagete-acl-test (root) 

a01 

a02 

b01 

b02 

c01 

c02 

---

default permission 

default permission

default permission 

default permission

default permission

default permission

default permission 

Add read access for Others for root 

Read access enabled for Others 

<same-as-
before> 

<same-as-
before> 

<same-as-
before> 

<same-as-
before> 

<same-as-
before> 

<same-as-
before> 

Propagate root 

<same-as-
before> 

Read access enabled for Others 

Read access enabled for Others

Read access enabled for Others 

Read access enabled for Others

Read access enabled for Others 

Read access enabled for Others 

Add execute access for Others for a01 

<same-as-
before> 

Execute access enabled for Others 

<same-as-
before> 

<same-as-
before> 

<same-as-
before> 

<same-as-
before> 

<same-as-
before> 

Propagate a01

<same-as-
before>

<same-as-
before>

<same-as-
before> 

Execute access enabled for Others 

Execute access enabled for Others 

<same-as-
before> 

<same-as-
before> 

Add Charles and give him read/execute access for root 

Read access enabled for Others, Charles has read/execute access 

<same-as-
before> 

<same-as-
before> 

<same-as-
before> 

<same-as-
before> 

<same-as-
before> 

<same-as-
before> 

Propagate root 

<same-as-
before> 

Read access enabled for Others, Charles has read/execute access 

Read access enabled for Others, Charles has read/execute access 

Read access enabled for Others, Charles has read/execute access 

Read access enabled for Others, Charles has read/execute access 

Read access enabled for Others, Charles has read/execute access 

Read access enabled for Others, Charles has read/execute access 

 

Conclusion:

This example shows how to propagate ACLs with Storage Explorer 1.28.1. The propagate-acl-test is a container with two levels of directories. I made various modifications (highlighted in BLUEto the ACLs and clicked the Propagate Access Control Lists button from the Storage Explorer for testing ACLs propagation. The results are summarized in the previous table. You can tell that the "Propagate ACL" option overwrites existing ACLs down the directory tree (highlighted in RED) with the parent ACL settings (highlighted in GREEN).

 

References:

 

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.