Skip to content

Commit 163633c

Browse files
committed
Using RBAC and ABAC description
1 parent 145a045 commit 163633c

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/role-based-access-control/conditions-overview.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: femila
66
ms.service: role-based-access-control
77
ms.subservice: conditions
88
ms.topic: overview
9-
ms.date: 04/01/2024
9+
ms.date: 05/19/2025
1010
ms.author: rolyon
1111
#Customer intent: As a dev, devops, or it admin, I want to learn how to constrain access within a role assignment by using conditions.
1212
---
@@ -21,6 +21,8 @@ Attribute-based access control (ABAC) is an authorization system that defines ac
2121

2222
Azure ABAC builds on Azure RBAC by adding role assignment conditions based on attributes in the context of specific actions. A *role assignment condition* is an additional check that you can optionally add to your role assignment to provide more fine-grained access control. A condition filters down permissions granted as a part of the role definition and role assignment. For example, you can add a condition that requires an object to have a specific tag to read the object. You cannot explicitly deny access to specific resources using conditions.
2323

24+
Using Azure RBAC and Azure ABAC together integrates the benefits of both access control models. Azure RBAC is more straightforward to implement due to its close alignment with business logic, while Azure ABAC provides greater flexibility in some key scenarios. By combining these two methods, organizations can achieve a more sophisticated level of authorization.
25+
2426
## Why use conditions?
2527

2628
There are three primary benefits for using role assignment conditions:

0 commit comments

Comments
 (0)