Skip to content

Commit 178f3f9

Browse files
Merge pull request #265637 from pauljewellmsft/abac-env
[ABAC] Add clarification for subnet attribute
2 parents 2bdd6a7 + adf3a3d commit 178f3f9

File tree

4 files changed

+11
-5
lines changed

4 files changed

+11
-5
lines changed

articles/role-based-access-control/conditions-format.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -277,7 +277,7 @@ The following table lists the supported environment attributes for conditions.
277277

278278
<sup>1</sup> For copy operations, the `Is private link`, `Private endpoint`, and `Subnet` attributes only apply to the destination, such a storage account, not the source. For more information about the copy operations this applies to, select each attribute in the table to see more details.<br />
279279
<sup>2</sup> You can only use the `Private endpoint` attribute if you currently have at least one private endpoint configured in your subscription.<br />
280-
<sup>3</sup> You can only use the `Subnet` attribute if you currently have at least one virtual network subnet configured in your subscription.<br />
280+
<sup>3</sup> You can only use the `Subnet` attribute if you currently have at least one virtual network subnet using [service endpoints](../storage/common/storage-network-security.md#grant-access-from-a-virtual-network) configured in your subscription.<br />
281281

282282
#### Principal attributes
283283

articles/role-based-access-control/conditions-prerequisites.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,12 @@ For more information about custom security attributes, see:
6161
- [Principal does not appear in Attribute source](conditions-troubleshoot.md#symptom---principal-does-not-appear-in-attribute-source)
6262
- [Add or deactivate custom security attributes in Microsoft Entra ID](../active-directory/fundamentals/custom-security-attributes-add.md)
6363

64+
## Environment attributes
65+
66+
To use the [Private endpoint](../storage/blobs/storage-auth-abac-attributes.md#private-endpoint) attribute, you must have at least one private endpoint configured in your subscription.
67+
68+
To use the [Subnet](../storage/blobs/storage-auth-abac-attributes.md#subnet) attribute, you must have at least one virtual network subnet using [service endpoints](../storage/common/storage-network-security.md#grant-access-from-a-virtual-network) configured in your subscription.
69+
6470
## Next steps
6571

6672
- [Example Azure role assignment conditions for Blob Storage](../storage/blobs/storage-auth-abac-examples.md)

articles/storage/blobs/storage-auth-abac-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: pauljewellmsft
66
ms.author: pauljewell
77
ms.service: azure-blob-storage
88
ms.topic: conceptual
9-
ms.date: 01/26/2024
9+
ms.date: 02/07/2024
1010
ms.reviewer: nachakra
1111
---
1212

@@ -524,7 +524,7 @@ The following table summarizes the available attributes by source:
524524
> | Property | Value |
525525
> | --- | --- |
526526
> | **Display name** | Subnet |
527-
> | **Description** | The subnet over which an object is accessed.<br/>Use to restrict access to a specific subnet.<br/>*Available only for storage accounts in subscriptions that have at least one virtual network subnet configured.* |
527+
> | **Description** | The subnet over which an object is accessed.<br/>Use to restrict access to a specific subnet.<br/>*Available only for storage accounts in subscriptions that have at least one virtual network subnet using [service endpoints](../common/storage-network-security.md#grant-access-from-a-virtual-network) configured.* |
528528
> | **Attribute** | `Microsoft.Network/virtualNetworks/subnets` |
529529
> | **Attribute source** | [Environment](../../role-based-access-control/conditions-format.md#environment-attributes) |
530530
> | **Attribute type** | [String](../../role-based-access-control/conditions-format.md#string-comparison-operators) |

articles/storage/blobs/storage-auth-abac-examples.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-blob-storage
88
ms.topic: conceptual
99
ms.reviewer: nachakra
1010
ms.custom: devx-track-azurepowershell
11-
ms.date: 01/19/2024
11+
ms.date: 02/08/2024
1212
#Customer intent: As a dev, devops, or it admin, I want to learn about the conditions so that I write more complex conditions.
1313
---
1414

@@ -1694,7 +1694,7 @@ Set-AzRoleAssignment -InputObject $testRa -PassThru
16941694

16951695
### Example: Allow access to blobs in specific containers from a specific subnet
16961696

1697-
This condition allows read, write, add and delete access to blobs in `container1` only from subnet `default` on virtual network `virtualnetwork1`.
1697+
This condition allows read, write, add and delete access to blobs in `container1` only from subnet `default` on virtual network `virtualnetwork1`. To use the [Subnet](storage-auth-abac-attributes.md#subnet) attribute in this example, the subnet must have [service endpoints enabled](../common/storage-network-security.md#grant-access-from-a-virtual-network) for Azure Storage.
16981698

16991699
There are five potential actions for read, write, add and delete access to existing blobs. To make this condition effective for principals that have multiple role assignments, you must add this condition to all role assignments that include any of the following actions.
17001700

0 commit comments

Comments
 (0)