Skip to content

Commit 594e19d

Browse files
committed
Moved AssignableScopes text
1 parent dbc5e32 commit 594e19d

File tree

2 files changed

+6
-10
lines changed

2 files changed

+6
-10
lines changed

articles/role-based-access-control/custom-roles.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -156,18 +156,10 @@ The following table describes what the custom role properties mean.
156156
| `NotActions`</br>`notActions` | No | String[] | An array of strings that specifies the control plane actions that are excluded from the allowed `Actions`. For more information, see [NotActions](role-definitions.md#notactions). |
157157
| `DataActions`</br>`dataActions` | No | String[] | An array of strings that specifies the data plane actions that the role allows to be performed to your data within that object. If you create a custom role with `DataActions`, that role cannot be assigned at the management group scope. For more information, see [DataActions](role-definitions.md#dataactions). |
158158
| `NotDataActions`</br>`notDataActions` | No | String[] | An array of strings that specifies the data plane actions that are excluded from the allowed `DataActions`. For more information, see [NotDataActions](role-definitions.md#notdataactions). |
159-
| `AssignableScopes`</br>`assignableScopes` | Yes | String[] | An array of strings that specifies the scopes that the custom role is available for assignment. Maximum number of `AssignableScopes` is 2,000. |
159+
| `AssignableScopes`</br>`assignableScopes` | Yes | String[] | An array of strings that specifies the scopes that the custom role is available for assignment. Maximum number of `AssignableScopes` is 2,000. For more information, see [AssignableScopes](role-definitions.md#assignablescopes). |
160160

161161
Permission strings are case-insensitive. When you create your custom roles, the convention is to match the case that you see for permissions in [Azure resource provider operations](resource-provider-operations.md).
162162

163-
## AssignableScopes
164-
165-
You can define only one management group in `AssignableScopes` of a custom role. Adding a management group to `AssignableScopes` is currently in preview.
166-
167-
Although it's possible to create a custom role with a resource instance in `AssignableScopes` using the command line, it's not recommended. Each tenant supports a maximum of 5000 custom roles. Using this strategy could potentially exhaust your available custom roles. Ultimately, the level of access is determined by the custom role assignment (scope + role permissions + security principal) and not the `AssignableScopes` listed in the custom role. So, create your custom roles with `AssignableScopes` of management group, subscription, or resource group, but assign the custom roles with narrow scope, such as resource or resource group.
168-
169-
For more information, see [AssignableScopes](role-definitions.md#assignablescopes).
170-
171163
## Wildcard permissions
172164

173165
`Actions`, `NotActions`, `DataActions`, and `NotDataActions` support wildcards (`*`) to define permissions. A wildcard (`*`) extends a permission to everything that matches the action string you provide. For example, suppose that you wanted to add all the permissions related to Azure Cost Management and exports. You could add all of these action strings:

articles/role-based-access-control/role-definitions.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: karenhoran
88
ms.service: role-based-access-control
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 01/06/2022
11+
ms.date: 08/19/2022
1212
ms.author: rolyon
1313
ms.custom:
1414
---
@@ -349,6 +349,10 @@ Built-in roles have `AssignableScopes` set to the root scope (`"/"`). The root s
349349
> | Management group and a subscription | `"/providers/Microsoft.Management/managementGroups/{groupId1}", "/subscriptions/{subscriptionId1}",` |
350350
> | All scopes (applies only to built-in roles) | `"/"` |
351351
352+
You can define only one management group in `AssignableScopes` of a custom role. Adding a management group to `AssignableScopes` is currently in preview.
353+
354+
Although it's possible to create a custom role with a resource instance in `AssignableScopes` using the command line, it's not recommended. Each tenant supports a maximum of 5000 custom roles. Using this strategy could potentially exhaust your available custom roles. Ultimately, the level of access is determined by the custom role assignment (scope + role permissions + security principal) and not the `AssignableScopes` listed in the custom role. So, create your custom roles with `AssignableScopes` of management group, subscription, or resource group, but assign the custom roles with narrow scope, such as resource or resource group.
355+
352356
For information about `AssignableScopes` for custom roles, see [Azure custom roles](custom-roles.md).
353357

354358
## Next steps

0 commit comments

Comments
 (0)