Skip to content

Commit 15ab4e7

Browse files
committed
Link and formatting fixes
1 parent 8bc7533 commit 15ab4e7

File tree

1 file changed

+24
-30
lines changed

1 file changed

+24
-30
lines changed

articles/deployment-environments/concept-deployment-environments-role-based-access-control.md

Lines changed: 24 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,13 @@ ms.date: 07/27/2024
1313
---
1414
# Azure role-based access control in Azure Deployment Environments
1515

16-
This article describes the different built-in roles that Azure Deployment Environments supports, and how they map to organizational roles like platform engineer and developer team lead.
16+
This article describes the different built-in roles that Azure Deployment Environments supports, and how they map to organizational roles like platform engineer and dev manager.
17+
18+
Azure role-based access control (RBAC) specifies built-in role definitions that outline the permissions to be applied. You assign a user or group this role definition via a role assignment for a particular scope. The scope can be an individual resource, a resource group, or across the subscription. In the next section, you learn which built-in roles Azure Deployment Environments supports.
19+
20+
For more information, see [What is Azure role-based access control (Azure RBAC)?](/azure/role-based-access-control/overview.md)
1721

18-
Azure role-based access control (RBAC) specifies built-in role definitions that outline the permissions to be applied. You assign a user or group this role definition via a role assignment for a particular scope. The scope can be an individual resource, a resource group, or across the subscription. In the next section, you learn which [built-in roles](#) Azure Deployment Environments supports.
1922

20-
For more information, see [What is Azure role-based access control (Azure RBAC)](https://microsoft-my.sharepoint.com/azure/role-based-access-control/overview)?
2123

2224
> [!NOTE]
2325
> When you make role assignment changes, it can take a few minutes for these updates to propagate.
@@ -34,17 +36,17 @@ The following are the built-in roles supported by Azure Deployment Environments:
3436

3537
| **Organizational role type** | **Built-in role** | **Description** |
3638
|---|---|---|
37-
| Platform engineer | Owner | Grant full control to create/manage dev centers, catalogs, and projects, and grant permissions to other users. Learn more about the [Owner role](#). |
38-
| Platform engineer | Contributor | Grant full control to create/manage dev centers, catalogs, and projects, except for assigning roles to other users. Learn more about the [Contributor role](#). |
39-
| Dev Manager | DevCenter Project Admin | Grant permission to manage certain aspects of projects and environments. Learn more about the [DevCenter Project Admin role](#). |
40-
| Developer | Deployment Environments Reader | Grant permission to view all environments in a project. Learn more about the [Deployment Environments Reader role](#). |
41-
| Developer | Deployment Environments User | Grant permission to create environments and have full control over the environments that they create. Learn more about the [Deployment Environments User role](#). |
39+
| Platform engineer | Owner | Grant full control to create/manage dev centers, catalogs, and projects, and grant permissions to other users. Learn more about the [Owner role](#owner-role). |
40+
| Platform engineer | Contributor | Grant full control to create/manage dev centers, catalogs, and projects, except for assigning roles to other users. Learn more about the [Contributor role](#contributor-role). |
41+
| Dev Manager | DevCenter Project Admin | Grant permission to manage certain aspects of projects and environments. Learn more about the [DevCenter Project Admin role](#devcenter-project-admin-role). |
42+
| Developer | Deployment Environments Reader | Grant permission to view all environments in a project. Learn more about the [Deployment Environments Reader role](#deployment-environments-reader). |
43+
| Developer | Deployment Environments User | Grant permission to create environments and have full control over the environments that they create. Learn more about the [Deployment Environments User role](#deployment-environments-user). |
4244

4345
## Role assignment scope
4446

4547
In Azure RBAC, *scope* is the set of resources that access applies to. When you assign a role, it's important to understand scope so that you grant just the access that is needed.
4648

47-
In Azure, you can specify a scope at four levels: management group, subscription, resource group, and resource. Scopes are structured in a parent-child relationship. Each level of hierarchy makes the scope more specific. You can assign roles at any of these levels of scope. The level you select determines how widely the role is applied. Lower levels inherit role permissions from higher levels. Learn more about [scope for Azure RBAC](https://microsoft-my.sharepoint.com/azure/role-based-access-control/scope-overview).
49+
In Azure, you can specify a scope at four levels: management group, subscription, resource group, and resource. Scopes are structured in a parent-child relationship. Each level of hierarchy makes the scope more specific. You can assign roles at any of these levels of scope. The level you select determines how widely the role is applied. Lower levels inherit role permissions from higher levels. Learn more about [scope for Azure RBAC](/azure/role-based-access-control/scope-overview).
4850

4951
For Azure Deployment Environments, consider the following scopes:
5052

@@ -56,7 +58,7 @@ For Azure Deployment Environments, consider the following scopes:
5658
| Project (resource) | An Azure resource used to apply common configuration settings when you create deployment environments. Role assignment for the project grants permission only to that specific project. |
5759
| Environment Type (resource) | An Azure resource used to define the types of environments that you can create, like sandbox, dev, test, or production. Environment types are defined at dev center level and configured at project level. Role assignment for the deployment environment type grants permission to that environment type within the project, not to other environment types in the same project. |
5860

59-
:::image type="content" source="media/concept-deployment-environments-role-based-access-control/deployment-environments-scopes.png" alt-text="Diagram that shows the role assignment scopes for Azure Deployment Environments" lightbox="media/concept-deployment-environments-role-based-access-control/deployment-environments-scopes.png":::
61+
:::image type="content" source="media/concept-deployment-environments-role-based-access-control/deployment-environments-scopes.png" alt-text="Diagram that shows the role assignment scopes for Azure Deployment Environments":::
6062

6163
## Roles for common Deployment Environments activities
6264

@@ -66,33 +68,25 @@ The following table shows common Deployment Environments activities and the role
6668
|---|---|---|---|
6769
| Grant permission to create a resource group. | Platform engineer | Owner or Contributor | Subscription |
6870
| Grant permission to submit a Microsoft support ticket, including to [request a quota limit increase](how-to-request-quota-increase.md). | Platform engineer | Owner, Contributor, Support Request Contributor | Subscription |
69-
| Grant permission to create environment types in a project. | Platform engineer | [Custom role](../role-based-access-control/custom-roles-portal.md): Microsoft.Authorization/roleAssignments/write | Subscription |
70-
| | | Owner, Contributor, or Project Admin | Project |
71+
| Grant permission to create environment types in a project. | Platform engineer | [Custom role](/azure/role-based-access-control/custom-roles-portal.md): Microsoft.Authorization/roleAssignments/write </br></br> Owner, Contributor, or Project Admin | Subscription </br></br></br> Project|
7172
| Grant permission to assign roles to other users. | Platform engineer | Owner | Resource group |
72-
| Grant permission to: | Platform engineer | Owner, Contributor | Resource group |
73+
| Grant permission to: </br>- Create / manage dev centers and projects.</br>- Attach / detach catalog to a dev center or project.</br>- Add, sync, remove catalog (project-level catalogs must be enabled on the dev center).</br>- Configure expiry date and time to trigger automatic deletion.</br>- Update & delete environment types.</br>- Delete environments.| Platform engineer | Owner, Contributor | Resource group |
7374
| Grant permission to enable / disable project catalogs. | Dev Manager | Owner, Contributor | Dev center |
7475
| Grant permission to create and manage all environments in a project. | Dev Manager | DevCenter Project Admin | Project |
7576
| View all environments in a project. | Dev Manager | Deployment Environments Reader | Project |
7677
| Create and manage your own environments in a project. | User | Deployment Environments User | Project |
7778
| Create and manage catalogs in a GitHub or Azure Repos repository. | Dev Manager | Not governed by RBAC.<br>The user must be assigned permissions through Azure DevOps or GitHub. | Repository |
7879

79-
- Create / manage dev centers and projects.
80-
- Attach / detach catalog to a dev center or project.
81-
- Add, sync, remove catalog (project-level catalogs must be enabled on the dev center).
82-
- Configure expiry date and time to trigger automatic deletion.
83-
- Update & delete environment types.
84-
- Delete environments.
85-
8680
> [!IMPORTANT]
87-
> An organization's subscription is used to manage billing and security for all Azure resources and services. You can assign the Owner or Contributor role on the [subscription](https://microsoft-my.sharepoint.com/personal/rosemalcolm_microsoft_com/Documents/Documents/Deployment%20Environments/RBAC%20guide/administrator-guide.md). Typically, only Platform engineers have subscription-level access because this includes full access to all resources in the subscription.
81+
> An organization's subscription is used to manage billing and security for all Azure resources and services. You can assign the Owner or Contributor role on the subscription. Typically, only Platform engineers have subscription-level access because this includes full access to all resources in the subscription.
8882
8983
## Platform engineer roles
9084

9185
To grant users permission to manage Azure Deployment Environments within your organization's subscription, you should assign them the [Owner](#) or [Contributor](#) role.
9286

9387
Assign these roles to the *resource group*. The dev center and projects within the resource group inherit these role assignments. Environment types inherit role assignments through projects.
9488

95-
:::image type="icon" source="media/concept-deployment-environments-role-based-access-control/deployment-environments-administrator-scopes.png" alt-text="Diagram that shows the administrator role assignments at the subscription for Azure Deployment Environments" lightbox="media/concept-deployment-environments-role-based-access-control/deployment-environments-administrator-scopes.png":::
89+
:::image type="icon" source="media/concept-deployment-environments-role-based-access-control/deployment-environments-administrator-scopes.png" alt-text="Diagram that shows the administrator role assignments at the subscription for Azure Deployment Environments":::
9690

9791
### Owner role
9892

@@ -116,17 +110,17 @@ Assign the Contributor role to give a user full control to create or manage dev
116110

117111
To create a project-level environment type in Deployment Environments, you must assign the Owner role or the User Access Administrator role, for the subscription that is being mapped in the environment type in the project. Alternatively, to avoid assigning broad permissions at the subscription level, you can create and assign a custom role that applies Write permissions. Apply the cuustom role at the subscription that is being mapped in the environment type in the project.
118112

119-
To learn how to Create a custom role with *Microsoft.Authorization/roleAssignments/write* and assign it at subscription level, see: [Create a custom role](../role-based-access-control/custom-roles-portal.md).
113+
To learn how to Create a custom role with *Microsoft.Authorization/roleAssignments/write* and assign it at subscription level, see: [Create a custom role](/azure/role-based-access-control/custom-roles-portal.md).
120114

121-
:::image type="icon" source="media/concept-deployment-environments-role-based-access-control/deployment-environments-custom-scopes.png" alt-text="Diagram that shows the custom role assignment at the subscription for Azure Deployment Environments" lightbox="media/concept-deployment-environments-role-based-access-control/deployment-environments-custom-scopes.png":::
115+
:::image type="icon" source="media/concept-deployment-environments-role-based-access-control/deployment-environments-custom-scopes.png" alt-text="Diagram that shows the custom role assignment at the subscription for Azure Deployment Environments":::
122116

123117
In addition to the custom role, the user must be assigned the Owner, Contributor, or Project Admin role on the project where the environment type is created.
124118

125119
## Dev Manager roles
126120

127121
These roles have more restricted permissions at lower-level scopes than the platform engineer roles. You can assign these roles to developer teams to enable them to perform administrative tasks for their team.
128122

129-
:::image type="icon" source="media/concept-deployment-environments-role-based-access-control/deployment-environments-project-scopes.png" alt-text="Diagram that shows the dev manager role assignment at the project level scopes for Azure Deployment Environments" lightbox="media/concept-deployment-environments-role-based-access-control/deployment-environments-project-scopes.png":::
123+
:::image type="icon" source="media/concept-deployment-environments-role-based-access-control/deployment-environments-project-scopes.png" alt-text="Diagram that shows the dev manager role assignment at the project level scopes for Azure Deployment Environments":::
130124

131125

132126
### DevCenter Project Admin role
@@ -143,7 +137,7 @@ The DevCenter Project Admin is the most powerful of the Dev Manager roles. Assig
143137

144138
These roles give developers the permissions they require to view, create, and manage environments.
145139

146-
:::image type="icon" source="media/concept-deployment-environments-role-based-access-control/deployment-environments-user-scopes.png" alt-text="Diagram that shows the user role assignments at the project for Azure Deployment Environments" lightbox="media/concept-deployment-environments-role-based-access-control/deployment-environments-user-scopes.png":::
140+
:::image type="icon" source="media/concept-deployment-environments-role-based-access-control/deployment-environments-user-scopes.png" alt-text="Diagram that shows the user role assignments at the project for Azure Deployment Environments":::
147141

148142
### Deployment Environments User
149143

@@ -166,9 +160,9 @@ When a developer creates an environment based on an environment type, they're as
166160

167161
The **Access control (IAM)** page in the Azure portal is used to configure Azure role-based access control on Azure Deployment Environments resources. You can use built-in roles for individuals and groups in Active Directory. The following screenshot shows Active Directory integration (Azure RBAC) using access control (IAM) in the Azure portal:
168162

169-
:::image type="icon" source="media/concept-deployment-environments-role-based-access-control/iam-page.png" alt-text="Screenshot that shows the Access control (IAM) page for a dev center" lightbox="media/concept-deployment-environments-role-based-access-control/iam-page.png":::
163+
:::image type="icon" source="media/concept-deployment-environments-role-based-access-control/iam-page.png" alt-text="Screenshot that shows the Access control (IAM) page for a dev center":::
170164

171-
For detailed steps, see [Assign Azure roles using the Azure portal](https://microsoft-my.sharepoint.com/azure/role-based-access-control/role-assignments-portal).
165+
For detailed steps, see [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal).
172166

173167
## Dev center, resource group, and project structure
174168

@@ -207,6 +201,6 @@ You can attach catalogs to your dev center or project to manage environment defi
207201

208202
## Related content
209203

210-
- [What is Azure role-based access control (Azure RBAC)](https://microsoft-my.sharepoint.com/azure/role-based-access-control/overview)
211-
- [Understand scope for Azure RBAC](https://microsoft-my.sharepoint.com/azure/role-based-access-control/scope-overview)
204+
- [What is Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/overview)
205+
- [Understand scope for Azure RBAC](/azure/role-based-access-control/scope-overview)
212206

0 commit comments

Comments
 (0)