You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/best-practices.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: amycolannino
7
7
ms.service: role-based-access-control
8
8
ms.topic: conceptual
9
9
ms.workload: identity
10
-
ms.date: 11/29/2023
10
+
ms.date: 01/30/2024
11
11
ms.author: rolyon
12
12
13
13
#Customer intent: As a dev, devops, or it admin, I want to learn how to best use Azure RBAC.
@@ -40,7 +40,7 @@ Some roles are identified as [privileged administrator roles](./role-assignments
40
40
- Remove unnecessary privileged role assignments.
41
41
- Avoid assigning a privileged administrator role when a [job function role](./role-assignments-steps.md#job-function-roles) can be used instead.
42
42
- If you must assign a privileged administrator role, use a narrow scope, such as resource group or resource, instead of a broader scope, such as management group or subscription.
43
-
- If you are assigning a role with permission to create role assignments, consider adding a condition to constrain the role assignment. For more information, see [Delegate Azure role assignment management to others with conditions (preview)](delegate-role-assignments-portal.md).
43
+
- If you are assigning a role with permission to create role assignments, consider adding a condition to constrain the role assignment. For more information, see [Delegate Azure role assignment management to others with conditions](delegate-role-assignments-portal.md).
44
44
45
45
For more information, see [List or manage privileged administrator role assignments](./role-assignments-list-portal.md#list-or-manage-privileged-administrator-role-assignments).
Copy file name to clipboardExpand all lines: articles/role-based-access-control/conditions-authorization-actions-attributes.md
+5-9Lines changed: 5 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Authorization actions and attributes (preview)
2
+
title: Authorization actions and attributes
3
3
description: Supported actions and attributes for Azure role assignment conditions and Azure attribute-based access control (Azure ABAC) in authorization
#Customer intent: As a dev, devops, or it admin, I want to
15
15
---
16
16
17
-
# Authorization actions and attributes (preview)
18
-
19
-
> [!IMPORTANT]
20
-
> Delegating Azure role assignment management with conditions is currently in PREVIEW.
21
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17
+
# Authorization actions and attributes
22
18
23
19
## Authorization actions
24
20
@@ -94,5 +90,5 @@ This section lists the authorization attributes you can use in your condition ex
94
90
95
91
## Next steps
96
92
97
-
-[Examples to delegate Azure role assignment management with conditions (preview)](delegate-role-assignments-examples.md)
98
-
-[Delegate Azure role assignment management to others with conditions (preview)](delegate-role-assignments-portal.md)
93
+
-[Examples to delegate Azure role assignment management with conditions](delegate-role-assignments-examples.md)
94
+
-[Delegate Azure role assignment management to others with conditions](delegate-role-assignments-portal.md)
Copy file name to clipboardExpand all lines: articles/role-based-access-control/delegate-role-assignments-examples.md
+6-10Lines changed: 6 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Examples to delegate Azure role assignment management with conditions (preview) - Azure ABAC
2
+
title: Examples to delegate Azure role assignment management with conditions - Azure ABAC
3
3
description: Examples to delegate Azure role assignment management to other users by using Azure attribute-based access control (Azure ABAC).
4
4
services: active-directory
5
5
author: rolyon
@@ -9,16 +9,12 @@ ms.subservice: conditions
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
11
ms.custom: devx-track-azurepowershell
12
-
ms.date: 12/01/2023
12
+
ms.date: 01/30/2024
13
13
ms.author: rolyon
14
14
#Customer intent: As a dev, devops, or it admin, I want to learn about the conditions so that I write more complex conditions.
15
15
---
16
16
17
-
# Examples to delegate Azure role assignment management with conditions (preview)
18
-
19
-
> [!IMPORTANT]
20
-
> Delegating Azure role assignment management with conditions is currently in PREVIEW.
21
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17
+
# Examples to delegate Azure role assignment management with conditions
22
18
23
19
This article lists examples of how to delegate Azure role assignment management to other users with conditions.
#Customer intent: As a dev, devops, or it admin, I want to delegate Azure role assignment management to other users who are closer to the decision, but want to limit the scope of the role assignments.
@@ -52,11 +52,7 @@ Here are the primary issues with the current method of delegating role assignmen
52
52
53
53
Instead of assigning the Owner or User Access Administrator roles, a more secure method is to constrain a delegate's ability to create role assignments.
54
54
55
-
## A more secure method: Delegate role assignment management with conditions (preview)
56
-
57
-
> [!IMPORTANT]
58
-
> Delegating Azure role assignment management with conditions is currently in PREVIEW.
59
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
55
+
## A more secure method: Delegate role assignment management with conditions
60
56
61
57
Delegating role assignment management with conditions is a way to restrict the role assignments a user can create. In the preceding example, Alice can allow Dara to create some role assignments on her behalf, but not all role assignments. For example, Alice can constrain the roles that Dara can assign and constrain the principals that Dara can assign roles to. This delegation with conditions is sometimes referred to as *constrained delegation* and is implemented using [Azure attribute-based access control (Azure ABAC) conditions](conditions-overview.md).
62
58
@@ -141,15 +137,15 @@ To delegate role assignment management with conditions, you assign roles as you
141
137
142
138
Choose from a list of condition templates. Select **Configure** to specify the roles, principal types, or principals.
143
139
144
-
For more information, see [Delegate Azure role assignment management to others with conditions (preview)](delegate-role-assignments-portal.md).
140
+
For more information, see [Delegate Azure role assignment management to others with conditions](delegate-role-assignments-portal.md).
145
141
146
142
:::image type="content" source="./media/shared/condition-templates.png" alt-text="Screenshot of Add role assignment condition with a list of condition templates." lightbox="./media/shared/condition-templates.png":::
147
143
148
144
# [Condition editor](#tab/condition-editor)
149
145
150
146
If the condition templates don't work for your scenario or if you want more control, you can use the condition editor.
151
147
152
-
For examples, see [Examples to delegate Azure role assignment management with conditions (preview)](delegate-role-assignments-examples.md).
148
+
For examples, see [Examples to delegate Azure role assignment management with conditions](delegate-role-assignments-examples.md).
153
149
154
150
:::image type="content" source="./media/shared/delegate-role-assignments-expression.png" alt-text="Screenshot of condition editor in Azure portal showing a role assignment condition to delegate role assignment management." lightbox="./media/shared/delegate-role-assignments-expression.png":::
155
151
@@ -248,7 +244,9 @@ To delegate role assignment management with conditions, you assign roles as you
248
244
249
245
## Built-in roles with conditions
250
246
251
-
The [Key Vault Data Access Administrator](built-in-roles.md#key-vault-data-access-administrator) role already has a built-in condition to constrain role assignments. This role enables you to manage access to Key Vault secrets, certificates, and keys. It's exclusively focused on access control without the ability to assign privileged roles such as Owner or User Access Administrator roles. It allows better separation of duties for scenarios like managing encryption at rest across data services to further comply with least privilege principle. The condition constrains role assignments to the following Azure Key Vault roles:
247
+
The [Key Vault Data Access Administrator](built-in-roles.md#key-vault-data-access-administrator) and [Virtual Machine Data Access Administrator (preview)](built-in-roles.md#virtual-machine-data-access-administrator-preview) roles already have a built-in condition to constrain role assignments.
248
+
249
+
The Key Vault Data Access Administrator role enables you to manage access to Key Vault secrets, certificates, and keys. It's exclusively focused on access control without the ability to assign privileged roles such as Owner or User Access Administrator roles. It allows better separation of duties for scenarios like managing encryption at rest across data services to further comply with least privilege principle. The condition constrains role assignments to the following Azure Key Vault roles:
@@ -267,18 +265,17 @@ If you want to further constrain the Key Vault Data Access Administrator role as
267
265
268
266
## Known issues
269
267
270
-
Here are the known issues related to delegating role assignment management with conditions (preview):
268
+
Here are the known issues related to delegating role assignment management with conditions:
271
269
272
270
- You can't delegate role assignment management with conditions using [Privileged Identity Management](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md).
273
271
- You can't have a role assignment with a Microsoft.Storage data action and an ABAC condition that uses a GUID comparison operator. For more information, see [Troubleshoot Azure RBAC](troubleshooting.md#symptom---authorization-failed).
274
-
- This preview isn't available in Azure Government or Microsoft Azure operated by 21Vianet.
275
272
276
273
## License requirements
277
274
278
275
[!INCLUDE [Azure AD free license](../../includes/active-directory-free-license.md)]
279
276
280
277
## Next steps
281
278
282
-
- [Delegate Azure role assignment management to others with conditions (preview)](delegate-role-assignments-portal.md)
279
+
- [Delegate Azure role assignment management to others with conditions](delegate-role-assignments-portal.md)
283
280
- [What is Azure attribute-based access control (Azure ABAC)?](conditions-overview.md)
284
-
- [Examples to delegate Azure role assignment management with conditions (preview)](delegate-role-assignments-examples.md)
281
+
- [Examples to delegate Azure role assignment management with conditions](delegate-role-assignments-examples.md)
#Customer intent: As a dev, devops, or it admin, I want to delegate Azure role assignment management to other users who are closer to the decision, but want to limit the scope of the role assignments.
15
15
---
16
16
17
-
# Delegate Azure role assignment management to others with conditions (preview)
18
-
19
-
> [!IMPORTANT]
20
-
> Delegating Azure role assignment management with conditions is currently in PREVIEW.
21
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17
+
# Delegate Azure role assignment management to others with conditions
22
18
23
19
As an administrator, you might get several requests to grant access to Azure resources that you want to delegate to someone else. You could assign a user the [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator) roles, but these are highly privileged roles. This article describes a more secure way to [delegate role assignment management](delegate-role-assignments-overview.md) to other users in your organization, but add restrictions for those role assignments. For example, you can constrain the roles that can be assigned or constrain the principals the roles can be assigned to.
24
20
@@ -39,7 +35,7 @@ To help determine the permissions the delegate needs, answer the following quest
39
35
- Which principals can the delegate assign roles to?
40
36
- Can delegate remove any role assignments?
41
37
42
-
Once you know the permissions that delegate needs, you use the following steps to add a condition to the delegate's role assignment. For example conditions, see [Examples to delegate Azure role assignment management with conditions (preview)](delegate-role-assignments-examples.md).
38
+
Once you know the permissions that delegate needs, you use the following steps to add a condition to the delegate's role assignment. For example conditions, see [Examples to delegate Azure role assignment management with conditions](delegate-role-assignments-examples.md).
Copy file name to clipboardExpand all lines: articles/role-based-access-control/role-assignments-list-portal.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: amycolannino
7
7
ms.service: role-based-access-control
8
8
ms.topic: how-to
9
9
ms.workload: identity
10
-
ms.date: 11/29/2023
10
+
ms.date: 01/30/2024
11
11
ms.author: rolyon
12
12
---
13
13
@@ -70,7 +70,7 @@ On the **Role assignments** tab, you can list and see the count of privileged ad
70
70
71
71
1. To manage privileged administrator role assignments, see the **Privileged** card and click **View assignments**.
72
72
73
-
On the **Manage privileged role assignments** page, you can add a condition to constrain the privileged role assignment or remove the role assignment. For more information, see [Delegate Azure role assignment management to others with conditions (preview)](delegate-role-assignments-portal.md).
73
+
On the **Manage privileged role assignments** page, you can add a condition to constrain the privileged role assignment or remove the role assignment. For more information, see [Delegate Azure role assignment management to others with conditions](delegate-role-assignments-portal.md).
74
74
75
75
:::image type="content" source="./media/role-assignments-list-portal/access-control-role-assignments-privileged-manage.png" alt-text="Screenshot of Manage privileged role assignments page showing how to add conditions or remove role assignments." lightbox="./media/role-assignments-list-portal/access-control-role-assignments-privileged-manage.png":::
@@ -138,7 +138,7 @@ If you selected one of the following privileged roles, follow the steps in this
138
138
139
139
1. Click **Add condition** to add a condition that constrains the roles and principals this user can assign roles to.
140
140
141
-
1. Follow the steps in [Delegate Azure role assignment management to others with conditions (preview)](delegate-role-assignments-portal.md#step-3-add-a-condition).
141
+
1. Follow the steps in [Delegate Azure role assignment management to others with conditions](delegate-role-assignments-portal.md#step-3-add-a-condition).
0 commit comments