Skip to content

Commit 43a9e75

Browse files
authored
Merge pull request #260059 from rolyon/rolyon-rbac-roles-rbac-admin-update
[Azure RBAC] Role Based Access Control Administrator role update
2 parents 0b7a5fa + efacd13 commit 43a9e75

25 files changed

+64
-62
lines changed

articles/role-based-access-control/built-in-roles.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The following table provides a brief description of each built-in role. Click th
2929
> | [Contributor](#contributor) | Grants full access to manage all resources, but does not allow you to assign roles in Azure RBAC, manage assignments in Azure Blueprints, or share image galleries. | b24988ac-6180-42a0-ab88-20f7382dd24c |
3030
> | [Owner](#owner) | Grants full access to manage all resources, including the ability to assign roles in Azure RBAC. | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 |
3131
> | [Reader](#reader) | View all resources, but does not allow you to make any changes. | acdd72a7-3385-48ef-bd42-f606fba81ae7 |
32-
> | [Role Based Access Control Administrator (Preview)](#role-based-access-control-administrator-preview) | Manage access to Azure resources by assigning roles using Azure RBAC. This role does not allow you to manage access using other ways, such as Azure Policy. | f58310d9-a9f6-439a-9e8d-f62e7b41a168 |
32+
> | [Role Based Access Control Administrator](#role-based-access-control-administrator) | Manage access to Azure resources by assigning roles using Azure RBAC. This role does not allow you to manage access using other ways, such as Azure Policy. | f58310d9-a9f6-439a-9e8d-f62e7b41a168 |
3333
> | [User Access Administrator](#user-access-administrator) | Lets you manage user access to Azure resources. | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 |
3434
> | **Compute** | | |
3535
> | [Classic Virtual Machine Contributor](#classic-virtual-machine-contributor) | Lets you manage classic virtual machines, but not access to them, and not the virtual network or storage account they're connected to. | d73bb868-a0df-4d4d-bd69-98a00b01fccb |
@@ -473,7 +473,7 @@ View all resources, but does not allow you to make any changes. [Learn more](rba
473473
}
474474
```
475475

476-
### Role Based Access Control Administrator (Preview)
476+
### Role Based Access Control Administrator
477477

478478
Manage access to Azure resources by assigning roles using Azure RBAC. This role does not allow you to manage access using other ways, such as Azure Policy.
479479

@@ -512,7 +512,7 @@ Manage access to Azure resources by assigning roles using Azure RBAC. This role
512512
"notDataActions": []
513513
}
514514
],
515-
"roleName": "Role Based Access Control Administrator (Preview)",
515+
"roleName": "Role Based Access Control Administrator",
516516
"roleType": "BuiltInRole",
517517
"type": "Microsoft.Authorization/roleDefinitions"
518518
}

articles/role-based-access-control/conditions-custom-security-attributes.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.subservice: conditions
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.custom: devx-track-azurecli, devx-track-azurepowershell
12-
ms.date: 11/15/2023
12+
ms.date: 12/01/2023
1313
ms.author: rolyon
1414
#Customer intent: As a dev, devops, or it admin, I want to
1515
---
@@ -23,7 +23,7 @@ In this article, you learn how to allow read access to blobs based on blob index
2323
To assign custom security attributes and add role assignments conditions in your Microsoft Entra tenant, you need:
2424

2525
- [Attribute Definition Administrator](../active-directory/roles/permissions-reference.md#attribute-definition-administrator) and [Attribute Assignment Administrator](../active-directory/roles/permissions-reference.md#attribute-assignment-administrator)
26-
- [User Access Administrator](built-in-roles.md#user-access-administrator) or [Owner](built-in-roles.md#owner)
26+
- [Role Based Access Control Administrator](built-in-roles.md#role-based-access-control-administrator)
2727

2828
> [!IMPORTANT]
2929
> By default, [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) and other administrator roles do not have permissions to read, define, or assign custom security attributes. If you do not meet these prerequisites, you won't see the principal/user attributes in the condition editor.
@@ -194,7 +194,7 @@ You can also use Azure PowerShell to add role assignment conditions. The followi
194194
195195
### Add a condition
196196
197-
1. Use the [Connect-AzAccount](/powershell/module/az.accounts/connect-azaccount) command and follow the instructions that appear to sign in to your directory as User Access Administrator or Owner.
197+
1. Use the [Connect-AzAccount](/powershell/module/az.accounts/connect-azaccount) command and follow the instructions that appear to sign in to your directory as Role Based Access Control Administrator.
198198
199199
```powershell
200200
Connect-AzAccount
@@ -271,7 +271,7 @@ You can also use Azure CLI to add role assignments conditions. The following com
271271
272272
### Add a condition
273273
274-
1. Use the [az login](/cli/azure/reference-index#az-login) command and follow the instructions that appear to sign in to your directory as User Access Administrator or Owner.
274+
1. Use the [az login](/cli/azure/reference-index#az-login) command and follow the instructions that appear to sign in to your directory as Role Based Access Control Administrator.
275275
276276
```azurecli
277277
az login

articles/role-based-access-control/conditions-prerequisites.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.subservice: conditions
99
ms.topic: conceptual
1010
ms.workload: identity
1111
ms.custom: devx-track-azurecli, devx-track-azurepowershell
12-
ms.date: 11/15/2023
12+
ms.date: 12/01/2023
1313
ms.author: rolyon
1414
---
1515

@@ -48,7 +48,7 @@ For more information, see [API versions of Azure RBAC REST APIs](/rest/api/autho
4848

4949
## Permissions
5050

51-
Just like role assignments, to add or update conditions, you must be signed in to Azure with a user that has the `Microsoft.Authorization/roleAssignments/write` and `Microsoft.Authorization/roleAssignments/delete` permissions, such as [User Access Administrator](built-in-roles.md#user-access-administrator) or [Owner](built-in-roles.md#owner).
51+
Just like role assignments, to add or update conditions, you must be signed in to Azure with a user that has the `Microsoft.Authorization/roleAssignments/write` and `Microsoft.Authorization/roleAssignments/delete` permissions, such as [Role Based Access Control Administrator](built-in-roles.md#role-based-access-control-administrator).
5252

5353
## Principal attributes
5454

articles/role-based-access-control/custom-roles-bicep.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: role-based-access-control
88
ms.topic: how-to
99
ms.workload: identity
10-
ms.date: 07/01/2022
10+
ms.date: 12/01/2023
1111
ms.author: rolyon
1212
ms.custom: devx-track-azurepowershell, devx-track-azurecli, devx-track-bicep
1313
#Customer intent: As an IT admin, I want to create custom and/or roles using Bicep so that I can start automating custom role processes.
@@ -23,7 +23,7 @@ To create a custom role, you specify a role name, role permissions, and where th
2323

2424
## Prerequisites
2525

26-
To create a custom role, you must have permissions to create custom roles, such as [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator).
26+
To create a custom role, you must have permissions to create custom roles, such as [User Access Administrator](built-in-roles.md#user-access-administrator).
2727

2828
You also must have an active Azure subscription. If you don't have one, you can create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
2929

articles/role-based-access-control/custom-roles-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.topic: how-to
1212
ms.tgt_pltfrm: na
1313
ms.custom: devx-track-azurecli
1414
ms.workload: identity
15-
ms.date: 04/05/2023
15+
ms.date: 12/01/2023
1616
ms.author: rolyon
1717
ms.reviewer: bagovind
1818
---
@@ -26,7 +26,7 @@ For a step-by-step tutorial on how to create a custom role, see [Tutorial: Creat
2626

2727
To create custom roles, you need:
2828

29-
- Permissions to create custom roles, such as [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator)
29+
- Permissions to create custom roles, such as [User Access Administrator](built-in-roles.md#user-access-administrator)
3030
- [Azure Cloud Shell](../cloud-shell/overview.md) or [Azure CLI](/cli/azure/install-azure-cli)
3131

3232
## List custom roles

articles/role-based-access-control/custom-roles-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: role-based-access-control
1111
ms.topic: how-to
1212
ms.tgt_pltfrm: na
1313
ms.workload: identity
14-
ms.date: 04/05/2023
14+
ms.date: 12/01/2023
1515
ms.author: rolyon
1616
ms.reviewer: bagovind
1717
ms.custom: devx-track-azurepowershell
@@ -28,7 +28,7 @@ For a step-by-step tutorial on how to create a custom role, see [Tutorial: Creat
2828

2929
To create custom roles, you need:
3030

31-
- Permissions to create custom roles, such as [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator)
31+
- Permissions to create custom roles, such as [User Access Administrator](built-in-roles.md#user-access-administrator)
3232
- [Azure Cloud Shell](../cloud-shell/overview.md) or [Azure PowerShell](/powershell/azure/install-azure-powershell)
3333

3434
## List custom roles

articles/role-based-access-control/custom-roles-rest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: role-based-access-control
1212
ms.workload: multiple
1313
ms.tgt_pltfrm: rest-api
1414
ms.topic: how-to
15-
ms.date: 04/05/2023
15+
ms.date: 12/01/2023
1616
ms.author: rolyon
1717
ms.reviewer: bagovind
1818

@@ -420,7 +420,7 @@ To create a custom role, use the [Role Definitions - Create Or Update](/rest/api
420420
421421
## Update a custom role
422422
423-
To update a custom role, use the [Role Definitions - Create Or Update](/rest/api/authorization/role-definitions/create-or-update) REST API. To call this API, you must be signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleDefinitions/write` permission on all the `assignableScopes`. Of the built-in roles, only [Owner](built-in-roles.md#owner) and [User Access Administrator](built-in-roles.md#user-access-administrator) include this permission.
423+
To update a custom role, use the [Role Definitions - Create Or Update](/rest/api/authorization/role-definitions/create-or-update) REST API. To call this API, you must be signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleDefinitions/write` permission on all the `assignableScopes`, such as [User Access Administrator](built-in-roles.md#user-access-administrator).
424424
425425
1. Use the [Role Definitions - List](/rest/api/authorization/role-definitions/list) or [Role Definitions - Get](/rest/api/authorization/role-definitions/get) REST API to get information about the custom role. For more information, see the earlier [List all custom role definitions](#list-all-custom-role-definitions) section.
426426

articles/role-based-access-control/custom-roles-template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: role-based-access-control
88
ms.topic: how-to
99
ms.workload: identity
10-
ms.date: 10/19/2022
10+
ms.date: 12/01/2023
1111
ms.author: rolyon
1212
ms.custom: devx-track-azurepowershell, devx-track-arm-template
1313
#Customer intent: As an IT admin, I want to create custom roles by using an Azure Resource Manager template so that I can start automating custom role processes.
@@ -29,7 +29,7 @@ If your environment meets the prerequisites and you're familiar with using ARM t
2929

3030
To create a custom role, you must have:
3131

32-
- Permissions to create custom roles, such as [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator).
32+
- Permissions to create custom roles, such as [User Access Administrator](built-in-roles.md#user-access-administrator).
3333

3434
You must use the following version:
3535

articles/role-based-access-control/delegate-role-assignments-examples.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.subservice: conditions
99
ms.topic: conceptual
1010
ms.workload: identity
1111
ms.custom: devx-track-azurepowershell
12-
ms.date: 11/29/2023
12+
ms.date: 12/01/2023
1313
ms.author: rolyon
1414
#Customer intent: As a dev, devops, or it admin, I want to learn about the conditions so that I write more complex conditions.
1515
---
@@ -684,7 +684,7 @@ New-AzRoleAssignment -ObjectId $principalId -Scope $scope -RoleDefinitionId $rol
684684

685685
## Example: Allow most roles, but don't allow others to assign roles
686686

687-
This condition allows a delegate to add or remove role assignments for all roles except the [Owner](built-in-roles.md#owner), [Role Based Access Control Administrator](built-in-roles.md#role-based-access-control-administrator-preview), and [User Access Administrator](built-in-roles.md#user-access-administrator) roles.
687+
This condition allows a delegate to add or remove role assignments for all roles except the [Owner](built-in-roles.md#owner), [Role Based Access Control Administrator](built-in-roles.md#role-based-access-control-administrator), and [User Access Administrator](built-in-roles.md#user-access-administrator) roles.
688688

689689
This condition is useful when you want to allow a delegate to assign most roles, but not allow the delegate to allow others to assign roles.
690690

@@ -716,7 +716,7 @@ To target both the add and remove role assignment actions, notice that you must
716716
> | Attribute | [Role definition ID](conditions-authorization-actions-attributes.md#role-definition-id) |
717717
> | Operator | [ForAnyOfAnyValues:GuidNotEquals](conditions-format.md#foranyofanyvalues) |
718718
> | Comparison | Value |
719-
> | Roles | [Owner](built-in-roles.md#owner)<br/>[Role Based Access Control Administrator](built-in-roles.md#role-based-access-control-administrator-preview)<br/>[User Access Administrator](built-in-roles.md#user-access-administrator) |
719+
> | Roles | [Owner](built-in-roles.md#owner)<br/>[Role Based Access Control Administrator](built-in-roles.md#role-based-access-control-administrator)<br/>[User Access Administrator](built-in-roles.md#user-access-administrator) |
720720
721721
> [!div class="mx-tableFixed"]
722722
> | Condition #2 | Setting |
@@ -726,7 +726,7 @@ To target both the add and remove role assignment actions, notice that you must
726726
> | Attribute | [Role definition ID](conditions-authorization-actions-attributes.md#role-definition-id) |
727727
> | Operator | [ForAnyOfAnyValues:GuidNotEquals](conditions-format.md#foranyofanyvalues) |
728728
> | Comparison | Value |
729-
> | Roles | [Owner](built-in-roles.md#owner)<br/>[Role Based Access Control Administrator](built-in-roles.md#role-based-access-control-administrator-preview)<br/>[User Access Administrator](built-in-roles.md#user-access-administrator) |
729+
> | Roles | [Owner](built-in-roles.md#owner)<br/>[Role Based Access Control Administrator](built-in-roles.md#role-based-access-control-administrator)<br/>[User Access Administrator](built-in-roles.md#user-access-administrator) |
730730
731731
```
732732
(

articles/role-based-access-control/delegate-role-assignments-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: role-based-access-control
88
ms.subservice: conditions
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 11/29/2023
11+
ms.date: 12/01/2023
1212
ms.author: rolyon
1313

1414
#Customer intent: As a dev, devops, or it admin, I want to delegate Azure role assignment management to other users who are closer to the decision, but want to limit the scope of the role assignments.
@@ -77,15 +77,15 @@ Here are some reasons why delegating role assignment management to others with c
7777

7878
Consider an example where Alice is an administrator with the User Access Administrator role for a subscription. Alice wants to grant Dara the ability to assign specific roles for specific groups. Alice doesn't want Dara to have any other role assignment permissions. The following diagram shows how Alice can delegate role assignment responsibilities to Dara with conditions.
7979

80-
1. Alice assigns the Role Based Access Control Administrator (Preview) role to Dara. Alice adds conditions so that Dara can only assign the Backup Contributor or Backup Reader roles to the Marketing and Sales groups.
80+
1. Alice assigns the Role Based Access Control Administrator role to Dara. Alice adds conditions so that Dara can only assign the Backup Contributor or Backup Reader roles to the Marketing and Sales groups.
8181
1. Dara can now assign the Backup Contributor or Backup Reader roles to the Marketing and Sales groups.
8282
1. If Dara attempts to assign other roles or assign any roles to different principals (such as a user or managed identity), the role assignment fails.
8383

8484
:::image type="content" source="./media/delegate-role-assignments-overview/delegate-role-assignments-conditions-steps.png" alt-text="Diagram that shows an example where Dara can only assign the Backup Contributor or Backup Reader roles to Marketing or Sales groups." lightbox="./media/delegate-role-assignments-overview/delegate-role-assignments-conditions-steps.png":::
8585

8686
## Role Based Access Control Administrator role
8787

88-
The [Role Based Access Control Administrator (Preview)](built-in-roles.md#role-based-access-control-administrator-preview) role is a built-in role that has been designed for delegating role assignment management to others. It has fewer permissions than [User Access Administrator](built-in-roles.md#user-access-administrator), which follows least privilege best practices. The Role Based Access Control Administrator role has following permissions:
88+
The [Role Based Access Control Administrator](built-in-roles.md#role-based-access-control-administrator) role is a built-in role that has been designed for delegating role assignment management to others. It has fewer permissions than [User Access Administrator](built-in-roles.md#user-access-administrator), which follows least privilege best practices. The Role Based Access Control Administrator role has following permissions:
8989

9090
- Create a role assignment at the specified scope
9191
- Delete a role assignment at the specified scope
@@ -125,9 +125,9 @@ To delegate role assignment management with conditions, you assign roles as you
125125

126126
1. Start a new role assignment
127127

128-
1. Select the [Role Based Access Control Administrator (Preview)](built-in-roles.md#role-based-access-control-administrator-preview) role
128+
1. Select the [Role Based Access Control Administrator](built-in-roles.md#role-based-access-control-administrator) role
129129

130-
You can select any role that includes the `Microsoft.Authorization/roleAssignments/write` action, but Role Based Access Control Administrator (Preview) has fewer permissions.
130+
You can select any role that includes the `Microsoft.Authorization/roleAssignments/write` action, but Role Based Access Control Administrator has fewer permissions.
131131

132132
1. Select the delegate
133133

0 commit comments

Comments
 (0)