Skip to content

Commit 31f89e6

Browse files
committed
Update REST API links
1 parent 06e3a15 commit 31f89e6

9 files changed

+36
-32
lines changed

articles/role-based-access-control/conditions-prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: role-based-access-control
88
ms.subservice: conditions
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 11/16/2021
11+
ms.date: 10/19/2022
1212
ms.author: rolyon
1313

1414
#Customer intent:

articles/role-based-access-control/conditions-role-assignments-rest.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: role-based-access-control
88
ms.subservice: conditions
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 05/07/2021
11+
ms.date: 10/19/2022
1212
ms.author: rolyon
1313
---
1414

@@ -33,7 +33,7 @@ For more information about the prerequisites to add or edit role assignment cond
3333

3434
## Add a condition
3535

36-
To add a role assignment condition, use the [Role Assignments - Create](/rest/api/authorization/roleassignments/create) REST API. [Role Assignments - Create](/rest/api/authorization/roleassignments/create) includes the following parameters related to conditions.
36+
To add a role assignment condition, use the [Role Assignments - Create](/rest/api/authorization/role-assignments/create) REST API. [Role Assignments - Create](/rest/api/authorization/role-assignments/create) includes the following parameters related to conditions.
3737

3838
| Parameter | Type | Description |
3939
| --- | --- | --- |
@@ -102,7 +102,7 @@ The following shows an example of the output:
102102

103103
## Edit a condition
104104

105-
To edit an existing role assignment condition, use the same [Role Assignments - Create](/rest/api/authorization/roleassignments/create) REST API as you used to add the role assignment condition. The following shows an example JSON where `condition` and `description` are updated. Only the `condition`, `conditionVersion`, and `description` properties can be edited. You must specify the other properties to match the existing role assignment.
105+
To edit an existing role assignment condition, use the same [Role Assignments - Create](/rest/api/authorization/role-assignments/create) REST API as you used to add the role assignment condition. The following shows an example JSON where `condition` and `description` are updated. Only the `condition`, `conditionVersion`, and `description` properties can be edited. You must specify the other properties to match the existing role assignment.
106106

107107
```http
108108
PUT https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentId}?api-version=2022-04-01
@@ -122,13 +122,13 @@ PUT https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{
122122

123123
## List a condition
124124

125-
To list a role assignment condition, use the [Role Assignments - List](/rest/api/authorization/roleassignments/list) API. For more information, see [List Azure role assignments using the REST API](role-assignments-list-rest.md).
125+
To list a role assignment condition, use the [Role Assignments](/rest/api/authorization/role-assignments) Get or List REST API. For more information, see [List Azure role assignments using the REST API](role-assignments-list-rest.md).
126126

127127
## Delete a condition
128128

129129
To delete a role assignment condition, edit the role assignment condition and set both the condition and condition version to either an empty string or null.
130130

131-
Alternatively, if you want to delete both the role assignment and the condition, you can use the [Role Assignments - Delete](/rest/api/authorization/roleassignments/delete) API. For more information, see [Remove Azure role assignments](role-assignments-remove.md).
131+
Alternatively, if you want to delete both the role assignment and the condition, you can use the [Role Assignments - Delete](/rest/api/authorization/role-assignments/delete) API. For more information, see [Remove Azure role assignments](role-assignments-remove.md).
132132

133133
## Next steps
134134

articles/role-based-access-control/custom-roles-rest.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: role-based-access-control
1212
ms.workload: multiple
1313
ms.tgt_pltfrm: rest-api
1414
ms.topic: how-to
15-
ms.date: 07/28/2022
15+
ms.date: 10/19/2022
1616
ms.author: rolyon
1717
ms.reviewer: bagovind
1818

@@ -36,7 +36,7 @@ For more information, see [API versions of Azure RBAC REST APIs](/rest/api/autho
3636

3737
## List custom roles
3838

39-
To list all custom roles in a directory, use the [Role Definitions - List](/rest/api/authorization/roledefinitions/list) REST API.
39+
To list all custom roles in a directory, use the [Role Definitions - List](/rest/api/authorization/role-definitions/list) REST API.
4040

4141
1. Start with the following request:
4242

@@ -53,7 +53,7 @@ To list all custom roles in a directory, use the [Role Definitions - List](/rest
5353
5454
## List custom roles at a scope
5555
56-
To list custom roles at a scope, use the [Role Definitions - List](/rest/api/authorization/roledefinitions/list) REST API.
56+
To list custom roles at a scope, use the [Role Definitions - List](/rest/api/authorization/role-definitions/list) REST API.
5757
5858
1. Start with the following request:
5959
@@ -80,7 +80,7 @@ To list custom roles at a scope, use the [Role Definitions - List](/rest/api/aut
8080
8181
## List a custom role definition by name
8282
83-
To get information about a custom role by its display name, use the [Role Definitions - Get](/rest/api/authorization/roledefinitions/get) REST API.
83+
To get information about a custom role by its display name, use the [Role Definitions - Get](/rest/api/authorization/role-definitions/get) REST API.
8484
8585
1. Start with the following request:
8686
@@ -107,9 +107,9 @@ To get information about a custom role by its display name, use the [Role Defini
107107
108108
## List a custom role definition by ID
109109
110-
To get information about a custom role by its unique identifier, use the [Role Definitions - Get](/rest/api/authorization/roledefinitions/get) REST API.
110+
To get information about a custom role by its unique identifier, use the [Role Definitions - Get](/rest/api/authorization/role-definitions/get) REST API.
111111
112-
1. Use the [Role Definitions - List](/rest/api/authorization/roledefinitions/list) REST API to get the GUID identifier for the role.
112+
1. Use the [Role Definitions - List](/rest/api/authorization/role-definitions/list) REST API to get the GUID identifier for the role.
113113
114114
1. Start with the following request:
115115
@@ -131,7 +131,7 @@ To get information about a custom role by its unique identifier, use the [Role D
131131
132132
## Create a custom role
133133
134-
To create a custom role, use the [Role Definitions - Create Or Update](/rest/api/authorization/roledefinitions/createorupdate) REST API. To call this API, you must be signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleDefinitions/write` permission on all the `assignableScopes`. Of the built-in roles, only [Owner](built-in-roles.md#owner) and [User Access Administrator](built-in-roles.md#user-access-administrator) include this permission.
134+
To create a custom role, use the [Role Definitions - Create Or Update](/rest/api/authorization/role-definitions/create-or-update) REST API. To call this API, you must be signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleDefinitions/write` permission on all the `assignableScopes`. Of the built-in roles, only [Owner](built-in-roles.md#owner) and [User Access Administrator](built-in-roles.md#user-access-administrator) include this permission.
135135
136136
1. Review the list of [resource provider operations](resource-provider-operations.md) that are available to create the permissions for your custom role.
137137
@@ -230,9 +230,9 @@ To create a custom role, use the [Role Definitions - Create Or Update](/rest/api
230230
231231
## Update a custom role
232232
233-
To update a custom role, use the [Role Definitions - Create Or Update](/rest/api/authorization/roledefinitions/createorupdate) REST API. To call this API, you must be signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleDefinitions/write` permission on all the `assignableScopes`. Of the built-in roles, only [Owner](built-in-roles.md#owner) and [User Access Administrator](built-in-roles.md#user-access-administrator) include this permission.
233+
To update a custom role, use the [Role Definitions - Create Or Update](/rest/api/authorization/role-definitions/create-or-update) REST API. To call this API, you must be signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleDefinitions/write` permission on all the `assignableScopes`. Of the built-in roles, only [Owner](built-in-roles.md#owner) and [User Access Administrator](built-in-roles.md#user-access-administrator) include this permission.
234234
235-
1. Use the [Role Definitions - List](/rest/api/authorization/roledefinitions/list) or [Role Definitions - Get](/rest/api/authorization/roledefinitions/get) REST API to get information about the custom role. For more information, see the earlier [List custom roles](#list-custom-roles) section.
235+
1. Use the [Role Definitions - List](/rest/api/authorization/role-definitions/list) or [Role Definitions - Get](/rest/api/authorization/role-definitions/get) REST API to get information about the custom role. For more information, see the earlier [List custom roles](#list-custom-roles) section.
236236
237237
1. Start with the following request:
238238
@@ -320,11 +320,11 @@ To update a custom role, use the [Role Definitions - Create Or Update](/rest/api
320320
321321
## Delete a custom role
322322
323-
To delete a custom role, use the [Role Definitions - Delete](/rest/api/authorization/roledefinitions/delete) REST API. To call this API, you must be signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleDefinitions/delete` permission on all the `assignableScopes`. Of the built-in roles, only [Owner](built-in-roles.md#owner) and [User Access Administrator](built-in-roles.md#user-access-administrator) include this permission.
323+
To delete a custom role, use the [Role Definitions - Delete](/rest/api/authorization/role-definitions/delete) REST API. To call this API, you must be signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleDefinitions/delete` permission on all the `assignableScopes`. Of the built-in roles, only [Owner](built-in-roles.md#owner) and [User Access Administrator](built-in-roles.md#user-access-administrator) include this permission.
324324
325325
1. Remove any role assignments that use the custom role. For more information, see [Find role assignments to delete a custom role](custom-roles.md#find-role-assignments-to-delete-a-custom-role).
326326
327-
1. Use the [Role Definitions - List](/rest/api/authorization/roledefinitions/list) or [Role Definitions - Get](/rest/api/authorization/roledefinitions/get) REST API to get the GUID identifier of the custom role. For more information, see the earlier [List custom roles](#list-custom-roles) section.
327+
1. Use the [Role Definitions - List](/rest/api/authorization/role-definitions/list) or [Role Definitions - Get](/rest/api/authorization/role-definitions/get) REST API to get the GUID identifier of the custom role. For more information, see the earlier [List custom roles](#list-custom-roles) section.
328328
329329
1. Start with the following request:
330330

articles/role-based-access-control/deny-assignments-rest.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: role-based-access-control
1212
ms.workload: multiple
1313
ms.tgt_pltfrm: rest-api
1414
ms.topic: how-to
15-
ms.date: 01/24/2022
15+
ms.date: 10/19/2022
1616
ms.author: rolyon
1717
ms.reviewer: bagovind
1818

@@ -39,6 +39,8 @@ For more information, see [API versions of Azure RBAC REST APIs](/rest/api/autho
3939

4040
## List a single deny assignment
4141

42+
To list a single deny assignment, use the [Deny Assignments - Get](/rest/api/authorization/deny-assignments/get) REST API.
43+
4244
1. Start with the following request:
4345

4446
```http
@@ -58,6 +60,8 @@ For more information, see [API versions of Azure RBAC REST APIs](/rest/api/autho
5860
5961
## List multiple deny assignments
6062
63+
To list multiple deny assignments, use the [Deny Assignments - List](/rest/api/authorization/deny-assignments/list) REST API.
64+
6165
1. Start with one of the following requests:
6266
6367
```http

articles/role-based-access-control/elevate-access-global-admin.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: role-based-access-control
88
ms.topic: how-to
99
ms.workload: identity
10-
ms.date: 09/10/2021
10+
ms.date: 10/19/2022
1111
ms.author: rolyon
1212
ms.custom: devx-track-azurepowershell, devx-track-azurecli
1313
---
@@ -226,7 +226,7 @@ Use the following basic steps to elevate access for a Global Administrator using
226226

227227
You can list all of the role assignments for a user at root scope (`/`).
228228

229-
- Call [GET roleAssignments](/rest/api/authorization/roleassignments/listforscope) where `{objectIdOfUser}` is the object ID of the user whose role assignments you want to retrieve.
229+
- Call [Role Assignments - List For Scope](/rest/api/authorization/role-assignments/list-for-scope) where `{objectIdOfUser}` is the object ID of the user whose role assignments you want to retrieve.
230230

231231
```http
232232
GET https://management.azure.com/providers/Microsoft.Authorization/roleAssignments?api-version=2022-04-01&$filter=principalId+eq+'{objectIdOfUser}'
@@ -246,7 +246,7 @@ You can list all of the deny assignments for a user at root scope (`/`).
246246

247247
When you call `elevateAccess`, you create a role assignment for yourself, so to revoke those privileges you need to remove the User Access Administrator role assignment for yourself at root scope (`/`).
248248

249-
1. Call [GET roleDefinitions](/rest/api/authorization/roledefinitions/get) where `roleName` equals User Access Administrator to determine the name ID of the User Access Administrator role.
249+
1. Call [Role Definitions - Get](/rest/api/authorization/role-definitions/get) where `roleName` equals User Access Administrator to determine the name ID of the User Access Administrator role.
250250

251251
```http
252252
GET https://management.azure.com/providers/Microsoft.Authorization/roleDefinitions?api-version=2022-04-01&$filter=roleName+eq+'User Access Administrator'

articles/role-based-access-control/role-assignments-list-rest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: role-based-access-control
99
ms.workload: multiple
1010
ms.tgt_pltfrm: rest-api
1111
ms.topic: how-to
12-
ms.date: 02/27/2021
12+
ms.date: 10/19/2022
1313
ms.author: rolyon
1414

1515
---
@@ -33,7 +33,7 @@ For more information, see [API versions of Azure RBAC REST APIs](/rest/api/autho
3333

3434
## List role assignments
3535

36-
In Azure RBAC, to list access, you list the role assignments. To list role assignments, use one of the [Role Assignments - List](/rest/api/authorization/roleassignments/list) REST APIs. To refine your results, you specify a scope and an optional filter.
36+
In Azure RBAC, to list access, you list the role assignments. To list role assignments, use one of the [Role Assignments](/rest/api/authorization/role-assignments) Get or List REST APIs. To refine your results, you specify a scope and an optional filter.
3737

3838
1. Start with the following request:
3939

articles/role-based-access-control/role-assignments-remove.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: role-based-access-control
88
ms.topic: how-to
99
ms.workload: identity
10-
ms.date: 02/15/2021
10+
ms.date: 10/19/2022
1111
ms.author: rolyon
1212
ms.custom: devx-track-azurepowershell, devx-track-azurecli
1313
ms.devlang: azurecli
@@ -109,7 +109,7 @@ az role assignment delete --assignee "[email protected]" \
109109

110110
## REST API
111111

112-
In the REST API, you remove a role assignment by using [Role Assignments - Delete](/rest/api/authorization/roleassignments/delete).
112+
In the REST API, you remove a role assignment by using [Role Assignments - Delete](/rest/api/authorization/role-assignments/delete).
113113

114114
1. Get the role assignment identifier (GUID). This identifier is returned when you first create the role assignment or you can get it by listing the role assignments.
115115

articles/role-based-access-control/role-assignments-rest.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: role-based-access-control
88
ms.workload: multiple
99
ms.tgt_pltfrm: rest-api
1010
ms.topic: how-to
11-
ms.date: 04/06/2021
11+
ms.date: 10/19/2022
1212
ms.author: rolyon
1313

1414
---
@@ -29,9 +29,9 @@ For more information, see [API versions of Azure RBAC REST APIs](/rest/api/autho
2929

3030
## Assign an Azure role
3131

32-
To assign a role, use the [Role Assignments - Create](/rest/api/authorization/roleassignments/create) REST API and specify the security principal, role definition, and scope. To call this API, you must have access to the `Microsoft.Authorization/roleAssignments/write` action. Of the built-in roles, only [Owner](built-in-roles.md#owner) and [User Access Administrator](built-in-roles.md#user-access-administrator) are granted access to this action.
32+
To assign a role, use the [Role Assignments - Create](/rest/api/authorization/role-assignments/create) REST API and specify the security principal, role definition, and scope. To call this API, you must have access to the `Microsoft.Authorization/roleAssignments/write` action. Of the built-in roles, only [Owner](built-in-roles.md#owner) and [User Access Administrator](built-in-roles.md#user-access-administrator) are granted access to this action.
3333

34-
1. Use the [Role Definitions - List](/rest/api/authorization/roledefinitions/list) REST API or see [Built-in roles](built-in-roles.md) to get the identifier for the role definition you want to assign.
34+
1. Use the [Role Definitions - List](/rest/api/authorization/role-definitions/list) REST API or see [Built-in roles](built-in-roles.md) to get the identifier for the role definition you want to assign.
3535

3636
1. Use a GUID tool to generate a unique identifier that will be used for the role assignment identifier. The identifier has the format: `00000000-0000-0000-0000-000000000000`
3737

@@ -113,7 +113,7 @@ The following shows an example of the output:
113113

114114
If you create a new service principal and immediately try to assign a role to that service principal, that role assignment can fail in some cases. For example, if you create a new managed identity and then try to assign a role to that service principal, the role assignment might fail. The reason for this failure is likely a replication delay. The service principal is created in one region; however, the role assignment might occur in a different region that hasn't replicated the service principal yet.
115115

116-
To address this scenario, use the [Role Assignments - Create](/rest/api/authorization/roleassignments/create) REST API and set the `principalType` property to `ServicePrincipal`. You must also set the `apiVersion` to `2018-09-01-preview` or later. `2022-04-01` is the first stable version.
116+
To address this scenario, use the [Role Assignments - Create](/rest/api/authorization/role-assignments/create) REST API and set the `principalType` property to `ServicePrincipal`. You must also set the `apiVersion` to `2018-09-01-preview` or later. `2022-04-01` is the first stable version.
117117

118118
```http
119119
PUT https://management.azure.com/{scope}/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentId}?api-version=2022-04-01

articles/role-based-access-control/role-definitions-list.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: role-based-access-control
88
ms.topic: how-to
99
ms.workload: identity
10-
ms.date: 10/15/2021
10+
ms.date: 10/19/2022
1111
ms.author: rolyon
1212
ms.custom: devx-track-azurepowershell, devx-track-azurecli
1313
ms.devlang: azurecli
@@ -339,7 +339,7 @@ For more information, see [API versions of Azure RBAC REST APIs](/rest/api/autho
339339

340340
### List role definitions
341341

342-
To list role definitions, use the [Role Definitions - List](/rest/api/authorization/roledefinitions/list) REST API. To refine your results, you specify a scope and an optional filter.
342+
To list role definitions, use the [Role Definitions - List](/rest/api/authorization/role-definitions/list) REST API. To refine your results, you specify a scope and an optional filter.
343343

344344
1. Start with the following request:
345345

@@ -420,7 +420,7 @@ The following shows an example of the output:
420420

421421
### List a role definition
422422

423-
To list the details of a specific role, use the [Role Definitions - Get](/rest/api/authorization/roledefinitions/get) or [Role Definitions - Get By Id](/rest/api/authorization/roledefinitions/getbyid) REST API.
423+
To list the details of a specific role, use the [Role Definitions - Get](/rest/api/authorization/role-definitions/get) or [Role Definitions - Get By Id](/rest/api/authorization/role-definitions/get-by-id) REST API.
424424

425425
1. Start with the following request:
426426

0 commit comments

Comments
 (0)