Skip to content

Commit 3c37352

Browse files
committed
Started a best practice article
1 parent 2af5254 commit 3c37352

File tree

1 file changed

+32
-0
lines changed

1 file changed

+32
-0
lines changed
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
title: Best practices for Azure RBAC
3+
description: Best practices for using Azure role-based access control (Azure RBAC).
4+
services: active-directory
5+
documentationcenter: ''
6+
author: rolyon
7+
manager: mtillman
8+
ms.service: role-based-access-control
9+
ms.devlang: na
10+
ms.topic: overview
11+
ms.tgt_pltfrm: na
12+
ms.workload: identity
13+
ms.date: 04/17/2020
14+
ms.author: rolyon
15+
ms.reviewer: bagovind
16+
17+
#Customer intent: As a dev, devops, or it admin, I want to learn how to best use Azure RBAC.
18+
---
19+
20+
# Best practices for Azure RBAC
21+
22+
This article describes some best practices for using Azure role-based access control (Azure RBAC). These best practices are derived from our experience with Azure RBAC and the experiences of customers like yourself.
23+
24+
## Only grant the access users need
25+
26+
Using Azure RBAC, you can segregate duties within your team and grant only the amount of access to users that they need to perform their jobs. Instead of giving everybody unrestricted permissions in your Azure subscription or resources, you can allow only certain actions at a particular scope.
27+
28+
When planning your access control strategy, it's a best practice to grant users the least privilege to get their work done. The following diagram shows a suggested pattern for using RBAC.
29+
30+
![RBAC and least privilege](./media/overview/rbac-least-privilege.png)
31+
32+
## Next steps

0 commit comments

Comments
 (0)