Skip to content

Commit 21a97d5

Browse files
committed
11th commit-create abac article specific to queues
1 parent 325e279 commit 21a97d5

File tree

3 files changed

+3
-7
lines changed

3 files changed

+3
-7
lines changed

articles/storage/queues/TOC.yml

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -61,10 +61,6 @@
6161
href: queues-auth-abac.md
6262
- name: Actions and attributes for conditions
6363
href: queues-auth-abac-attributes.md
64-
- name: Security for conditions
65-
href: ../blobs/storage-auth-abac-security.md?toc=%2fazure%2fstorage%2fblobs%2ftoc.json
66-
- name: Example conditions
67-
href: ../blobs/storage-auth-abac-examples.md?toc=%2fazure%2fstorage%2fblobs%2ftoc.json
6864
- name: Authenticate and authorize with Azure AD
6965
href: authorize-access-azure-active-directory.md
7066
- name: Authorize with Shared Key

articles/storage/queues/queues-auth-abac-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Actions and attributes for Azure role assignment conditions for Azure queues
2+
title: Actions and attributes for Azure role assignment conditions for Azure queues | Microsoft Docs
33
titleSuffix: Azure Storage
44
description: Supported actions and attributes for Azure role assignment conditions and Azure attribute-based access control (Azure ABAC) for Azure queues.
55
services: storage

articles/storage/queues/queues-auth-abac.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Authorize access to queues using Azure role assignment conditions
2+
title: Authorize access to queues using Azure role assignment conditions | Microsoft Docs
33
titleSuffix: Azure Storage
44
description: Authorize access to Azure queues using Azure role assignment conditions and Azure attribute-based access control (Azure ABAC). Define conditions on role assignments using Storage attributes.
55
services: storage
@@ -23,7 +23,7 @@ Attribute-based access control (ABAC) is an authorization strategy that defines
2323

2424
## Overview of conditions in Azure Storage
2525

26-
You can [use of Azure Active Directory](../common/authorize-data-access.md) (Azure AD) to authorize requests to Azure storage resources using Azure RBAC. Azure RBAC helps you manage access to resources by defining who has access to resources and what they can do with those resources, using role definitions and role assignments. Azure Storage defines a set of Azure [built-in roles](../../role-based-access-control/built-in-roles.md#storage) that encompass common sets of permissions used to access Azure storage data. You can also define custom roles with select sets of permissions. Azure Storage supports role assignments for both storage accounts and blob containers.
26+
You can [use of Azure Active Directory](../common/authorize-data-access.md) (Azure AD) to authorize requests to Azure storage resources using Azure RBAC. Azure RBAC helps you manage access to resources by defining who has access to resources and what they can do with those resources, using role definitions and role assignments. Azure Storage defines a set of Azure [built-in roles](../../role-based-access-control/built-in-roles.md#storage) that encompass common sets of permissions used to access Azure storage data. You can also define custom roles with select sets of permissions. Azure Storage supports role assignments for both storage accounts and blob containers or queues.
2727

2828
Azure ABAC builds on Azure RBAC by adding [role assignment conditions](../../role-based-access-control/conditions-overview.md) in the context of specific actions. A *role assignment condition* is an additional check that is evaluated when the action on the storage resource is being authorized. This condition is expressed as a predicate using attributes associated with any of the following:
2929
- Security principal that is requesting authorization

0 commit comments

Comments
 (0)