Skip to content

Commit 69b24ae

Browse files
committed
Update RBAC
1 parent 094b887 commit 69b24ae

16 files changed

+38
-38
lines changed

articles/role-based-access-control/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
items:
44
- name: Overview
55
items:
6-
- name: What is RBAC?
6+
- name: What is Azure RBAC?
77
href: overview.md
88
- name: Understand the different roles
99
href: rbac-and-directory-admin-roles.md
@@ -100,7 +100,7 @@
100100
href: built-in-roles.md
101101
- name: Resource provider operations
102102
href: resource-provider-operations.md
103-
- name: RBAC limits
103+
- name: Azure RBAC limits
104104
href: ../azure-resource-manager/management/azure-subscription-service-limits.md#role-based-access-control-limits
105105
- name: Azure PowerShell
106106
href: /powershell/module/az.resources

articles/role-based-access-control/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ landingContent:
2323
linkLists:
2424
- linkListType: overview
2525
links:
26-
- text: What is RBAC?
26+
- text: What is Azure RBAC?
2727
url: overview.md
2828
- text: Understand the different roles
2929
url: rbac-and-directory-admin-roles.md
@@ -46,7 +46,7 @@ landingContent:
4646
url: tutorial-role-assignments-group-powershell.md
4747
- linkListType: learn
4848
links:
49-
- text: Secure your Azure resources with RBAC
49+
- text: Secure your Azure resources with Azure RBAC
5050
url: https://docs.microsoft.com/learn/modules/secure-azure-resources-with-rbac/
5151
# Card
5252
- title: Manage access

articles/role-based-access-control/overview.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -23,18 +23,18 @@ ms.reviewer: bagovind
2323

2424
Access management for cloud resources is a critical function for any organization that is using the cloud. Azure role-based access control (Azure RBAC) helps you manage who has access to Azure resources, what they can do with those resources, and what areas they have access to.
2525

26-
RBAC is an authorization system built on [Azure Resource Manager](../azure-resource-manager/management/overview.md) that provides fine-grained access management of Azure resources.
26+
Azure RBAC is an authorization system built on [Azure Resource Manager](../azure-resource-manager/management/overview.md) that provides fine-grained access management of Azure resources.
2727

28-
## What can I do with RBAC?
28+
## What can I do with Azure RBAC?
2929

30-
Here are some examples of what you can do with RBAC:
30+
Here are some examples of what you can do with Azure RBAC:
3131

3232
- Allow one user to manage virtual machines in a subscription and another user to manage virtual networks
3333
- Allow a DBA group to manage SQL databases in a subscription
3434
- Allow a user to manage all resources in a resource group, such as virtual machines, websites, and subnets
3535
- Allow an application to access all resources in a resource group
3636

37-
## How RBAC works
37+
## How Azure RBAC works
3838

3939
The way you control access to resources using Azure RBAC is to create role assignments. This is a key concept to understand – it's how permissions are enforced. A role assignment consists of three elements: security principal, role definition, and scope.
4040

@@ -92,17 +92,17 @@ You can create role assignments using the Azure portal, Azure CLI, Azure PowerSh
9292

9393
## Multiple role assignments
9494

95-
So what happens if you have multiple overlapping role assignments? RBAC is an additive model, so your effective permissions are the sum of your role assignments. Consider the following example where a user is granted the Contributor role at the subscription scope and the Reader role on a resource group. The sum of the Contributor permissions and the Reader permissions is effectively the Contributor role for the resource group. Therefore, in this case, the Reader role assignment has no impact.
95+
So what happens if you have multiple overlapping role assignments? Azure RBAC is an additive model, so your effective permissions are the sum of your role assignments. Consider the following example where a user is granted the Contributor role at the subscription scope and the Reader role on a resource group. The sum of the Contributor permissions and the Reader permissions is effectively the Contributor role for the resource group. Therefore, in this case, the Reader role assignment has no impact.
9696

9797
![Multiple role assignments](./media/overview/rbac-multiple-roles.png)
9898

9999
## Deny assignments
100100

101-
Previously, RBAC was an allow-only model with no deny, but now RBAC supports deny assignments in a limited way. Similar to a role assignment, a *deny assignment* attaches a set of deny actions to a user, group, service principal, or managed identity at a particular scope for the purpose of denying access. A role assignment defines a set of actions that are *allowed*, while a deny assignment defines a set of actions that are *not allowed*. In other words, deny assignments block users from performing specified actions even if a role assignment grants them access. Deny assignments take precedence over role assignments. For more information, see [Understand deny assignments for Azure resources](deny-assignments.md).
101+
Previously, Azure RBAC was an allow-only model with no deny, but now Azure RBAC supports deny assignments in a limited way. Similar to a role assignment, a *deny assignment* attaches a set of deny actions to a user, group, service principal, or managed identity at a particular scope for the purpose of denying access. A role assignment defines a set of actions that are *allowed*, while a deny assignment defines a set of actions that are *not allowed*. In other words, deny assignments block users from performing specified actions even if a role assignment grants them access. Deny assignments take precedence over role assignments. For more information, see [Understand deny assignments for Azure resources](deny-assignments.md).
102102

103-
## How RBAC determines if a user has access to a resource
103+
## How Azure RBAC determines if a user has access to a resource
104104

105-
The following are the high-level steps that RBAC uses to determine if you have access to a resource on the management plane. This is helpful to understand if you are trying to troubleshoot an access issue.
105+
The following are the high-level steps that Azure RBAC uses to determine if you have access to a resource on the management plane. This is helpful to understand if you are trying to troubleshoot an access issue.
106106

107107
1. A user (or service principal) acquires a token for Azure Resource Manager.
108108

articles/role-based-access-control/quickstart-assign-role-user-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Tutorial: Grant user access to Azure resources with RBAC and the Azure portal "
2+
title: "Tutorial: Grant user access to Azure resources with Azure RBAC and the Azure portal "
33
description: In this tutorial, learn how to grant a user access to Azure resources using Azure role-based access control (Azure RBAC) in the Azure portal.
44
services: role-based-access-control
55
documentationCenter: ''
@@ -57,7 +57,7 @@ Sign in to the Azure portal at https://portal.azure.com.
5757

5858
## Grant access
5959

60-
In RBAC, to grant access, you create a role assignment.
60+
In Azure RBAC, to grant access, you create a role assignment.
6161

6262
1. In the list of **Resource groups**, click the new **rbac-resource-group** resource group.
6363

@@ -87,7 +87,7 @@ In RBAC, to grant access, you create a role assignment.
8787

8888
## Remove access
8989

90-
In RBAC, to remove access, you remove a role assignment.
90+
In Azure RBAC, to remove access, you remove a role assignment.
9191

9292
1. In the list of role assignments, add a checkmark next to the user with the Virtual Machine Contributor role.
9393

articles/role-based-access-control/rbac-and-directory-admin-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ If you are new to Azure, you may find it a little challenging to understand all
2727

2828
## How the roles are related
2929

30-
To better understand roles in Azure, it helps to know some of the history. When Azure was initially released, access to resources was managed with just three administrator roles: Account Administrator, Service Administrator, and Co-Administrator. Later, Azure role-based access control (Azure RBAC) was added. Azure RBAC is a newer authorization system that provides fine-grained access management to Azure resources. RBAC includes many built-in roles, can be assigned at different scopes, and allows you to create your own custom roles. To manage resources in Azure AD, such as users, groups, and domains, there are several Azure AD administrator roles.
30+
To better understand roles in Azure, it helps to know some of the history. When Azure was initially released, access to resources was managed with just three administrator roles: Account Administrator, Service Administrator, and Co-Administrator. Later, Azure role-based access control (Azure RBAC) was added. Azure RBAC is a newer authorization system that provides fine-grained access management to Azure resources. Azure RBAC includes many built-in roles, can be assigned at different scopes, and allows you to create your own custom roles. To manage resources in Azure AD, such as users, groups, and domains, there are several Azure AD administrator roles.
3131

3232
The following diagram is a high-level view of how the classic subscription administrator roles, Azure roles, and Azure AD administrator roles are related.
3333

@@ -77,7 +77,7 @@ Azure RBAC is an authorization system built on [Azure Resource Manager](../azure
7777

7878
The rest of the built-in roles allow management of specific Azure resources. For example, the [Virtual Machine Contributor](built-in-roles.md#virtual-machine-contributor) role allows the user to create and manage virtual machines. For a list of all the built-in roles, see [Azure built-in roles](built-in-roles.md).
7979

80-
Only the Azure portal and the Azure Resource Manager APIs support RBAC. Users, groups, and applications that are assigned Azure roles cannot use the [Azure classic deployment model APIs](../azure-resource-manager/management/deployment-models.md).
80+
Only the Azure portal and the Azure Resource Manager APIs support Azure RBAC. Users, groups, and applications that are assigned Azure roles cannot use the [Azure classic deployment model APIs](../azure-resource-manager/management/deployment-models.md).
8181

8282
In the Azure portal, role assignments using Azure RBAC appear on the **Access control (IAM)** blade. This blade can be found throughout the portal, such as management groups, subscriptions, resource groups, and various resources.
8383

articles/role-based-access-control/role-assignments-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ az ad sp list --display-name "{name}" --query [].objectId --output tsv
5757

5858
## Add a role assignment
5959

60-
In RBAC, to grant access, you add a role assignment.
60+
In Azure RBAC, to grant access, you add a role assignment.
6161

6262
### User at a resource group scope
6363

@@ -182,7 +182,7 @@ az role assignment create --role "Virtual Machine Contributor" --assignee-object
182182

183183
## Remove a role assignment
184184

185-
In RBAC, to remove access, you remove a role assignment by using [az role assignment delete](/cli/azure/role/assignment#az-role-assignment-delete):
185+
In Azure RBAC, to remove access, you remove a role assignment by using [az role assignment delete](/cli/azure/role/assignment#az-role-assignment-delete):
186186

187187
```azurecli
188188
az role assignment delete --assignee <assignee> --role <role_name_or_id> --resource-group <resource_group>

articles/role-based-access-control/role-assignments-external-users.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Add or remove role assignments for external users with RBAC and the Azure portal
2+
title: Add or remove role assignments for external users with Azure RBAC and the Azure portal
33
description: Learn how to grant access to Azure resources for users external to an organization using Azure role-based access control (Azure RBAC).
44
services: active-directory
55
documentationcenter: ''
@@ -21,7 +21,7 @@ ms.custom: it-pro
2121
---
2222
# Add or remove role assignments for external guest users using Azure RBAC and the Azure portal
2323

24-
[Azure role-based access control (Azure RBAC)](overview.md) allows better security management for large organizations and for small and medium-sized businesses working with external collaborators, vendors, or freelancers that need access to specific resources in your environment, but not necessarily to the entire infrastructure or any billing-related scopes. You can use the capabilities in [Azure Active Directory B2B](../active-directory/b2b/what-is-b2b.md) to collaborate with external guest users and you can use RBAC to grant just the permissions that guest users need in your environment.
24+
[Azure role-based access control (Azure RBAC)](overview.md) allows better security management for large organizations and for small and medium-sized businesses working with external collaborators, vendors, or freelancers that need access to specific resources in your environment, but not necessarily to the entire infrastructure or any billing-related scopes. You can use the capabilities in [Azure Active Directory B2B](../active-directory/b2b/what-is-b2b.md) to collaborate with external guest users and you can use Azure RBAC to grant just the permissions that guest users need in your environment.
2525

2626
## Prerequisites
2727

@@ -65,7 +65,7 @@ For more information about the invitation process, see [Azure Active Directory B
6565

6666
## Add a role assignment for a guest user
6767

68-
In RBAC, to grant access, you assign a role. To add a role assignment for a guest user, you follow [same steps](role-assignments-portal.md#add-a-role-assignment) as you would for a member user, group, service principal, or managed identity. Follow these steps add a role assignment for a guest user at different scopes.
68+
In Azure RBAC, to grant access, you assign a role. To add a role assignment for a guest user, you follow [same steps](role-assignments-portal.md#add-a-role-assignment) as you would for a member user, group, service principal, or managed identity. Follow these steps add a role assignment for a guest user at different scopes.
6969

7070
1. In the Azure portal, click **All services**.
7171

articles/role-based-access-control/role-assignments-list-rest.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ ms.reviewer: bagovind
2727
2828
## List role assignments
2929

30-
In RBAC, to list access, you list the role assignments. To list role assignments, use one of the [Role Assignments - List](/rest/api/authorization/roleassignments/list) REST APIs. To refine your results, you specify a scope and an optional filter.
30+
In Azure RBAC, to list access, you list the role assignments. To list role assignments, use one of the [Role Assignments - List](/rest/api/authorization/roleassignments/list) REST APIs. To refine your results, you specify a scope and an optional filter.
3131

3232
1. Start with the following request:
3333

articles/role-based-access-control/role-assignments-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Add or remove role assignments with RBAC and the Azure portal
2+
title: Add or remove role assignments with Azure RBAC and the Azure portal
33
description: Learn how to grant access to Azure resources for users, groups, service principals, or managed identities using Azure role-based access control (Azure RBAC) and the Azure portal.
44
services: active-directory
55
documentationcenter: ''

articles/role-based-access-control/role-assignments-powershell.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Add or remove role assignments with RBAC and Azure PowerShell
2+
title: Add or remove role assignments with Azure RBAC and Azure PowerShell
33
description: Learn how to grant access to Azure resources for users, groups, service principals, or managed identities using Azure role-based access control (Azure RBAC) and Azure PowerShell.
44
services: active-directory
55
documentationcenter: ''
@@ -62,7 +62,7 @@ Get-AzADServicePrincipal -SearchString <service_name_in_quotes>
6262

6363
## Add a role assignment
6464

65-
In RBAC, to grant access, you add a role assignment.
65+
In Azure RBAC, to grant access, you add a role assignment.
6666

6767
### User at a resource group scope
6868

@@ -200,7 +200,7 @@ CanDelegate : False
200200

201201
## Remove a role assignment
202202

203-
In RBAC, to remove access, you remove a role assignment by using [Remove-AzRoleAssignment](/powershell/module/az.resources/remove-azroleassignment).
203+
In Azure RBAC, to remove access, you remove a role assignment by using [Remove-AzRoleAssignment](/powershell/module/az.resources/remove-azroleassignment).
204204

205205
The following example removes the *Virtual Machine Contributor* role assignment from the *alain\@example.com* user on the *pharma-sales* resource group:
206206

0 commit comments

Comments
 (0)