Skip to content

Commit 32cc0ca

Browse files
committed
Updates from PR review
1 parent 4a7e35a commit 32cc0ca

File tree

1 file changed

+16
-4
lines changed

1 file changed

+16
-4
lines changed

articles/role-based-access-control/role-assignments.md

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -81,13 +81,13 @@ The following table describes what the role assignment properties mean.
8181
| `RoleDefinitionId`<br />`roleDefinitionId` | The unique ID of the role. |
8282
| `RoleDefinitionName`<br />`roleDefinitionName` | The name of the role. |
8383
| `ObjectId`<br />`principalId` | The Azure Active Directory (Azure AD) object identifier for the principal who has the role assigned. |
84-
| `ObjectType`<br />`principalType` | The type of Azure AD object that the principal represents. |
84+
| `ObjectType`<br />`principalType` | The type of Azure AD object that the principal represents. Valid values include `User`, `Group`, and `ServicePrincipal`. |
8585
| `DisplayName` | For role assignments for users, the display name of the user. |
8686
| `SignInName`<br />`principalName` | The unique principal name (UPN) of the user, or the name of the application associated with the service principal. |
8787
| `Description`<br />`description` | The description of the role assignment. |
88-
| `Condition`<br />`condition` | TODO |
89-
| `ConditionVersion`<br />`conditionVersion` | TODO |
90-
| `CanDelegate`<br />`canDelegate` | TODO |
88+
| `Condition`<br />`condition` | Condition statement built using one or more actions from role definition and attributes. |
89+
| `ConditionVersion`<br />`conditionVersion` | The condition version number. Defaults to 2.0 and is the only supported version. |
90+
| `CanDelegate`<br />`canDelegate` | Not implemented. |
9191

9292
## Scope
9393

@@ -135,6 +135,18 @@ Any role assignments that refer to a deleted principal ID become invalid. If you
135135

136136
You can add a text description to a role assignment. While descriptions are optional, it's a good practice to add them to your role assignments. Provide a short justification for why the principal needs the assigned role. When somebody audits the role assignments, descriptions can help to understand why they've been created and whether they're still applicable.
137137

138+
## Conditions
139+
140+
Some roles support *role assignment conditions* based on attributes in the context of specific actions. A role assignment condition is an additional check that you can optionally add to your role assignment to provide more fine-grained access control. For example, you can add a condition that requires an object to have a specific tag to read the object.
141+
142+
You typically build conditions using a visual condition editor, but here's what an example condition looks like in code:
143+
144+
```
145+
((!(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read'} AND NOT SubOperationMatches{'Blob.List'})) OR (@resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags:Project<$key_case_sensitive$>] StringEqualsIgnoreCase 'Cascade'))
146+
```
147+
148+
For more information about conditions, see [What is Azure attribute-based access control (Azure ABAC)?](conditions-overview.md)
149+
138150
## Next steps
139151

140152
* [Understand role definitions](role-definitions.md)

0 commit comments

Comments
 (0)