You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/best-practices.md
+13-2Lines changed: 13 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: amycolannino
7
7
ms.service: role-based-access-control
8
8
ms.topic: conceptual
9
9
ms.workload: identity
10
-
ms.date: 06/28/2022
10
+
ms.date: 11/06/2023
11
11
ms.author: rolyon
12
12
13
13
#Customer intent: As a dev, devops, or it admin, I want to learn how to best use Azure RBAC.
@@ -33,6 +33,17 @@ For information about how to assign roles, see [Assign Azure roles using the Azu
33
33
34
34
You should have a maximum of 3 subscription owners to reduce the potential for breach by a compromised owner. This recommendation can be monitored in Microsoft Defender for Cloud. For other identity and access recommendations in Defender for Cloud, see [Security recommendations - a reference guide](../security-center/recommendations-reference.md).
35
35
36
+
## Limit privileged administrator role assignments
37
+
38
+
Some roles are identified as [privileged administrator roles](./role-assignments-steps.md#privileged-administrator-roles). Consider taking the following actions to improve your security posture:
39
+
40
+
- Remove unnecessary privileged role assignments.
41
+
- Avoid assigning a privileged administrator role when a [job function role](./role-assignments-steps.md#job-function-roles) can be used instead.
42
+
- If you must assign a privileged administrator role, use a narrow scope, such as resource group or resource, instead of a broader scope, such as management group or subscription.
43
+
- If you are assigning a role with permission to create role assignments, consider adding a condition to constrain the role assignment. For more information, see [Delegate the Azure role assignment task to others with conditions (preview)](delegate-role-assignments-portal.md).
44
+
45
+
For more information, see [List or manage privileged administrator role assignments](./role-assignments-list-portal.md#list-or-manage-privileged-administrator-role-assignments).
## Use Microsoft Entra Privileged Identity Management
@@ -58,7 +69,7 @@ For more information, see [Assign a role using the unique role ID and Azure Powe
58
69
59
70
## Avoid using a wildcard when creating custom roles
60
71
61
-
When creating custom roles, you can use the wildcard (`*`) character to define permissions. It's recommended that you specify `Actions` and `DataActions` explicitly instead of using the wildcard (`*`) character. The additional access and permissions granted through future `Actions` or `DataActions`may be unwanted behavior using the wildcard. For more information, see [Azure custom roles](custom-roles.md#wildcard-permissions).
72
+
When creating custom roles, you can use the wildcard (`*`) character to define permissions. It's recommended that you specify `Actions` and `DataActions` explicitly instead of using the wildcard (`*`) character. The additional access and permissions granted through future `Actions` or `DataActions`might be unwanted behavior using the wildcard. For more information, see [Azure custom roles](custom-roles.md#wildcard-permissions).
Copy file name to clipboardExpand all lines: articles/role-based-access-control/role-assignments-list-portal.md
+23-1Lines changed: 23 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: amycolannino
7
7
ms.service: role-based-access-control
8
8
ms.topic: how-to
9
9
ms.workload: identity
10
-
ms.date: 09/13/2022
10
+
ms.date: 11/06/2023
11
11
ms.author: rolyon
12
12
---
13
13
@@ -52,6 +52,28 @@ Users that have been assigned the [Owner](built-in-roles.md#owner) role for a su
52
52
53
53

54
54
55
+
## List or manage privileged administrator role assignments
56
+
57
+
On the **Role assignments** tab, you can list and see the count of privileged administrator role assignments at the current scope. For more information, see [Privileged administrator roles](role-assignments-steps.md#privileged-administrator-roles).
58
+
59
+
1. In the Azure portal, click **All services** and then select the scope. For example, you can select **Management groups**, **Subscriptions**, **Resource groups**, or a resource.
60
+
61
+
1. Click the specific resource.
62
+
63
+
1. Click **Access control (IAM)**.
64
+
65
+
1. Click the **Role assignments** tab and then click the **Privileged** tab to list the privileged administrator role assignments at this scope.
66
+
67
+
:::image type="content" source="./media/role-assignments-list-portal/access-control-role-assignments-privileged.png" alt-text="Screenshot of Access control page, Role assignments tab, and Privileged tab showing privileged role assignments." lightbox="./media/role-assignments-list-portal/access-control-role-assignments-privileged.png":::
68
+
69
+
1. To see the count of privileged administrator role assignments at this scope, see the **Privileged** card.
70
+
71
+
1. To manage privileged administrator role assignments, see the **Privileged** card and click **View assignments**.
72
+
73
+
On the **Manage privileged role assignments** page, you can add a condition to constrain the privileged role assignment or remove the role assignment. For more information, see [Delegate the Azure role assignment task to others with conditions (preview)](delegate-role-assignments-portal.md).
74
+
75
+
:::image type="content" source="./media/role-assignments-list-portal/access-control-role-assignments-privileged-manage.png" alt-text="Screenshot of Manage privileged role assignments page showing how to add conditions or remove role assignments." lightbox="./media/role-assignments-list-portal/access-control-role-assignments-privileged-manage.png":::
76
+
55
77
## List role assignments at a scope
56
78
57
79
1. In the Azure portal, click **All services** and then select the scope. For example, you can select **Management groups**, **Subscriptions**, **Resource groups**, or a resource.
@@ -68,9 +68,9 @@ If you need to assign administrator roles in Microsoft Entra ID, see [Assign Mic
68
68
69
69
1. If you want to assign a privileged administrator role, select the **Privileged administrator roles** tab to select the role.
70
70
71
-
Privileged administrator roles are roles that grant privileged administrator access, such as the ability to manage Azure resources or assign roles to other users. You should avoid assigning a privileged administrator role when a job function role can be assigned instead. If you must assign a privileged administrator role, use a narrow scope, such as resource group or resource. For more information, see [Privileged administrator roles](./role-assignments-steps.md#privileged-administrator-roles).
72
-
73
-

71
+
For best practices when using privileged administrator role assignments, see [Best practices for Azure RBAC](best-practices.md#limit-privileged-administrator-role-assignments).
72
+
73
+

74
74
75
75
1. In the **Details** column, click **View** to get more details about a role.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/role-assignments-steps.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: amycolannino
7
7
ms.service: role-based-access-control
8
8
ms.topic: how-to
9
9
ms.workload: identity
10
-
ms.date: 08/09/2023
10
+
ms.date: 11/06/2023
11
11
ms.author: rolyon
12
12
---
13
13
@@ -56,9 +56,10 @@ Privileged administrator roles are roles that grant privileged administrator acc
56
56
| --- | --- |
57
57
|[Owner](built-in-roles.md#owner)| <ul><li>Grants full access to manage all resources</li><li>Assign roles in Azure RBAC</li></ul> |
58
58
|[Contributor](built-in-roles.md#contributor)| <ul><li>Grants full access to manage all resources</li><li>Can't assign roles in Azure RBAC</li><li>Can't manage assignments in Azure Blueprints or share image galleries</li></ul> |
59
+
|[Role Based Access Administrator (Preview)](built-in-roles.md#role-based-access-control-administrator-preview)| <ul><li>Manage user access to Azure resources</li><li>Assign roles in Azure RBAC</li><li>Assign themselves or others the Owner role</li><li>Can't manage access using other ways, such as Azure Policy</li></ul> |
59
60
|[User Access Administrator](built-in-roles.md#user-access-administrator)| <ul><li>Manage user access to Azure resources</li><li>Assign roles in Azure RBAC</li><li>Assign themselves or others the Owner role</li></ul> |
60
61
61
-
It's a best practice to grant users the least privilege to get their work done. You should avoid assigning a privileged administrator role when a job function role can be assigned instead. If you must assign a privilegedadministratorrole, use a narrow scope, such as resource group or resource, instead of a broader scope, such as management group or subscription.
62
+
For best practices when using privileged administrator role assignments, see [Best practices for Azure RBAC](best-practices.md#limit-privileged-administrator-role-assignments). For more information, see [Privileged administrator role definition](./role-definitions.md#privileged-administrator-role-definition).
Copy file name to clipboardExpand all lines: articles/role-based-access-control/role-definitions.md
+18-1Lines changed: 18 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: amycolannino
8
8
ms.service: role-based-access-control
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
-
ms.date: 04/05/2023
11
+
ms.date: 11/06/2023
12
12
ms.author: rolyon
13
13
ms.custom:
14
14
---
@@ -359,6 +359,23 @@ Although it's possible to create a custom role with a resource instance in `Assi
359
359
360
360
For more information about `AssignableScopes` for custom roles, see [Azure custom roles](custom-roles.md).
361
361
362
+
## Privileged administrator role definition
363
+
364
+
Privileged administrator roles are roles that grant privileged administrator access, such as the ability to manage Azure resources or assign roles to other users. If a built-in or custom role includes any of the following actions, it is considered privileged. For more information, see [List or manage privileged administrator role assignments](./role-assignments-list-portal.md#list-or-manage-privileged-administrator-role-assignments).
365
+
366
+
> [!div class="mx-tableFixed"]
367
+
> | Action string | Description |
368
+
> | --- | --- |
369
+
> |`*`| Create and manage resources of all types. |
370
+
> |`*/delete`| Delete resources of all types. |
371
+
> |`*/write`| Write resources of all types. |
372
+
> |`Microsoft.Authorization/denyAssignments/delete`| Delete a deny assignment at the specified scope. |
373
+
> |`Microsoft.Authorization/denyAssignments/write`| Create a deny assignment at the specified scope. |
374
+
> |`Microsoft.Authorization/roleAssignments/delete`| Delete a role assignment at the specified scope. |
375
+
> |`Microsoft.Authorization/roleAssignments/write`| Create a role assignment at the specified scope. |
376
+
> |`Microsoft.Authorization/roleDefinitions/delete`| Delete the specified custom role definition. |
377
+
> |`Microsoft.Authorization/roleDefinitions/write`| Create or update a custom role definition with specified permissions and assignable scopes. |
378
+
362
379
## Next steps
363
380
364
381
*[Understand role assignments](role-assignments.md)
0 commit comments