You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/best-practices.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: amycolannino
7
7
ms.service: role-based-access-control
8
8
ms.topic: conceptual
9
9
ms.workload: identity
10
-
ms.date: 11/29/2023
10
+
ms.date: 01/30/2024
11
11
ms.author: rolyon
12
12
13
13
#Customer intent: As a dev, devops, or it admin, I want to learn how to best use Azure RBAC.
@@ -40,7 +40,7 @@ Some roles are identified as [privileged administrator roles](./role-assignments
40
40
- Remove unnecessary privileged role assignments.
41
41
- Avoid assigning a privileged administrator role when a [job function role](./role-assignments-steps.md#job-function-roles) can be used instead.
42
42
- If you must assign a privileged administrator role, use a narrow scope, such as resource group or resource, instead of a broader scope, such as management group or subscription.
43
-
- If you are assigning a role with permission to create role assignments, consider adding a condition to constrain the role assignment. For more information, see [Delegate Azure role assignment management to others with conditions (preview)](delegate-role-assignments-portal.md).
43
+
- If you are assigning a role with permission to create role assignments, consider adding a condition to constrain the role assignment. For more information, see [Delegate Azure role assignment management to others with conditions](delegate-role-assignments-portal.md).
44
44
45
45
For more information, see [List or manage privileged administrator role assignments](./role-assignments-list-portal.md#list-or-manage-privileged-administrator-role-assignments).
Copy file name to clipboardExpand all lines: articles/role-based-access-control/conditions-authorization-actions-attributes.md
+5-9Lines changed: 5 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Authorization actions and attributes (preview)
2
+
title: Authorization actions and attributes
3
3
description: Supported actions and attributes for Azure role assignment conditions and Azure attribute-based access control (Azure ABAC) in authorization
#Customer intent: As a dev, devops, or it admin, I want to
15
15
---
16
16
17
-
# Authorization actions and attributes (preview)
18
-
19
-
> [!IMPORTANT]
20
-
> Delegating Azure role assignment management with conditions is currently in PREVIEW.
21
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17
+
# Authorization actions and attributes
22
18
23
19
## Authorization actions
24
20
@@ -94,5 +90,5 @@ This section lists the authorization attributes you can use in your condition ex
94
90
95
91
## Next steps
96
92
97
-
-[Examples to delegate Azure role assignment management with conditions (preview)](delegate-role-assignments-examples.md)
98
-
-[Delegate Azure role assignment management to others with conditions (preview)](delegate-role-assignments-portal.md)
93
+
-[Examples to delegate Azure role assignment management with conditions](delegate-role-assignments-examples.md)
94
+
-[Delegate Azure role assignment management to others with conditions](delegate-role-assignments-portal.md)
Copy file name to clipboardExpand all lines: articles/role-based-access-control/delegate-role-assignments-examples.md
+6-10Lines changed: 6 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Examples to delegate Azure role assignment management with conditions (preview) - Azure ABAC
2
+
title: Examples to delegate Azure role assignment management with conditions - Azure ABAC
3
3
description: Examples to delegate Azure role assignment management to other users by using Azure attribute-based access control (Azure ABAC).
4
4
services: active-directory
5
5
author: rolyon
@@ -9,16 +9,12 @@ ms.subservice: conditions
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
11
ms.custom: devx-track-azurepowershell
12
-
ms.date: 12/01/2023
12
+
ms.date: 01/30/2024
13
13
ms.author: rolyon
14
14
#Customer intent: As a dev, devops, or it admin, I want to learn about the conditions so that I write more complex conditions.
15
15
---
16
16
17
-
# Examples to delegate Azure role assignment management with conditions (preview)
18
-
19
-
> [!IMPORTANT]
20
-
> Delegating Azure role assignment management with conditions is currently in PREVIEW.
21
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17
+
# Examples to delegate Azure role assignment management with conditions
22
18
23
19
This article lists examples of how to delegate Azure role assignment management to other users with conditions.
#Customer intent: As a dev, devops, or it admin, I want to delegate Azure role assignment management to other users who are closer to the decision, but want to limit the scope of the role assignments.
@@ -52,11 +52,7 @@ Here are the primary issues with the current method of delegating role assignmen
52
52
53
53
Instead of assigning the Owner or User Access Administrator roles, a more secure method is to constrain a delegate's ability to create role assignments.
54
54
55
-
## A more secure method: Delegate role assignment management with conditions (preview)
56
-
57
-
> [!IMPORTANT]
58
-
> Delegating Azure role assignment management with conditions is currently in PREVIEW.
59
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
55
+
## A more secure method: Delegate role assignment management with conditions
60
56
61
57
Delegating role assignment management with conditions is a way to restrict the role assignments a user can create. In the preceding example, Alice can allow Dara to create some role assignments on her behalf, but not all role assignments. For example, Alice can constrain the roles that Dara can assign and constrain the principals that Dara can assign roles to. This delegation with conditions is sometimes referred to as *constrained delegation* and is implemented using [Azure attribute-based access control (Azure ABAC) conditions](conditions-overview.md).
62
58
@@ -141,15 +137,15 @@ To delegate role assignment management with conditions, you assign roles as you
141
137
142
138
Choose from a list of condition templates. Select **Configure** to specify the roles, principal types, or principals.
143
139
144
-
For more information, see [Delegate Azure role assignment management to others with conditions (preview)](delegate-role-assignments-portal.md).
140
+
For more information, see [Delegate Azure role assignment management to others with conditions](delegate-role-assignments-portal.md).
145
141
146
142
:::image type="content" source="./media/shared/condition-templates.png" alt-text="Screenshot of Add role assignment condition with a list of condition templates." lightbox="./media/shared/condition-templates.png":::
147
143
148
144
# [Condition editor](#tab/condition-editor)
149
145
150
146
If the condition templates don't work for your scenario or if you want more control, you can use the condition editor.
151
147
152
-
For examples, see [Examples to delegate Azure role assignment management with conditions (preview)](delegate-role-assignments-examples.md).
148
+
For examples, see [Examples to delegate Azure role assignment management with conditions](delegate-role-assignments-examples.md).
153
149
154
150
:::image type="content" source="./media/shared/delegate-role-assignments-expression.png" alt-text="Screenshot of condition editor in Azure portal showing a role assignment condition to delegate role assignment management." lightbox="./media/shared/delegate-role-assignments-expression.png":::
155
151
@@ -248,7 +244,9 @@ To delegate role assignment management with conditions, you assign roles as you
248
244
249
245
## Built-in roles with conditions
250
246
251
-
The [Key Vault Data Access Administrator](built-in-roles.md#key-vault-data-access-administrator) role already has a built-in condition to constrain role assignments. This role enables you to manage access to Key Vault secrets, certificates, and keys. It's exclusively focused on access control without the ability to assign privileged roles such as Owner or User Access Administrator roles. It allows better separation of duties for scenarios like managing encryption at rest across data services to further comply with least privilege principle. The condition constrains role assignments to the following Azure Key Vault roles:
247
+
The [Key Vault Data Access Administrator](built-in-roles.md#key-vault-data-access-administrator) and [Virtual Machine Data Access Administrator (preview)](built-in-roles.md#virtual-machine-data-access-administrator-preview) roles already have a built-in condition to constrain role assignments.
248
+
249
+
The Key Vault Data Access Administrator role enables you to manage access to Key Vault secrets, certificates, and keys. It's exclusively focused on access control without the ability to assign privileged roles such as Owner or User Access Administrator roles. It allows better separation of duties for scenarios like managing encryption at rest across data services to further comply with least privilege principle. The condition constrains role assignments to the following Azure Key Vault roles:
@@ -267,18 +265,17 @@ If you want to further constrain the Key Vault Data Access Administrator role as
267
265
268
266
## Known issues
269
267
270
-
Here are the known issues related to delegating role assignment management with conditions (preview):
268
+
Here are the known issues related to delegating role assignment management with conditions:
271
269
272
270
- You can't delegate role assignment management with conditions using [Privileged Identity Management](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md).
273
271
- You can't have a role assignment with a Microsoft.Storage data action and an ABAC condition that uses a GUID comparison operator. For more information, see [Troubleshoot Azure RBAC](troubleshooting.md#symptom---authorization-failed).
274
-
- This preview isn't available in Azure Government or Microsoft Azure operated by 21Vianet.
275
272
276
273
## License requirements
277
274
278
275
[!INCLUDE [Azure AD free license](../../includes/active-directory-free-license.md)]
279
276
280
277
## Next steps
281
278
282
-
- [Delegate Azure role assignment management to others with conditions (preview)](delegate-role-assignments-portal.md)
279
+
- [Delegate Azure role assignment management to others with conditions](delegate-role-assignments-portal.md)
283
280
- [What is Azure attribute-based access control (Azure ABAC)?](conditions-overview.md)
284
-
- [Examples to delegate Azure role assignment management with conditions (preview)](delegate-role-assignments-examples.md)
281
+
- [Examples to delegate Azure role assignment management with conditions](delegate-role-assignments-examples.md)
#Customer intent: As a dev, devops, or it admin, I want to delegate Azure role assignment management to other users who are closer to the decision, but want to limit the scope of the role assignments.
15
15
---
16
16
17
-
# Delegate Azure role assignment management to others with conditions (preview)
18
-
19
-
> [!IMPORTANT]
20
-
> Delegating Azure role assignment management with conditions is currently in PREVIEW.
21
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17
+
# Delegate Azure role assignment management to others with conditions
22
18
23
19
As an administrator, you might get several requests to grant access to Azure resources that you want to delegate to someone else. You could assign a user the [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator) roles, but these are highly privileged roles. This article describes a more secure way to [delegate role assignment management](delegate-role-assignments-overview.md) to other users in your organization, but add restrictions for those role assignments. For example, you can constrain the roles that can be assigned or constrain the principals the roles can be assigned to.
24
20
@@ -39,7 +35,7 @@ To help determine the permissions the delegate needs, answer the following quest
39
35
- Which principals can the delegate assign roles to?
40
36
- Can delegate remove any role assignments?
41
37
42
-
Once you know the permissions that delegate needs, you use the following steps to add a condition to the delegate's role assignment. For example conditions, see [Examples to delegate Azure role assignment management with conditions (preview)](delegate-role-assignments-examples.md).
38
+
Once you know the permissions that delegate needs, you use the following steps to add a condition to the delegate's role assignment. For example conditions, see [Examples to delegate Azure role assignment management with conditions](delegate-role-assignments-examples.md).
43
39
44
40
## Step 2: Start a new role assignment
45
41
@@ -63,16 +59,11 @@ There are two ways that you can add a condition. You can use a condition templat
63
59
64
60
# [Template](#tab/template)
65
61
66
-
1. On the **Conditions** tab under **Delegation type**, select the **Constrained (recommended)** option.
67
-
68
-
| Option | Select this option to |
69
-
| --- | --- |
70
-
|**Constrained (recommended)**| Pick the roles or principals the user can use in role assignments |
71
-
|**Not constrained**| Allow the user to assign any role to any principal |
62
+
1. On the **Conditions** tab under **What user can do**, select the **Allow user to only assign selected roles to selected principals (fewer privileges)** option.
72
63
73
-
:::image type="content" source="./media/shared/condition-constrained.png" alt-text="Screenshot of Add role assignment with the Constrained option selected." lightbox="./media/shared/condition-constrained.png":::
64
+
:::image type="content" source="./media/shared/condition-constrained.png" alt-text="Screenshot of Add role assignment with the constrained option selected." lightbox="./media/shared/condition-constrained.png":::
74
65
75
-
1. Select **Add condition**.
66
+
1. Select **Select roles and principals**.
76
67
77
68
The Add role assignment condition page appears with a list of condition templates.
78
69
@@ -82,13 +73,13 @@ There are two ways that you can add a condition. You can use a condition templat
82
73
83
74
| Condition template | Select this template to |
84
75
| --- | --- |
85
-
| Constrain roles |Constrain the roles a user can assign|
86
-
| Constrain roles and principal types |Constrain the roles a user can assign and the types of principals the user can assign roles to|
87
-
| Constrain roles and principals |Constrain the roles a user can assign and the principals the user can assign roles to |
76
+
| Constrain roles |Allow user to only assign roles you select|
77
+
| Constrain roles and principal types |Allow user to only assign roles you select<br/>Allow user to only assign these roles to principal types you select (users, groups, or service principals)|
78
+
| Constrain roles and principals |Allow user to only assign roles you select<br/>Allow user to only assign these roles to principals you select|
88
79
89
80
1. In the configure pane, add the required configurations.
90
81
91
-
:::image type="content" source="./media/delegate-role-assignments-portal/condition-template-configure-pane.png" alt-text="Screenshot of configure pane for a condition with selection added." lightbox="./media/delegate-role-assignments-portal/condition-template-configure-pane.png":::
82
+
:::image type="content" source="./media/shared/condition-template-configure-pane.png" alt-text="Screenshot of configure pane for a condition with selection added." lightbox="./media/shared/condition-template-configure-pane.png":::
92
83
93
84
1. Select **Save** to add the condition to the role assignment.
94
85
@@ -98,16 +89,11 @@ If the condition templates don't work for your scenario or if you want more cont
98
89
99
90
### Open condition editor
100
91
101
-
1. On the **Conditions** tab under **Delegation type**, select the **Constrained (recommended)** option.
102
-
103
-
| Option | Select this option to |
104
-
| --- | --- |
105
-
|**Constrained (recommended)**| Pick the roles or principals the user can use in role assignments |
106
-
|**Not constrained**| Allow the user to assign any role to any principal |
92
+
1. On the **Conditions** tab under **What user can do**, select the **Allow user to only assign selected roles to selected principals (fewer privileges)** option.
107
93
108
94
:::image type="content" source="./media/shared/condition-constrained.png" alt-text="Screenshot of Add role assignment with the Constrained option selected." lightbox="./media/shared/condition-constrained.png":::
109
95
110
-
1. Select **Add condition**.
96
+
1. Select **Select roles and principals**.
111
97
112
98
The Add role assignment condition page appears with a list of condition templates.
0 commit comments