Skip to content

Commit 514cf41

Browse files
committed
AssignableScopes and subscription example
1 parent aff677c commit 514cf41

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

articles/role-based-access-control/role-definitions.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -335,9 +335,13 @@ The following table shows two examples of the effective date plane permissions f
335335
336336
## AssignableScopes
337337

338-
The `AssignableScopes` property specifies the scopes (management groups, subscriptions, or resource groups) where this role definition can be assigned. You can make the role available for assignment in only the management groups, subscriptions, or resource groups that require it. You must use at least one management group, subscription, or resource group.
338+
The `AssignableScopes` property specifies the scopes (root, management group, subscriptions, or resource groups) where a role definition can be assigned. You can make a custom role available for assignment in only the management group, subscriptions, or resource groups that require it. You must use at least one management group, subscription, or resource group.
339339

340-
Built-in roles have `AssignableScopes` set to the root scope (`"/"`). The root scope indicates that the role is available for assignment in all scopes. Examples of valid assignable scopes include:
340+
If `AssignableScopes` is set to a subscription, that means that the custom role is available for assignment at subscription scope for the specified subscription, resource group scope for any resource group in the subscription, or resource scope for any resource in the subscription.
341+
342+
Built-in roles have `AssignableScopes` set to the root scope (`"/"`). The root scope indicates that the role is available for assignment in all scopes.
343+
344+
Examples of valid assignable scopes include:
341345

342346
> [!div class="mx-tableFixed"]
343347
> | Role is available for assignment | Example |
@@ -353,7 +357,7 @@ You can define only one management group in `AssignableScopes` of a custom role.
353357

354358
Although it's possible to create a custom role with a resource instance in `AssignableScopes` using the command line, it's not recommended. Each tenant supports a maximum of 5000 custom roles. Using this strategy could potentially exhaust your available custom roles. Ultimately, the level of access is determined by the custom role assignment (scope + role permissions + security principal) and not the `AssignableScopes` listed in the custom role. So, create your custom roles with `AssignableScopes` of management group, subscription, or resource group, but assign the custom roles with narrow scope, such as resource or resource group.
355359

356-
For information about `AssignableScopes` for custom roles, see [Azure custom roles](custom-roles.md).
360+
For more information about `AssignableScopes` for custom roles, see [Azure custom roles](custom-roles.md).
357361

358362
## Next steps
359363

0 commit comments

Comments
 (0)