You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/manage-access.md
+5-9Lines changed: 5 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -237,13 +237,12 @@ See [Defining per-table access control](#table-level-rbac) below if you want to
237
237
238
238
**Table level RBAC** allows you to define more granular control to data in a Log Analytics workspace in addition to the other permissions. This control allows you to define specific data types that are accessible only to a specific set of users.
239
239
240
-
You implement table access control with [Azure custom roles](../../role-based-access-control/custom-roles.md) to either grant or deny access to specific [tables](../log-query/logs-structure.md) in the workspace. These roles are applied to workspaces with either workspace-context or resource-context [access control modes](design-logs-deployment.md#access-control-mode) regardless of the user's [access mode](design-logs-deployment.md#access-mode).
240
+
You implement table access control with [Azure custom roles](../../role-based-access-control/custom-roles.md) to either grant access to specific [tables](../log-query/logs-structure.md) in the workspace. These roles are applied to workspaces with either workspace-context or resource-context [access control modes](design-logs-deployment.md#access-control-mode) regardless of the user's [access mode](design-logs-deployment.md#access-mode).
241
241
242
242
Create a [custom role](../../role-based-access-control/custom-roles.md) with the following actions to define access to table access control.
243
243
244
-
* To grant access to a table, include it in the **Actions** section of the role definition.
245
-
* To deny access to a table, include it in the **NotActions** section of the role definition.
246
-
* Use * to specify all tables.
244
+
* To grant access to a table, include it in the **Actions** section of the role definition. To subtract access from the allowed **Actions**, include it in the **NotActions** section.
245
+
* Use Microsoft.OperationalInsights/workspaces/query/* to specify all tables.
247
246
248
247
For example, to create a role with access to the _Heartbeat_ and _AzureActivity_ tables, create a custom role using the following actions:
249
248
@@ -256,24 +255,21 @@ For example, to create a role with access to the _Heartbeat_ and _AzureActivity_
256
255
],
257
256
```
258
257
259
-
To create a role with access to only _SecurityBaseline_and no other tables, create a custom role using the following actions:
258
+
To create a role with access to only the _SecurityBaseline_table, create a custom role using the following actions:
Custom logs are created from data sources such as custom logs and HTTP Data Collector API. The easiest way to identify the type of log is by checking the tables listed under [Custom Logs in the log schema](../log-query/get-started-portal.md#understand-the-schema).
275
271
276
-
You can't currently grant or deny access to individual custom logs, but you can grant or deny access to all custom logs. To create a role with access to all custom logs, create a custom role using the following actions:
272
+
You can't currently grant access to individual custom logs, but you can grant access to all custom logs. To create a role with access to all custom logs, create a custom role using the following actions:
0 commit comments