Skip to content

Commit 3cc89a2

Browse files
Add clarification for subnet attribute
1 parent 1f6f621 commit 3cc89a2

File tree

4 files changed

+9
-3
lines changed

4 files changed

+9
-3
lines changed

articles/role-based-access-control/conditions-format.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -279,7 +279,7 @@ The following table lists the supported environment attributes for conditions.
279279

280280
<sup>1</sup> For copy operations, the `Is private link`, `Private endpoint`, and `Subnet` attributes only apply to the destination, such a storage account, not the source. For more information about the copy operations this applies to, select each attribute in the table to see more details.<br />
281281
<sup>2</sup> You can only use the `Private endpoint` attribute if you currently have at least one private endpoint configured in your subscription.<br />
282-
<sup>3</sup> You can only use the `Subnet` attribute if you currently have at least one virtual network subnet configured in your subscription.<br />
282+
<sup>3</sup> You can only use the `Subnet` attribute if you currently have at least one virtual network subnet using [service endpoints](../storage/common/storage-network-security.md#grant-access-from-a-virtual-network) configured in your subscription.<br />
283283

284284
#### Principal attributes
285285

articles/role-based-access-control/conditions-prerequisites.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,12 @@ For more information about custom security attributes, see:
6262
- [Principal does not appear in Attribute source](conditions-troubleshoot.md#symptom---principal-does-not-appear-in-attribute-source)
6363
- [Add or deactivate custom security attributes in Microsoft Entra ID](../active-directory/fundamentals/custom-security-attributes-add.md)
6464

65+
## Environment attributes
66+
67+
To use the [Private endpoint](../storage/blobs/storage-auth-abac-attributes.md#private-endpoint) attribute, you must have at least one private endpoint configured in your subscription.
68+
69+
To use the [Subnet](../storage/blobs/storage-auth-abac-attributes.md#subnet) attribute, you must have at least one virtual network subnet using [service endpoints](../storage/common/storage-network-security.md#grant-access-from-a-virtual-network) configured in your subscription.
70+
6571
## Next steps
6672

6773
- [Example Azure role assignment conditions for Blob Storage](../storage/blobs/storage-auth-abac-examples.md)

articles/storage/blobs/storage-auth-abac-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -524,7 +524,7 @@ The following table summarizes the available attributes by source:
524524
> | Property | Value |
525525
> | --- | --- |
526526
> | **Display name** | Subnet |
527-
> | **Description** | The subnet over which an object is accessed.<br/>Use to restrict access to a specific subnet.<br/>*Available only for storage accounts in subscriptions that have at least one virtual network subnet configured. The subnet used in the condition must have the `Microsoft.Storage` service endpoint enabled.* |
527+
> | **Description** | The subnet over which an object is accessed.<br/>Use to restrict access to a specific subnet.<br/>*Available only for storage accounts in subscriptions that have at least one virtual network subnet using [service endpoints](../common/storage-network-security.md#grant-access-from-a-virtual-network) configured.* |
528528
> | **Attribute** | `Microsoft.Network/virtualNetworks/subnets` |
529529
> | **Attribute source** | [Environment](../../role-based-access-control/conditions-format.md#environment-attributes) |
530530
> | **Attribute type** | [String](../../role-based-access-control/conditions-format.md#string-comparison-operators) |

articles/storage/blobs/storage-auth-abac-examples.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1694,7 +1694,7 @@ Set-AzRoleAssignment -InputObject $testRa -PassThru
16941694

16951695
### Example: Allow access to blobs in specific containers from a specific subnet
16961696

1697-
This condition allows read, write, add and delete access to blobs in `container1` only from subnet `default` on virtual network `virtualnetwork1`.
1697+
This condition allows read, write, add and delete access to blobs in `container1` only from subnet `default` on virtual network `virtualnetwork1`. To use the [Subnet](storage-auth-abac-attributes.md#subnet) attribute in this example, the subnet must have [service endpoints enabled](../common/storage-network-security.md#grant-access-from-a-virtual-network) for Azure Storage.
16981698

16991699
There are five potential actions for read, write, add and delete access to existing blobs. To make this condition effective for principals that have multiple role assignments, you must add this condition to all role assignments that include any of the following actions.
17001700

0 commit comments

Comments
 (0)