Skip to content

Commit 00db3db

Browse files
Merge pull request #207611 from rolyon/rolyon-rbac-check-access-update
[Azure RBAC] Check access update
2 parents ceb4364 + fe44e9c commit 00db3db

File tree

7 files changed

+34
-32
lines changed

7 files changed

+34
-32
lines changed

articles/role-based-access-control/check-access.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: role-based-access-control
88
ms.topic: quickstart
99
ms.workload: identity
10-
ms.date: 12/09/2020
10+
ms.date: 08/26/2022
1111
ms.author: rolyon
1212
ms.custom: contperf-fy21q2, mode-other
1313
#Customer intent: As a new user, I want to quickly see access for myself, user, group, or application, to make sure they have the appropriate permissions.
@@ -21,19 +21,19 @@ Sometimes you need to check what access a user has to a set of Azure resources.
2121

2222
To check the access for a user, you first need to open the Azure resources you want to check access for. Azure resources are organized into levels that are typically called the *scope*. In Azure, you can specify a scope at four levels from broad to narrow: management group, subscription, resource group, and resource.
2323

24-
![Scope levels for Azure RBAC](../../includes/role-based-access-control/media/scope-levels.png)
24+
![Diagram that shows scope levels for Azure RBAC.](../../includes/role-based-access-control/media/scope-levels.png)
2525

2626
Follow these steps to open the set of Azure resources that you want to check access for.
2727

2828
1. Open the [Azure portal](https://portal.azure.com).
2929

30-
1. Open the set of Azure resources, such as **Management groups**, **Subscriptions**, **Resource groups**, or a particular resource.
30+
1. Open the set of Azure resources you want to check access for, such as **Management groups**, **Subscriptions**, **Resource groups**, or a particular resource.
3131

3232
1. Click the specific resource in that scope.
3333

3434
The following shows an example resource group.
3535

36-
![Resource group overview](./media/shared/rg-overview.png)
36+
![Screenshot of resource group overview.](./media/shared/rg-overview.png)
3737

3838
## Step 2: Check access for a user
3939

@@ -43,23 +43,25 @@ Follow these steps to check the access for a single user, group, service princip
4343

4444
The following shows an example of the Access control (IAM) page for a resource group.
4545

46-
![Resource group access control - Check access tab](./media/shared/rg-access-control.png)
46+
![Screenshot of resource group access control and Check access tab.](./media/shared/rg-access-control.png)
4747

48-
1. On the **Check access** tab, in the **Find** list, select the user, group, service principal, or managed identity you want to check access for.
48+
1. On the **Check access** tab, click the **Check access** button.
49+
50+
1. In the **Check access** pane, click **User, group, or service principal**.
4951

5052
1. In the search box, enter a string to search the directory for display names, email addresses, or object identifiers.
5153

52-
![Check access select list](./media/shared/rg-check-access-select.png)
54+
![Screenshot of Check access select list.](./media/shared/rg-check-access-select.png)
5355

54-
1. Click the security principal to open the **assignments** pane.
56+
1. Click the user to open the **assignments** pane.
5557

56-
On this pane, you can see the access for the selected security principal at this scope and inherited to this scope. Assignments at child scopes are not listed. You see the following assignments:
58+
On this pane, you can see the access for the selected user at this scope and inherited to this scope. Assignments at child scopes are not listed. You see the following assignments:
5759

5860
- Role assignments added with Azure RBAC.
5961
- Deny assignments added using Azure Blueprints or Azure managed apps.
6062
- Classic Service Administrator or Co-Administrator assignments for classic deployments.
6163

62-
![Role and deny assignments pane for a user](./media/shared/rg-check-access-assignments-user.png)
64+
![Screenshot of role and deny assignments pane for a user.](./media/shared/rg-check-access-assignments-user.png)
6365

6466
## Step 3: Check your access
6567

@@ -71,7 +73,7 @@ Follow these steps to check your access to the previously selected Azure resourc
7173

7274
An assignments pane appears that lists your access at this scope and inherited to this scope. Assignments at child scopes are not listed.
7375

74-
![Role and deny assignments pane](./media/check-access/rg-check-access-assignments.png)
76+
![Screenshot of role and deny assignments pane.](./media/check-access/rg-check-access-assignments.png)
7577

7678
## Next steps
7779

-15.6 KB
Loading
11 KB
Loading

articles/role-based-access-control/role-assignments-external-users.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.devlang:
1010
ms.topic: how-to
1111
ms.tgt_pltfrm:
1212
ms.workload: identity
13-
ms.date: 10/15/2021
13+
ms.date: 08/26/2022
1414
ms.author: rolyon
1515
ms.custom: it-pro,subject-rbac-steps
1616

@@ -225,7 +225,7 @@ If a guest user has been granted access to a directory, but they do not see the
225225

226226
If a guest user has been granted access to a directory, but they do not see the resources they have been granted access to in the Azure portal, make sure the guest user has selected the correct directory. A guest user might have access to multiple directories. To switch directories, in the upper left, click **Settings** > **Directories**, and then click the appropriate directory.
227227

228-
![Screenshot of Poral setting Directories section in Azure portal.](./media/role-assignments-external-users/directory-switch.png)
228+
![Screenshot of Portal setting Directories section in Azure portal.](./media/role-assignments-external-users/directory-switch.png)
229229

230230
## Next steps
231231

articles/role-based-access-control/role-assignments-list-portal.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: role-based-access-control
88
ms.topic: how-to
99
ms.workload: identity
10-
ms.date: 11/12/2021
10+
ms.date: 08/26/2022
1111
ms.author: rolyon
1212
---
1313

@@ -32,7 +32,7 @@ A quick way to see the roles assigned to a user or group in a subscription is to
3232

3333
You see a list of roles assigned to the selected user or group at various scopes such as management group, subscription, resource group, or resource. This list includes all role assignments you have permission to read.
3434

35-
![Role assignments for a user](./media/role-assignments-list-portal/azure-role-assignments-user.png)
35+
![Screenshot of role assignments for a user.](./media/role-assignments-list-portal/azure-role-assignments-user.png)
3636

3737
1. To change the subscription, click the **Subscriptions** list.
3838

@@ -50,7 +50,7 @@ Users that have been assigned the [Owner](built-in-roles.md#owner) role for a su
5050

5151
1. Scroll to the **Owners** section to see all the users that have been assigned the Owner role for this subscription.
5252

53-
![Subscription Access control - Role assignments tab](./media/role-assignments-list-portal/sub-access-control-role-assignments-owners.png)
53+
![Screenshot of subscription Access control and Role assignments tab.](./media/role-assignments-list-portal/sub-access-control-role-assignments-owners.png)
5454

5555
## List role assignments at a scope
5656

@@ -62,7 +62,7 @@ Users that have been assigned the [Owner](built-in-roles.md#owner) role for a su
6262

6363
1. Click the **Role assignments** tab to view all the role assignments at this scope.
6464

65-
![Access control - Role assignments tab](./media/role-assignments-list-portal/rg-access-control-role-assignments.png)
65+
![Screenshot of Access control and Role assignments tab.](./media/role-assignments-list-portal/rg-access-control-role-assignments.png)
6666

6767
On the Role assignments tab, you can see who has access at this scope. Notice that some roles are scoped to **This resource** while others are **(Inherited)** from another scope. Access is either assigned specifically to this resource or inherited from an assignment to the parent scope.
6868

@@ -76,15 +76,15 @@ To list access for a user, group, service principal, or managed identity, you li
7676

7777
1. Click **Access control (IAM)**.
7878

79-
1. Click the **Check access** tab.
79+
![Screenshot of resource group access control and Check access tab.](./media/shared/rg-access-control.png)
8080

81-
![Resource group access control - Check access tab](./media/role-assignments-list-portal/rg-access-control-check-access.png)
81+
1. On the **Check access** tab, click the **Check access** button.
8282

83-
1. In the **Find** list, select the user, group, service principal, or managed identity you want to check access for.
83+
1. In the **Check access** pane, click **User, group, or service principal** or **Managed identity**.
8484

8585
1. In the search box, enter a string to search the directory for display names, email addresses, or object identifiers.
8686

87-
![Check access select list](./media/shared/rg-check-access-select.png)
87+
![Screenshot of Check access select list.](./media/shared/rg-check-access-select.png)
8888

8989
1. Click the security principal to open the **assignments** pane.
9090

@@ -94,7 +94,7 @@ To list access for a user, group, service principal, or managed identity, you li
9494
- Deny assignments added using Azure Blueprints or Azure managed apps.
9595
- Classic Service Administrator or Co-Administrator assignments for classic deployments.
9696

97-
![assignments pane](./media/shared/rg-check-access-assignments-user.png)
97+
![Screenshot of assignments pane.](./media/shared/rg-check-access-assignments-user.png)
9898

9999
## List role assignments for a managed identity
100100

@@ -106,13 +106,13 @@ You can list role assignments for system-assigned and user-assigned managed iden
106106

107107
1. In the left menu, click **Identity**.
108108

109-
![System-assigned managed identity](./media/shared/identity-system-assigned.png)
109+
![Screenshot of system-assigned managed identity.](./media/shared/identity-system-assigned.png)
110110

111111
1. Under **Permissions**, click **Azure role assignments**.
112112

113113
You see a list of roles assigned to the selected system-assigned managed identity at various scopes such as management group, subscription, resource group, or resource. This list includes all role assignments you have permission to read.
114114

115-
![Role assignments for a system-assigned managed identity](./media/shared/role-assignments-system-assigned.png)
115+
![Screenshot of role assignments for a system-assigned managed identity.](./media/shared/role-assignments-system-assigned.png)
116116

117117
1. To change the subscription, click the **Subscription** list.
118118

@@ -124,7 +124,7 @@ You can list role assignments for system-assigned and user-assigned managed iden
124124

125125
You see a list of roles assigned to the selected user-assigned managed identity at various scopes such as management group, subscription, resource group, or resource. This list includes all role assignments you have permission to read.
126126

127-
![Screenshot that shows role assignments for a user-assigned managed identity.](./media/shared/role-assignments-user-assigned.png)
127+
![Screenshot of role assignments for a user-assigned managed identity.](./media/shared/role-assignments-user-assigned.png)
128128

129129
1. To change the subscription, click the **Subscription** list.
130130

@@ -134,11 +134,11 @@ You can have up to **2000** role assignments in each subscription. This limit in
134134

135135
The role assignments limit for a subscription is currently being increased. For more information, see [Troubleshoot Azure RBAC](troubleshooting.md#limits).
136136

137-
![Access control - Number of role assignments chart](./media/role-assignments-list-portal/access-control-role-assignments-chart.png)
137+
![Screenshot of Access control and number of role assignments chart.](./media/role-assignments-list-portal/access-control-role-assignments-chart.png)
138138

139139
If you are getting close to the maximum number and you try to add more role assignments, you'll see a warning in the **Add role assignment** pane. For ways that you can reduce the number of role assignments, see [Troubleshoot Azure RBAC](troubleshooting.md#limits).
140140

141-
![Access control - Add role assignment warning](./media/role-assignments-list-portal/add-role-assignment-warning.png)
141+
![Screenshot of Access control and Add role assignment warning.](./media/role-assignments-list-portal/add-role-assignment-warning.png)
142142

143143
## Download role assignments
144144

@@ -160,7 +160,7 @@ Follow these steps to download role assignments at a scope.
160160

161161
1. Click **Download role assignments** to open the Download role assignments pane.
162162

163-
![Access control - Download role assignments](./media/role-assignments-list-portal/download-role-assignments.png)
163+
![Screenshot of Access control and Download role assignments.](./media/role-assignments-list-portal/download-role-assignments.png)
164164

165165
1. Use the check boxes to select the role assignments you want to include in the downloaded file.
166166

@@ -176,7 +176,7 @@ Follow these steps to download role assignments at a scope.
176176

177177
The following show examples of the output for each file format.
178178

179-
![Download role assignments as CSV](./media/role-assignments-list-portal/download-role-assignments-csv.png)
179+
![Screenshot of download role assignments as CSV.](./media/role-assignments-list-portal/download-role-assignments-csv.png)
180180

181181
![Screenshot of the downloaded role assignments as in JSON format.](./media/role-assignments-list-portal/download-role-assignments-json.png)
182182

articles/role-based-access-control/role-assignments-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: role-based-access-control
88
ms.topic: how-to
99
ms.workload: identity
10-
ms.date: 10/15/2021
10+
ms.date: 08/26/2022
1111
ms.author: rolyon
1212
ms.custom: contperf-fy21q3-portal,subject-rbac-steps
1313
---
@@ -28,7 +28,7 @@ If you need to assign administrator roles in Azure Active Directory, see [Assign
2828

2929
[!INCLUDE [Scope for Azure RBAC introduction](../../includes/role-based-access-control/scope-intro.md)] For more information, see [Understand scope](scope-overview.md).
3030

31-
![Diagram showing the scope levels for Azure RBAC.](../../includes/role-based-access-control/media/scope-levels.png)
31+
![Diagram that shows the scope levels for Azure RBAC.](../../includes/role-based-access-control/media/scope-levels.png)
3232

3333
1. Sign in to the [Azure portal](https://portal.azure.com).
3434

@@ -147,7 +147,7 @@ Currently, conditions can be added to built-in or custom role assignments that h
147147

148148
[!INCLUDE [Scope for Azure RBAC introduction](../../includes/role-based-access-control/scope-intro.md)] For more information, see [Understand scope](scope-overview.md).
149149

150-
![Diagram showing the scope levels for Azure RBAC for classic experience.](../../includes/role-based-access-control/media/scope-levels.png)
150+
![Diagram that shows the scope levels for Azure RBAC for classic experience.](../../includes/role-based-access-control/media/scope-levels.png)
151151

152152
1. Sign in to the [Azure portal](https://portal.azure.com).
153153

0 commit comments

Comments
 (0)