You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/blobs/storage-auth-abac-attributes.md
+3-81Lines changed: 3 additions & 81 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
-
title: Actions and attributes for Azure role assignment conditions in Azure Storage (preview)
2
+
title: Actions and attributes for Azure role assignment conditions in Azure Storage
3
3
titleSuffix: Azure Storage
4
4
description: Supported actions and attributes for Azure role assignment conditions and Azure attribute-based access control (Azure ABAC) in Azure Storage.
5
5
services: storage
6
6
author: jimmart-dev
7
7
8
8
ms.service: storage
9
9
ms.topic: conceptual
10
-
ms.date: 09/01/2022
10
+
ms.date: 09/14/2022
11
11
ms.author: jammart
12
12
ms.reviewer: nachakra
13
13
ms.subservice: blobs
@@ -17,6 +17,7 @@ ms.subservice: blobs
17
17
18
18
> [!IMPORTANT]
19
19
> Azure ABAC and Azure role assignment conditions are currently in preview.
20
+
>
20
21
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
21
22
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
22
23
@@ -294,70 +295,6 @@ This section lists the supported Azure Blob storage actions and suboperations yo
294
295
> | **Examples** | [Example: Read, write, or delete blobs in named containers](storage-auth-abac-examples.md#example-read-write-or-delete-blobs-in-named-containers)<br/>[Example: Read blobs in named containers with a path](storage-auth-abac-examples.md#example-read-blobs-in-named-containers-with-a-path)<br/>[Example: Read or list blobs in named containers with a path](storage-auth-abac-examples.md#example-read-or-list-blobs-in-named-containers-with-a-path)<br/>[Example: Write blobs in named containers with a path](storage-auth-abac-examples.md#example-write-blobs-in-named-containers-with-a-path)<br/>[Example: Read only current blob versions](storage-auth-abac-examples.md#example-read-only-current-blob-versions)<br/>[Example: Read current blob versions and any blob snapshots](storage-auth-abac-examples.md#example-read-current-blob-versions-and-any-blob-snapshots)<br/>[Example: Read only storage accounts with hierarchical namespace enabled](storage-auth-abac-examples.md#example-read-only-storage-accounts-with-hierarchical-namespace-enabled) |
295
296
> |**Learn more**|[Azure Data Lake Storage Gen2 hierarchical namespace](../blobs/data-lake-storage-namespace.md)|
296
297
297
-
## Azure Queue storage actions
298
-
299
-
This section lists the supported Azure Queue storage actions you can target for conditions.
300
-
301
-
### Peek messages
302
-
303
-
> [!div class="mx-tdCol2BreakAll"]
304
-
> | Property | Value |
305
-
> | --- | --- |
306
-
> |**Display name**| Peek messages |
307
-
> |**Description**| DataAction for peeking messages. |
This section lists the Azure Blob storage attributes you can use in your condition expressions depending on the action you target. If you select multiple actions for a single condition, there might be fewer attributes to choose from for your condition because the attributes must be available across the selected actions.
@@ -518,21 +455,6 @@ This section lists the Azure Blob storage attributes you can use in your conditi
518
455
> |**Examples**|`@Request[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:versionId] DateTimeEquals '2022-06-01T23:38:32.8883645Z'`<br/>[Example: Read current blob versions and a specific blob version](storage-auth-abac-examples.md#example-read-current-blob-versions-and-a-specific-blob-version)<br/>[Example: Read current blob versions and any blob snapshots](storage-auth-abac-examples.md#example-read-current-blob-versions-and-any-blob-snapshots)|
519
456
> |**Learn more**|[Azure Data Lake Storage Gen2 hierarchical namespace](../blobs/data-lake-storage-namespace.md)|
520
457
521
-
## Azure Queue storage attributes
522
-
523
-
This section lists the Azure Queue storage attributes you can use in your condition expressions depending on the action you target.
Copy file name to clipboardExpand all lines: articles/storage/blobs/storage-auth-abac.md
+7-10Lines changed: 7 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
2
title: Authorize access to blobs using Azure role assignment conditions (preview)
3
3
titleSuffix: Azure Storage
4
-
description: Authorize access to Azure blobs using Azure role assignment conditions and Azure attribute-based access control (Azure ABAC). Define conditions on role assignments using Storage attributes.
4
+
description: Authorize access to Azure blobs and Azure Data Lake Storage Gen2 (ADLS G2) using Azure role assignment conditions and Azure attribute-based access control (Azure ABAC). Define conditions on role assignments using Storage attributes.
5
5
services: storage
6
6
author: jimmart-dev
7
7
8
8
ms.service: storage
9
9
ms.topic: conceptual
10
-
ms.date: 09/01/2022
10
+
ms.date: 09/14/2022
11
11
ms.author: jammart
12
12
ms.reviewer: nachakra
13
13
ms.subservice: blobs
@@ -17,6 +17,7 @@ ms.subservice: blobs
17
17
18
18
> [!IMPORTANT]
19
19
> Azure ABAC and Azure role assignment conditions are currently in preview.
20
+
>
20
21
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
21
22
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
22
23
@@ -26,22 +27,22 @@ Azure ABAC builds on Azure role-based access control (Azure RBAC) by adding [con
26
27
27
28
## Overview of conditions in Azure Storage
28
29
29
-
Azure Storage enables the [use of Azure Active Directory](../common/authorize-data-access.md) (Azure AD) to authorize requests to blob, queue, and table resources using Azure RBAC. Azure RBAC helps you manage access to resources by defining who has access to resources and what they can do with those resources, using role definitions and role assignments. Azure Storage defines a set of Azure [built-in roles](../../role-based-access-control/built-in-roles.md#storage) that encompass common sets of permissions used to access blob, queue and table data. You can also define custom roles with select set of permissions. Azure Storage supports role assignments for storage accounts or blob containers.
30
+
You can [use of Azure Active Directory](../common/authorize-data-access.md) (Azure AD) to authorize requests to Azure storage resources using Azure RBAC. Azure RBAC helps you manage access to resources by defining who has access to resources and what they can do with those resources, using role definitions and role assignments. Azure Storage defines a set of Azure [built-in roles](../../role-based-access-control/built-in-roles.md#storage) that encompass common sets of permissions used to access Azure storage data. You can also define custom roles with select sets of permissions. Azure Storage supports role assignments for both storage accounts and blob containers.
30
31
31
-
Azure ABAC builds on Azure RBAC by adding role assignment conditions in the context of specific actions. A *role assignment condition* is an additional check that is evaluated when the action on the storage resource is being authorized. This condition is expressed as a predicate using attributes associated with any of the following:
32
+
Azure ABAC builds on Azure RBAC by adding [role assignment conditions](../../role-based-access-control/conditions-overview.md) in the context of specific actions. A *role assignment condition* is an additional check that is evaluated when the action on the storage resource is being authorized. This condition is expressed as a predicate using attributes associated with any of the following:
32
33
- Security principal that is requesting authorization
33
34
- Resource to which access is being requested
34
35
- Parameters of the request
35
36
- Environment from which the request originates
36
37
37
38
The benefits of using role assignment conditions are:
38
39
-**Enable finer-grained access to resources** - For example, if you want to grant a user read access to blobs in your storage accounts only if the blobs are tagged as Project=Sierra, you can use conditions on the read action using tags as an attribute.
39
-
-**Reduce the number of role assignments you have to create and manage** - You can do this by using a generalized role assignment for a security group, and then restricting the access for individual members of the group using a condition that matches attributes of a principal with attributes of a specific resource being accessed (such as, a blob or a container).
40
+
-**Reduce the number of role assignments you have to create and manage** - You can do this by using a generalized role assignment for a security group, and then restricting the access for individual members of the group using a condition that matches attributes of a principal with attributes of a specific resource being accessed (such as a blob or a container).
40
41
-**Express access control rules in terms of attributes with business meaning** - For example, you can express your conditions using attributes that represent a project name, business application, organization function, or classification level.
41
42
42
43
The tradeoff of using conditions is that you need a structured and consistent taxonomy when using attributes across your organization. Attributes must be protected to prevent access from being compromised. Also, conditions must be carefully designed and reviewed for their effect.
43
44
44
-
Role-assignment conditions in Azure Storage are supported for blobs. You can use conditions with accounts that have the [hierarchical namespace](../blobs/data-lake-storage-namespace.md) (HNS) feature enabled on them. Conditions are currently not supported for queue, table, or file resources in Azure Storage.
45
+
Role-assignment conditions in Azure Storage are supported for Azure blob storage. You can also use conditions with accounts that have the [hierarchical namespace](../blobs/data-lake-storage-namespace.md) (HNS) feature enabled on them (ADLS G2).
45
46
46
47
47
48
## Supported attributes and operations
@@ -51,10 +52,6 @@ In this preview, you can add conditions to built-in roles or custom roles. The b
51
52
-[Storage Blob Data Reader](../../role-based-access-control/built-in-roles.md#storage-blob-data-reader)
52
53
-[Storage Blob Data Contributor](../../role-based-access-control/built-in-roles.md#storage-blob-data-contributor)
53
54
-[Storage Blob Data Owner](../../role-based-access-control/built-in-roles.md#storage-blob-data-owner).
54
-
-[Storage Queue Data Contributor](../../role-based-access-control/built-in-roles.md#storage-queue-data-contributor)
55
-
-[Storage Queue Data Message Processor](../../role-based-access-control/built-in-roles.md#storage-queue-data-message-processor)
56
-
-[Storage Queue Data Message Sender](../../role-based-access-control/built-in-roles.md#storage-queue-data-message-sender)
57
-
-[Storage Queue Data Reader](../../role-based-access-control/built-in-roles.md#storage-queue-data-reader)
58
55
59
56
You can use conditions with custom roles so long as the role includes [actions that support conditions](storage-auth-abac-attributes.md#azure-blob-storage-actions-and-suboperations).
0 commit comments