Skip to content

Commit 5590a4f

Browse files
committed
Removed best practice section
1 parent 7fe6635 commit 5590a4f

File tree

1 file changed

+1
-9
lines changed

1 file changed

+1
-9
lines changed

articles/role-based-access-control/overview.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang: na
1212
ms.topic: overview
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 03/19/2020
15+
ms.date: 04/17/2020
1616
ms.author: rolyon
1717
ms.reviewer: bagovind
1818

@@ -34,14 +34,6 @@ Here are some examples of what you can do with RBAC:
3434
- Allow a user to manage all resources in a resource group, such as virtual machines, websites, and subnets
3535
- Allow an application to access all resources in a resource group
3636

37-
## Best practice for using RBAC
38-
39-
Using RBAC, you can segregate duties within your team and grant only the amount of access to users that they need to perform their jobs. Instead of giving everybody unrestricted permissions in your Azure subscription or resources, you can allow only certain actions at a particular scope.
40-
41-
When planning your access control strategy, it's a best practice to grant users the least privilege to get their work done. The following diagram shows a suggested pattern for using RBAC.
42-
43-
![RBAC and least privilege](./media/overview/rbac-least-privilege.png)
44-
4537
## How RBAC works
4638

4739
The way you control access to resources using RBAC is to create role assignments. This is a key concept to understand – it's how permissions are enforced. A role assignment consists of three elements: security principal, role definition, and scope.

0 commit comments

Comments
 (0)