Skip to content

Commit 62cb116

Browse files
authored
Merge pull request #212900 from rolyon/rolyon-rbac-role-assignments-portal-classic
[Azure RBAC] Role assignment classic updates
2 parents 0ab99ca + ef969e9 commit 62cb116

18 files changed

+34
-113
lines changed

articles/role-based-access-control/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@
4343
items:
4444
- name: Condition format
4545
href: conditions-format.md
46-
- name: Example conditions
46+
- name: Example conditions for Blob Storage
4747
href: ../storage/blobs/storage-auth-abac-examples.md?toc=/azure/role-based-access-control/toc.json
4848
- name: Conditions prerequisites
4949
href: conditions-prerequisites.md

articles/role-based-access-control/conditions-custom-security-attributes-example.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ There are several access control mechanisms that you could use to provide access
9393

9494
Access keys are a common way to provide access to data plane resources. Access keys provide read, write, and delete permissions to whoever possesses the access key. This means attackers can get access to your sensitive data if they can get your access keys. Access keys do not have identity binding, do not have an expiration, and are a security risk to store.
9595

96-
Like access keys, shared access signature (SAS) tokens do not have identity binding, but expire on a regularly basis. The lack of identity binding represents the same security risks as access keys do. You must manage the expiration to ensure that clients do not get errors. SAS tokens require additional code to manage and operate daily and can be a significant overhead for a DevOps team.
96+
Like access keys, shared access signature (SAS) tokens do not have identity binding, but expire on a regular basis. The lack of identity binding represents the same security risks as access keys do. You must manage the expiration to ensure that clients do not get errors. SAS tokens require additional code to manage and operate daily and can be a significant overhead for a DevOps team.
9797

9898
Azure RBAC provides centralized fine-grained access control. Azure RBAC has identity binding that reduces your security risk. Using conditions you can potentially scale the management of role assignments and make access control easier to maintain because access is based on flexible and dynamic attributes.
9999

@@ -113,7 +113,7 @@ If you have a similar scenario, follow these steps to see if you could potential
113113

114114
To use this solution, you must have:
115115

116-
- Multiple built-in or custom role assignments that have [storage blob data actions](../storage/blobs/storage-auth-abac-attributes.md). These include the following built-in roles:
116+
- Multiple built-in or custom role assignments that have [blob storage data actions](../storage/blobs/storage-auth-abac-attributes.md). These include the following built-in roles:
117117

118118
- [Storage Blob Data Contributor](built-in-roles.md#storage-blob-data-contributor)
119119
- [Storage Blob Data Owner](built-in-roles.md#storage-blob-data-owner)

articles/role-based-access-control/conditions-custom-security-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -368,4 +368,4 @@ You can also use Azure CLI to add role assignments conditions. The following com
368368
369369
- [What are custom security attributes in Azure AD? (Preview)](../active-directory/fundamentals/custom-security-attributes-overview.md)
370370
- [Azure role assignment condition format and syntax (preview)](conditions-format.md)
371-
- [Example Azure role assignment conditions (preview)](../storage/blobs/storage-auth-abac-examples.md?toc=/azure/role-based-access-control/toc.json)
371+
- [Example Azure role assignment conditions for Blob Storage (preview)](../storage/blobs/storage-auth-abac-examples.md?toc=/azure/role-based-access-control/toc.json)

articles/role-based-access-control/conditions-format.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: role-based-access-control
88
ms.subservice: conditions
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 07/21/2022
11+
ms.date: 09/28/2022
1212
ms.author: rolyon
1313

1414
#Customer intent: As a dev, devops, or it admin, I want to learn about the conditions so that I write more complex conditions.
@@ -243,7 +243,7 @@ Currently, conditions can be added to built-in or custom role assignments that h
243243
- [Storage Queue Data Message Sender](built-in-roles.md#storage-queue-data-message-sender)
244244
- [Storage Queue Data Reader](built-in-roles.md#storage-queue-data-reader)
245245

246-
For a list of the blob storage actions you can use in conditions, see [Actions and attributes for Azure role assignment conditions in Azure Storage (preview)](../storage/blobs/storage-auth-abac-attributes.md).
246+
For a list of the storage actions you can use in conditions, see [Actions and attributes for Azure role assignment conditions for Azure Blob Storage (preview)](../storage/blobs/storage-auth-abac-attributes.md) and [Actions and attributes for Azure role assignment conditions for Azure queues (preview)](../storage/queues/queues-auth-abac-attributes.md).
247247

248248
## Attributes
249249

@@ -260,7 +260,8 @@ Depending on the selected actions, the attribute might be found in different pla
260260

261261
For a list of the blob storage or queue storage attributes you can use in conditions, see:
262262

263-
- [Actions and attributes for Azure role assignment conditions in Azure Storage (preview)](../storage/blobs/storage-auth-abac-attributes.md)
263+
- [Actions and attributes for Azure role assignment conditions for Azure Blob Storage (preview)](../storage/blobs/storage-auth-abac-attributes.md)
264+
- [Actions and attributes for Azure role assignment conditions for Azure queues (preview)](../storage/queues/queues-auth-abac-attributes.md)
264265

265266
#### Principal attributes
266267

@@ -493,6 +494,5 @@ a AND (b OR c)
493494

494495
## Next steps
495496

496-
- [Example Azure role assignment conditions (preview)](../storage/blobs/storage-auth-abac-examples.md)
497-
- [Actions and attributes for Azure role assignment conditions in Azure Storage (preview)](../storage/blobs/storage-auth-abac-attributes.md)
497+
- [Example Azure role assignment conditions for Blob Storage (preview)](../storage/blobs/storage-auth-abac-examples.md)
498498
- [Add or edit Azure role assignment conditions using the Azure portal (preview)](conditions-role-assignments-portal.md)

articles/role-based-access-control/conditions-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Azure ABAC builds on Azure RBAC by adding role assignment conditions based on at
3333

3434
There are three primary benefits for using role assignment conditions:
3535

36-
- **Provide more fine-grained access control** - A role assignment uses a role definition with actions and data actions to grant a security principal permissions. You can write conditions to filter down those permissions for more fine-grained access control. You can also add conditions to specific actions. For example, you can grant John read access to blobs in your subscription only if the blobs are tagged as Project=Blue.
36+
- **Provide more fine-grained access control** - A role assignment uses a role definition with actions and data actions to grant security principal permissions. You can write conditions to filter down those permissions for more fine-grained access control. You can also add conditions to specific actions. For example, you can grant John read access to blobs in your subscription only if the blobs are tagged as Project=Blue.
3737
- **Help reduce the number of role assignments** - Each Azure subscription currently has a role assignment limit. There are scenarios that would require thousands of role assignments. All of those role assignments would have to be managed. In these scenarios, you could potentially add conditions to use significantly fewer role assignments.
3838
- **Use attributes that have specific business meaning** - Conditions allow you to use attributes that have specific business meaning to you in access control. Some examples of attributes are project name, software development stage, and classification levels. The values of these resource attributes are dynamic and change as users move across teams and projects.
3939

@@ -51,7 +51,7 @@ There are several scenarios where you might want to add a condition to your role
5151
- Read access to blobs with the tag Program=Alpine and a path of logs
5252
- Read access to blobs with the tag Project=Baker and the user has a matching attribute Project=Baker
5353

54-
For more information about how to create these examples, see [Examples of Azure role assignment conditions](../storage/blobs/storage-auth-abac-examples.md).
54+
For more information about how to create these examples, see [Example Azure role assignment conditions for Blob Storage](../storage/blobs/storage-auth-abac-examples.md).
5555

5656
## Where can conditions be added?
5757

@@ -147,5 +147,5 @@ Here are the known issues with conditions:
147147
## Next steps
148148

149149
- [FAQ for Azure role assignment conditions (preview)](conditions-faq.md)
150-
- [Example Azure role assignment conditions (preview)](../storage/blobs/storage-auth-abac-examples.md)
150+
- [Example Azure role assignment conditions for Blob Storage (preview)](../storage/blobs/storage-auth-abac-examples.md)
151151
- [Tutorial: Add a role assignment condition to restrict access to blobs using the Azure portal (preview)](../storage/blobs/storage-auth-abac-portal.md)

articles/role-based-access-control/conditions-prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,5 +61,5 @@ For more information about custom security attributes, see:
6161

6262
## Next steps
6363

64-
- [Example Azure role assignment conditions (preview)](../storage/blobs/storage-auth-abac-examples.md)
64+
- [Example Azure role assignment conditions for Blob Storage (preview)](../storage/blobs/storage-auth-abac-examples.md)
6565
- [Tutorial: Add a role assignment condition to restrict access to blobs using the Azure portal (preview)](../storage/blobs/storage-auth-abac-portal.md)

articles/role-based-access-control/conditions-role-assignments-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,6 @@ Alternatively, if you want to delete both the role assignment and the condition,
120120

121121
## Next steps
122122

123-
- [Example Azure role assignment conditions (preview)](../storage/blobs/storage-auth-abac-examples.md)
123+
- [Example Azure role assignment conditions for Blob Storage (preview)](../storage/blobs/storage-auth-abac-examples.md)
124124
- [Tutorial: Add a role assignment condition to restrict access to blobs using Azure CLI (preview)](../storage/blobs/storage-auth-abac-cli.md)
125125
- [Troubleshoot Azure role assignment conditions (preview)](conditions-troubleshoot.md)

articles/role-based-access-control/conditions-role-assignments-portal.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: role-based-access-control
88
ms.subservice: conditions
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 05/16/2022
11+
ms.date: 09/28/2022
1212
ms.author: rolyon
1313
ms.custom: subject-rbac-steps
1414
---
@@ -28,13 +28,17 @@ For information about the prerequisites to add or edit role assignment condition
2828

2929
## Step 1: Determine the condition you need
3030

31-
To determine the conditions you need, review the examples in [Example Azure role assignment conditions](../storage/blobs/storage-auth-abac-examples.md).
31+
To determine the conditions you need, review the examples in [Example Azure role assignment conditions for Blob Storage](../storage/blobs/storage-auth-abac-examples.md).
3232

33-
Currently, conditions can be added to built-in or custom role assignments that have [storage blob data actions](../storage/blobs/storage-auth-abac-attributes.md). These include the following built-in roles:
33+
Currently, conditions can be added to built-in or custom role assignments that have [blob storage data actions](../storage/blobs/storage-auth-abac-attributes.md) or [queue storage data actions](../storage/queues/queues-auth-abac-attributes.md). These include the following built-in roles:
3434

3535
- [Storage Blob Data Contributor](built-in-roles.md#storage-blob-data-contributor)
3636
- [Storage Blob Data Owner](built-in-roles.md#storage-blob-data-owner)
3737
- [Storage Blob Data Reader](built-in-roles.md#storage-blob-data-reader)
38+
- [Storage Queue Data Contributor](built-in-roles.md#storage-queue-data-contributor)
39+
- [Storage Queue Data Message Processor](built-in-roles.md#storage-queue-data-message-processor)
40+
- [Storage Queue Data Message Sender](built-in-roles.md#storage-queue-data-message-sender)
41+
- [Storage Queue Data Reader](built-in-roles.md#storage-queue-data-reader)
3842

3943
## Step 2: Choose how to add condition
4044

@@ -163,6 +167,6 @@ Once you have the Add role assignment condition page open, you can review the ba
163167

164168
## Next steps
165169

166-
- [Example Azure role assignment conditions (preview)](../storage/blobs/storage-auth-abac-examples.md)
170+
- [Example Azure role assignment conditions for Blob Storage (preview)](../storage/blobs/storage-auth-abac-examples.md)
167171
- [Tutorial: Add a role assignment condition to restrict access to blobs using the Azure portal (preview)](../storage/blobs/storage-auth-abac-portal.md)
168172
- [Troubleshoot Azure role assignment conditions (preview)](conditions-troubleshoot.md)

articles/role-based-access-control/conditions-role-assignments-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,6 +180,6 @@ Alternatively, if you want to delete both the role assignment and the condition,
180180

181181
## Next steps
182182

183-
- [Example Azure role assignment conditions (preview)](../storage/blobs/storage-auth-abac-examples.md)
183+
- [Example Azure role assignment conditions for Blob Storage (preview)](../storage/blobs/storage-auth-abac-examples.md)
184184
- [Tutorial: Add a role assignment condition to restrict access to blobs using Azure PowerShell (preview)](../storage/blobs/storage-auth-abac-powershell.md)
185185
- [Troubleshoot Azure role assignment conditions (preview)](conditions-troubleshoot.md)

articles/role-based-access-control/conditions-role-assignments-rest.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,6 @@ Alternatively, if you want to delete both the role assignment and the condition,
127127

128128
## Next steps
129129

130-
- [Example Azure role assignment conditions (preview)](../storage/blobs/storage-auth-abac-examples.md)
130+
- [Example Azure role assignment conditions for Blob Storage (preview)](../storage/blobs/storage-auth-abac-examples.md)
131131
- [Tutorial: Add a role assignment condition to restrict access to blobs using the Azure portal (preview)](../storage/blobs/storage-auth-abac-portal.md)
132132
- [Troubleshoot Azure role assignment conditions (preview)](conditions-troubleshoot.md)

0 commit comments

Comments
 (0)