You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/overview.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,18 +23,18 @@ ms.reviewer: bagovind
23
23
24
24
Access management for cloud resources is a critical function for any organization that is using the cloud. Azure role-based access control (Azure RBAC) helps you manage who has access to Azure resources, what they can do with those resources, and what areas they have access to.
25
25
26
-
RBAC is an authorization system built on [Azure Resource Manager](../azure-resource-manager/management/overview.md) that provides fine-grained access management of Azure resources.
26
+
Azure RBAC is an authorization system built on [Azure Resource Manager](../azure-resource-manager/management/overview.md) that provides fine-grained access management of Azure resources.
27
27
28
-
## What can I do with RBAC?
28
+
## What can I do with Azure RBAC?
29
29
30
-
Here are some examples of what you can do with RBAC:
30
+
Here are some examples of what you can do with Azure RBAC:
31
31
32
32
- Allow one user to manage virtual machines in a subscription and another user to manage virtual networks
33
33
- Allow a DBA group to manage SQL databases in a subscription
34
34
- Allow a user to manage all resources in a resource group, such as virtual machines, websites, and subnets
35
35
- Allow an application to access all resources in a resource group
36
36
37
-
## How RBAC works
37
+
## How Azure RBAC works
38
38
39
39
The way you control access to resources using Azure RBAC is to create role assignments. This is a key concept to understand – it's how permissions are enforced. A role assignment consists of three elements: security principal, role definition, and scope.
40
40
@@ -92,17 +92,17 @@ You can create role assignments using the Azure portal, Azure CLI, Azure PowerSh
92
92
93
93
## Multiple role assignments
94
94
95
-
So what happens if you have multiple overlapping role assignments? RBAC is an additive model, so your effective permissions are the sum of your role assignments. Consider the following example where a user is granted the Contributor role at the subscription scope and the Reader role on a resource group. The sum of the Contributor permissions and the Reader permissions is effectively the Contributor role for the resource group. Therefore, in this case, the Reader role assignment has no impact.
95
+
So what happens if you have multiple overlapping role assignments? Azure RBAC is an additive model, so your effective permissions are the sum of your role assignments. Consider the following example where a user is granted the Contributor role at the subscription scope and the Reader role on a resource group. The sum of the Contributor permissions and the Reader permissions is effectively the Contributor role for the resource group. Therefore, in this case, the Reader role assignment has no impact.
96
96
97
97

98
98
99
99
## Deny assignments
100
100
101
-
Previously, RBAC was an allow-only model with no deny, but now RBAC supports deny assignments in a limited way. Similar to a role assignment, a *deny assignment* attaches a set of deny actions to a user, group, service principal, or managed identity at a particular scope for the purpose of denying access. A role assignment defines a set of actions that are *allowed*, while a deny assignment defines a set of actions that are *not allowed*. In other words, deny assignments block users from performing specified actions even if a role assignment grants them access. Deny assignments take precedence over role assignments. For more information, see [Understand deny assignments for Azure resources](deny-assignments.md).
101
+
Previously, Azure RBAC was an allow-only model with no deny, but now Azure RBAC supports deny assignments in a limited way. Similar to a role assignment, a *deny assignment* attaches a set of deny actions to a user, group, service principal, or managed identity at a particular scope for the purpose of denying access. A role assignment defines a set of actions that are *allowed*, while a deny assignment defines a set of actions that are *not allowed*. In other words, deny assignments block users from performing specified actions even if a role assignment grants them access. Deny assignments take precedence over role assignments. For more information, see [Understand deny assignments for Azure resources](deny-assignments.md).
102
102
103
-
## How RBAC determines if a user has access to a resource
103
+
## How Azure RBAC determines if a user has access to a resource
104
104
105
-
The following are the high-level steps that RBAC uses to determine if you have access to a resource on the management plane. This is helpful to understand if you are trying to troubleshoot an access issue.
105
+
The following are the high-level steps that Azure RBAC uses to determine if you have access to a resource on the management plane. This is helpful to understand if you are trying to troubleshoot an access issue.
106
106
107
107
1. A user (or service principal) acquires a token for Azure Resource Manager.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/quickstart-assign-role-user-portal.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: "Tutorial: Grant user access to Azure resources with RBAC and the Azure portal "
2
+
title: "Tutorial: Grant user access to Azure resources with Azure RBAC and the Azure portal "
3
3
description: In this tutorial, learn how to grant a user access to Azure resources using Azure role-based access control (Azure RBAC) in the Azure portal.
4
4
services: role-based-access-control
5
5
documentationCenter: ''
@@ -57,7 +57,7 @@ Sign in to the Azure portal at https://portal.azure.com.
57
57
58
58
## Grant access
59
59
60
-
In RBAC, to grant access, you create a role assignment.
60
+
In Azure RBAC, to grant access, you create a role assignment.
61
61
62
62
1. In the list of **Resource groups**, click the new **rbac-resource-group** resource group.
63
63
@@ -87,7 +87,7 @@ In RBAC, to grant access, you create a role assignment.
87
87
88
88
## Remove access
89
89
90
-
In RBAC, to remove access, you remove a role assignment.
90
+
In Azure RBAC, to remove access, you remove a role assignment.
91
91
92
92
1. In the list of role assignments, add a checkmark next to the user with the Virtual Machine Contributor role.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/rbac-and-directory-admin-roles.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ If you are new to Azure, you may find it a little challenging to understand all
27
27
28
28
## How the roles are related
29
29
30
-
To better understand roles in Azure, it helps to know some of the history. When Azure was initially released, access to resources was managed with just three administrator roles: Account Administrator, Service Administrator, and Co-Administrator. Later, Azure role-based access control (Azure RBAC) was added. Azure RBAC is a newer authorization system that provides fine-grained access management to Azure resources. RBAC includes many built-in roles, can be assigned at different scopes, and allows you to create your own custom roles. To manage resources in Azure AD, such as users, groups, and domains, there are several Azure AD administrator roles.
30
+
To better understand roles in Azure, it helps to know some of the history. When Azure was initially released, access to resources was managed with just three administrator roles: Account Administrator, Service Administrator, and Co-Administrator. Later, Azure role-based access control (Azure RBAC) was added. Azure RBAC is a newer authorization system that provides fine-grained access management to Azure resources. Azure RBAC includes many built-in roles, can be assigned at different scopes, and allows you to create your own custom roles. To manage resources in Azure AD, such as users, groups, and domains, there are several Azure AD administrator roles.
31
31
32
32
The following diagram is a high-level view of how the classic subscription administrator roles, Azure roles, and Azure AD administrator roles are related.
33
33
@@ -77,7 +77,7 @@ Azure RBAC is an authorization system built on [Azure Resource Manager](../azure
77
77
78
78
The rest of the built-in roles allow management of specific Azure resources. For example, the [Virtual Machine Contributor](built-in-roles.md#virtual-machine-contributor) role allows the user to create and manage virtual machines. For a list of all the built-in roles, see [Azure built-in roles](built-in-roles.md).
79
79
80
-
Only the Azure portal and the Azure Resource Manager APIs support RBAC. Users, groups, and applications that are assigned Azure roles cannot use the [Azure classic deployment model APIs](../azure-resource-manager/management/deployment-models.md).
80
+
Only the Azure portal and the Azure Resource Manager APIs support Azure RBAC. Users, groups, and applications that are assigned Azure roles cannot use the [Azure classic deployment model APIs](../azure-resource-manager/management/deployment-models.md).
81
81
82
82
In the Azure portal, role assignments using Azure RBAC appear on the **Access control (IAM)** blade. This blade can be found throughout the portal, such as management groups, subscriptions, resource groups, and various resources.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/role-assignments-cli.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ az ad sp list --display-name "{name}" --query [].objectId --output tsv
57
57
58
58
## Add a role assignment
59
59
60
-
In RBAC, to grant access, you add a role assignment.
60
+
In Azure RBAC, to grant access, you add a role assignment.
61
61
62
62
### User at a resource group scope
63
63
@@ -182,7 +182,7 @@ az role assignment create --role "Virtual Machine Contributor" --assignee-object
182
182
183
183
## Remove a role assignment
184
184
185
-
In RBAC, to remove access, you remove a role assignment by using [az role assignment delete](/cli/azure/role/assignment#az-role-assignment-delete):
185
+
In Azure RBAC, to remove access, you remove a role assignment by using [az role assignment delete](/cli/azure/role/assignment#az-role-assignment-delete):
186
186
187
187
```azurecli
188
188
az role assignment delete --assignee <assignee> --role <role_name_or_id> --resource-group <resource_group>
Copy file name to clipboardExpand all lines: articles/role-based-access-control/role-assignments-external-users.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Add or remove role assignments for external users with RBAC and the Azure portal
2
+
title: Add or remove role assignments for external users with Azure RBAC and the Azure portal
3
3
description: Learn how to grant access to Azure resources for users external to an organization using Azure role-based access control (Azure RBAC).
4
4
services: active-directory
5
5
documentationcenter: ''
@@ -21,7 +21,7 @@ ms.custom: it-pro
21
21
---
22
22
# Add or remove role assignments for external guest users using Azure RBAC and the Azure portal
23
23
24
-
[Azure role-based access control (Azure RBAC)](overview.md) allows better security management for large organizations and for small and medium-sized businesses working with external collaborators, vendors, or freelancers that need access to specific resources in your environment, but not necessarily to the entire infrastructure or any billing-related scopes. You can use the capabilities in [Azure Active Directory B2B](../active-directory/b2b/what-is-b2b.md) to collaborate with external guest users and you can use RBAC to grant just the permissions that guest users need in your environment.
24
+
[Azure role-based access control (Azure RBAC)](overview.md) allows better security management for large organizations and for small and medium-sized businesses working with external collaborators, vendors, or freelancers that need access to specific resources in your environment, but not necessarily to the entire infrastructure or any billing-related scopes. You can use the capabilities in [Azure Active Directory B2B](../active-directory/b2b/what-is-b2b.md) to collaborate with external guest users and you can use Azure RBAC to grant just the permissions that guest users need in your environment.
25
25
26
26
## Prerequisites
27
27
@@ -65,7 +65,7 @@ For more information about the invitation process, see [Azure Active Directory B
65
65
66
66
## Add a role assignment for a guest user
67
67
68
-
In RBAC, to grant access, you assign a role. To add a role assignment for a guest user, you follow [same steps](role-assignments-portal.md#add-a-role-assignment) as you would for a member user, group, service principal, or managed identity. Follow these steps add a role assignment for a guest user at different scopes.
68
+
In Azure RBAC, to grant access, you assign a role. To add a role assignment for a guest user, you follow [same steps](role-assignments-portal.md#add-a-role-assignment) as you would for a member user, group, service principal, or managed identity. Follow these steps add a role assignment for a guest user at different scopes.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/role-assignments-list-rest.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ ms.reviewer: bagovind
27
27
28
28
## List role assignments
29
29
30
-
In RBAC, to list access, you list the role assignments. To list role assignments, use one of the [Role Assignments - List](/rest/api/authorization/roleassignments/list) REST APIs. To refine your results, you specify a scope and an optional filter.
30
+
In Azure RBAC, to list access, you list the role assignments. To list role assignments, use one of the [Role Assignments - List](/rest/api/authorization/roleassignments/list) REST APIs. To refine your results, you specify a scope and an optional filter.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/role-assignments-portal.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Add or remove role assignments with RBAC and the Azure portal
2
+
title: Add or remove role assignments with Azure RBAC and the Azure portal
3
3
description: Learn how to grant access to Azure resources for users, groups, service principals, or managed identities using Azure role-based access control (Azure RBAC) and the Azure portal.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/role-assignments-powershell.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Add or remove role assignments with RBAC and Azure PowerShell
2
+
title: Add or remove role assignments with Azure RBAC and Azure PowerShell
3
3
description: Learn how to grant access to Azure resources for users, groups, service principals, or managed identities using Azure role-based access control (Azure RBAC) and Azure PowerShell.
In RBAC, to grant access, you add a role assignment.
65
+
In Azure RBAC, to grant access, you add a role assignment.
66
66
67
67
### User at a resource group scope
68
68
@@ -200,7 +200,7 @@ CanDelegate : False
200
200
201
201
## Remove a role assignment
202
202
203
-
In RBAC, to remove access, you remove a role assignment by using [Remove-AzRoleAssignment](/powershell/module/az.resources/remove-azroleassignment).
203
+
In Azure RBAC, to remove access, you remove a role assignment by using [Remove-AzRoleAssignment](/powershell/module/az.resources/remove-azroleassignment).
204
204
205
205
The following example removes the *Virtual Machine Contributor* role assignment from the *alain\@example.com* user on the *pharma-sales* resource group:
0 commit comments