You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/overview.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: rolyon
5
5
manager: amycolannino
6
6
ms.service: role-based-access-control
7
7
ms.topic: overview
8
-
ms.date: 01/12/2022
8
+
ms.date: 03/12/2024
9
9
ms.author: rolyon
10
10
ms.custom: azuread-video-2020
11
11
#Customer intent: As a dev, devops, or it admin, I want to learn how permissions and roles work in Azure, so that I can better understand how to grant access to resources.
@@ -70,7 +70,7 @@ For more information about scope, see [Understand scope](scope-overview.md).
70
70
71
71
A *role assignment* is the process of attaching a role definition to a user, group, service principal, or managed identity at a particular scope for the purpose of granting access. Access is granted by creating a role assignment, and access is revoked by removing a role assignment.
72
72
73
-
The following diagram shows an example of a role assignment. In this example, the Marketing group has been assigned the [Contributor](built-in-roles.md#contributor) role for the pharma-sales resource group. This means that users in the Marketing group can create or manage any Azure resource in the pharma-sales resource group. Marketing users do not have access to resources outside the pharma-sales resource group, unless they are part of another role assignment.
73
+
The following diagram shows an example of a role assignment. In this example, the Marketing group has been assigned the [Contributor](built-in-roles.md#contributor) role for the pharma-sales resource group. This means that users in the Marketing group can create or manage any Azure resource in the pharma-sales resource group. Marketing users don't have access to resources outside the pharma-sales resource group, unless they're part of another role assignment.
74
74
75
75

76
76
@@ -80,7 +80,7 @@ For more information, see [Steps to assign an Azure role](role-assignments-steps
80
80
81
81
## Groups
82
82
83
-
Role assignments are transitive for groups which means that if a user is a member of a group and that group is a member of another group that has a role assignment, the user will have the permissions in the role assignment.
83
+
Role assignments are transitive for groups, which means that if a user is a member of a group and that group is a member of another group that has a role assignment, the user has the permissions in the role assignment.
84
84
85
85

86
86
@@ -92,7 +92,7 @@ So what happens if you have multiple overlapping role assignments? Azure RBAC is
92
92
93
93
## How Azure RBAC determines if a user has access to a resource
94
94
95
-
The following are the high-level steps that Azure RBAC uses to determine if you have access to a resource. These steps apply to Azure Resource Manager or data plane services integrated with Azure RBAC. This is helpful to understand if you are trying to troubleshoot an access issue.
95
+
The following are the high-level steps that Azure RBAC uses to determine if you have access to a resource. These steps apply to Azure Resource Manager or data plane services integrated with Azure RBAC. This is helpful to understand if you're trying to troubleshoot an access issue.
96
96
97
97
1. A user (or service principal) acquires a token for Azure Resource Manager.
98
98
@@ -112,11 +112,11 @@ The following are the high-level steps that Azure RBAC uses to determine if you
112
112
113
113
`DataActions - NotDataActions = Effective data permissions`
114
114
115
-
1. If the user doesn't have a role with the action at the requested scope, access is not allowed. Otherwise, any conditions are evaluated.
115
+
1. If the user doesn't have a role with the action at the requested scope, access isn't allowed. Otherwise, any conditions are evaluated.
116
116
117
-
1. If the role assignment includes conditions, they are evaluated. Otherwise access is allowed.
117
+
1. If the role assignment includes conditions, they're evaluated. Otherwise access is allowed.
118
118
119
-
1. If conditions are met, access is allowed. Otherwise access is not allowed.
119
+
1. If conditions are met, access is allowed. Otherwise access isn't allowed.
120
120
121
121
The following diagram is a summary of the evaluation logic.
122
122
@@ -130,7 +130,7 @@ When a role assignment or any other Azure RBAC data is deleted, the data is glob
130
130
131
131
## Why is Azure RBAC data global?
132
132
133
-
Azure RBAC data is global to ensure that customers can timely access resources regardless from where they are accessing. Azure RBAC is enforced by Azure Resource Manager, which has a global endpoint and requests are routed to the nearest region for speed and resilience. Therefore, Azure RBAC must be enforced in all regions and the data is replicated to all regions. For more information, see [Resiliency of Azure Resource Manager](../azure-resource-manager/management/overview.md#resiliency-of-azure-resource-manager).
133
+
Azure RBAC data is global to ensure that customers can timely access resources regardless from where they're accessing. Azure RBAC is enforced by Azure Resource Manager, which has a global endpoint and requests are routed to the nearest region for speed and resilience. Therefore, Azure RBAC must be enforced in all regions and the data is replicated to all regions. For more information, see [Resiliency of Azure Resource Manager](../azure-resource-manager/management/overview.md#resiliency-of-azure-resource-manager).
134
134
135
135
Consider the following example. Arina creates a virtual machine in East Asia. Bob, who is a member of Arina's team, works in the United States. Bob needs to access the virtual machine that was created in East Asia. To grant Bob timely access to the virtual machine, Azure needs to globally replicate the role assignment that grants Bob access to the virtual machine from anywhere Bob is.
0 commit comments