Skip to content

Commit 38a4dfe

Browse files
authored
Merge pull request #101581 from rolyon/rolyon-rbac-monitor-notactions
[Azure RBAC] Updates to monitor notactions
2 parents 60e81a6 + cb91143 commit 38a4dfe

File tree

1 file changed

+5
-9
lines changed

1 file changed

+5
-9
lines changed

articles/azure-monitor/platform/manage-access.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -237,13 +237,12 @@ See [Defining per-table access control](#table-level-rbac) below if you want to
237237

238238
**Table level RBAC** allows you to define more granular control to data in a Log Analytics workspace in addition to the other permissions. This control allows you to define specific data types that are accessible only to a specific set of users.
239239

240-
You implement table access control with [Azure custom roles](../../role-based-access-control/custom-roles.md) to either grant or deny access to specific [tables](../log-query/logs-structure.md) in the workspace. These roles are applied to workspaces with either workspace-context or resource-context [access control modes](design-logs-deployment.md#access-control-mode) regardless of the user's [access mode](design-logs-deployment.md#access-mode).
240+
You implement table access control with [Azure custom roles](../../role-based-access-control/custom-roles.md) to either grant access to specific [tables](../log-query/logs-structure.md) in the workspace. These roles are applied to workspaces with either workspace-context or resource-context [access control modes](design-logs-deployment.md#access-control-mode) regardless of the user's [access mode](design-logs-deployment.md#access-mode).
241241

242242
Create a [custom role](../../role-based-access-control/custom-roles.md) with the following actions to define access to table access control.
243243

244-
* To grant access to a table, include it in the **Actions** section of the role definition.
245-
* To deny access to a table, include it in the **NotActions** section of the role definition.
246-
* Use * to specify all tables.
244+
* To grant access to a table, include it in the **Actions** section of the role definition. To subtract access from the allowed **Actions**, include it in the **NotActions** section.
245+
* Use Microsoft.OperationalInsights/workspaces/query/* to specify all tables.
247246

248247
For example, to create a role with access to the _Heartbeat_ and _AzureActivity_ tables, create a custom role using the following actions:
249248

@@ -256,24 +255,21 @@ For example, to create a role with access to the _Heartbeat_ and _AzureActivity_
256255
],
257256
```
258257

259-
To create a role with access to only _SecurityBaseline_ and no other tables, create a custom role using the following actions:
258+
To create a role with access to only the _SecurityBaseline_ table, create a custom role using the following actions:
260259

261260
```
262261
"Actions": [
263262
"Microsoft.OperationalInsights/workspaces/read",
264263
"Microsoft.OperationalInsights/workspaces/query/read",
265264
"Microsoft.OperationalInsights/workspaces/query/SecurityBaseline/read"
266265
],
267-
"NotActions": [
268-
"Microsoft.OperationalInsights/workspaces/query/*/read"
269-
],
270266
```
271267

272268
### Custom logs
273269

274270
Custom logs are created from data sources such as custom logs and HTTP Data Collector API. The easiest way to identify the type of log is by checking the tables listed under [Custom Logs in the log schema](../log-query/get-started-portal.md#understand-the-schema).
275271

276-
You can't currently grant or deny access to individual custom logs, but you can grant or deny access to all custom logs. To create a role with access to all custom logs, create a custom role using the following actions:
272+
You can't currently grant access to individual custom logs, but you can grant access to all custom logs. To create a role with access to all custom logs, create a custom role using the following actions:
277273

278274
```
279275
"Actions": [

0 commit comments

Comments
 (0)