Skip to content

Commit 6e38d76

Browse files
authored
Merge pull request #222685 from rolyon/rolyon-abac-attributes-principal-troubleshoot
[Azure ABAC] Principal does not appear in Attribute source
2 parents ad7cd15 + b1d54a6 commit 6e38d76

File tree

5 files changed

+29
-15
lines changed

5 files changed

+29
-15
lines changed

articles/active-directory/fundamentals/custom-security-attributes-manage.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: fundamentals
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/30/2022
11+
ms.date: 01/07/2023
1212
ms.collection: M365-identity-device-management
1313
---
1414

@@ -58,7 +58,7 @@ The following table provides a high-level comparison of the custom security attr
5858
| Permission | Global Admin | Attribute Definition Admin | Attribute Assignment Admin | Attribute Definition Reader | Attribute Assignment Reader |
5959
| --- | :---: | :---: | :---: | :---: | :---: |
6060
| Read attribute sets | | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
61-
| Read attribute definitions | | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | |
61+
| Read attribute definitions | | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
6262
| Read attribute assignments for users and applications (service principals) | | | :heavy_check_mark: | | :heavy_check_mark: |
6363
| Add or edit attribute sets | | :heavy_check_mark: | | | |
6464
| Add, edit, or deactivate attribute definitions | | :heavy_check_mark: | | | |
@@ -101,8 +101,8 @@ Once you have a better understanding of how your attributes will be organized an
101101
| <ul><li>Read attribute definitions in a scoped attribute set</li><li>Read attribute assignments that use attributes in a scoped attribute set for users</li><li>Read attribute assignments that use attributes in a scoped attribute set for applications (service principals)</li><li>[Assign attributes in a scoped attribute set to users](../enterprise-users/users-custom-security-attributes.md)</li><li>[Assign attributes in a scoped attribute set to applications (service principals)](../manage-apps/custom-security-attributes-apps.md)</li><li>[Author Azure role assignment conditions that use the Principal attribute for all attributes in a scoped attribute set](../../role-based-access-control/conditions-format.md#attributes)</li><li>**Cannot** read attributes in other attribute sets</li><li>**Cannot** read attribute assignments that use attributes in other attribute sets</li></ul> | [Attribute Assignment Administrator](../roles/permissions-reference.md#attribute-assignment-administrator) | ![Icon for attribute set scope.](./media/custom-security-attributes-manage/icon-attribute-set.png)<br/>Attribute set |
102102
| <ul><li>Read all attribute sets in a tenant</li><li>Read all attribute definitions in a tenant</li></ul> | [Attribute Definition Reader](../roles/permissions-reference.md#attribute-definition-reader) | ![Icon for tenant scope.](./media/custom-security-attributes-manage/icon-tenant.png)<br/>Tenant |
103103
| <ul><li>Read attribute definitions in a scoped attribute set</li><li>**Cannot** read other attribute sets</li></ul> | [Attribute Definition Reader](../roles/permissions-reference.md#attribute-definition-reader) | ![Icon for attribute set scope.](./media/custom-security-attributes-manage/icon-attribute-set.png)<br/>Attribute set |
104-
| <ul><li>Read all attribute sets in a tenant</li><li>Read all attribute assignments in a tenant for users</li><li>Read all attribute assignments in a tenant for applications (service principals)</li></ul> | [Attribute Assignment Reader](../roles/permissions-reference.md#attribute-assignment-reader) | ![Icon for tenant scope.](./media/custom-security-attributes-manage/icon-tenant.png)<br/>Tenant |
105-
| <ul><li>Read attribute assignments that use attributes in a scoped attribute set for users</li><li>Read attribute assignments that use attributes in a scoped attribute set for applications (service principals)</li><li>**Cannot** read attribute assignments that use attributes in other attribute sets</li></ul> | [Attribute Assignment Reader](../roles/permissions-reference.md#attribute-assignment-reader) | ![Icon for attribute set scope.](./media/custom-security-attributes-manage/icon-attribute-set.png)<br/>Attribute set |
104+
| <ul><li>Read all attribute sets in a tenant</li><li>Read all attribute definitions in a tenant</li><li>Read all attribute assignments in a tenant for users</li><li>Read all attribute assignments in a tenant for applications (service principals)</li></ul> | [Attribute Assignment Reader](../roles/permissions-reference.md#attribute-assignment-reader) | ![Icon for tenant scope.](./media/custom-security-attributes-manage/icon-tenant.png)<br/>Tenant |
105+
| <ul><li>Read attribute definitions in a scoped attribute set</li><li>Read attribute assignments that use attributes in a scoped attribute set for users</li><li>Read attribute assignments that use attributes in a scoped attribute set for applications (service principals)</li><li>**Cannot** read attributes in other attribute sets</li><li>**Cannot** read attribute assignments that use attributes in other attribute sets</li></ul> | [Attribute Assignment Reader](../roles/permissions-reference.md#attribute-assignment-reader) | ![Icon for attribute set scope.](./media/custom-security-attributes-manage/icon-attribute-set.png)<br/>Attribute set |
106106

107107
## Step 6: Assign roles
108108

@@ -128,9 +128,6 @@ To grant access to the appropriate people, follow these steps to assign one of t
128128

129129
> [!NOTE]
130130
> If you are using Azure AD Privileged Identity Management (PIM), eligible role assignments at attribute set scope currently aren't supported. Permanent role assignments at attribute set scope are supported, but the **Assigned roles** page for a user doesn't list the role assignments.
131-
132-
> [!NOTE]
133-
> Users with attribute set scope role assignments currently can see other attribute sets and custom security attribute definitions.
134131
135132
#### PowerShell
136133

articles/role-based-access-control/conditions-troubleshoot.md

Lines changed: 25 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: role-based-access-control
88
ms.subservice: conditions
99
ms.topic: troubleshooting
1010
ms.workload: identity
11-
ms.date: 10/24/2022
11+
ms.date: 01/07/2023
1212
ms.author: rolyon
1313

1414
#Customer intent:
@@ -77,19 +77,36 @@ To use principal (user) attributes, you must have all of the following: Azure AD
7777
You don't meet the prerequisites. To use principal attributes, you must have **all** of the following:
7878

7979
- Azure AD Premium P1 or P2 license
80-
- Azure AD permissions for signed-in user, such as the [Attribute Assignment Administrator](../active-directory/roles/permissions-reference.md#attribute-assignment-administrator) role
80+
- Azure AD permissions for the signed-in user to read at least one attribute set
8181
- Custom security attributes defined in Azure AD
8282

83-
> [!IMPORTANT]
84-
> By default, [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) and other administrator roles do not have permissions to read, define, or assign custom security attributes.
85-
8683
**Solution**
8784

88-
1. Open **Azure Active Directory** > **Overview** and check the license for your tenant.
85+
1. Open **Azure Active Directory** > **Custom security attributes**.
86+
87+
If the **Custom security attributes** page is disabled, you don't have an Azure AD Premium P1 or P2 license. Open **Azure Active Directory** > **Overview** and check the license for your tenant.
88+
89+
![Screenshot that shows Custom security attributes page disabled in Azure portal.](./media/conditions-troubleshoot/attributes-disabled.png)
90+
91+
If you see the **Get started** page, you don't have permissions to read at least one attribute set or custom security attributes haven't been defined yet.
92+
93+
![Screenshot that shows Custom security attributes Get started page.](./media/conditions-troubleshoot/attributes-get-started.png)
94+
95+
1. If custom security attributes have been defined, assign one of the following roles at tenant scope or attribute set scope. For more information, see [Manage access to custom security attributes in Azure AD](../active-directory/fundamentals/custom-security-attributes-manage.md).
96+
97+
- [Attribute Definition Reader](../active-directory/roles/permissions-reference.md#attribute-definition-reader)
98+
- [Attribute Assignment Reader](../active-directory/roles/permissions-reference.md#attribute-assignment-reader)
99+
- [Attribute Definition Administrator](../active-directory/roles/permissions-reference.md#attribute-definition-administrator)
100+
- [Attribute Assignment Administrator](../active-directory/roles/permissions-reference.md#attribute-assignment-administrator)
101+
102+
> [!IMPORTANT]
103+
> By default, [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) and other administrator roles do not have permissions to read, define, or assign custom security attributes.
104+
105+
1. If custom security attributes haven't been defined yet, assign the [Attribute Definition Administrator](../active-directory/roles/permissions-reference.md#attribute-definition-administrator) role at tenant scope and add custom security attributes. For more information, see [Add or deactivate custom security attributes in Azure AD](../active-directory/fundamentals/custom-security-attributes-add.md).
89106

90-
1. Open **Azure Active Directory** > **Users** > *user name* > **Assigned roles** and check if the Attribute Assignment Administrator role is assigned to you. If not, ask your Azure AD administrator to you assign you this role. For more information, see [Assign Azure AD roles to users](../active-directory/roles/manage-roles-portal.md).
107+
When finished, you should be able to read at least one attribute set. **Principal** should now appear in the **Attribute source** list when you add a role assignment with a condition.
91108

92-
1. Open **Azure Active Directory** > **Custom security attributes** to see if custom security attributes have been defined and which ones you have access to. If you don't see any custom security attributes, ask your Azure AD administrator to add an attribute set that you can manage. For more information, see [Manage access to custom security attributes in Azure AD](../active-directory/fundamentals/custom-security-attributes-manage.md) and [Add or deactivate custom security attributes in Azure AD](../active-directory/fundamentals/custom-security-attributes-add.md).
109+
![Screenshot that shows the attribute sets the user can read.](./media/conditions-troubleshoot/attribute-sets-read.png)
93110

94111
### Symptom - Principal does not appear in Attribute source when using PIM
95112

35.2 KB
Loading
67.4 KB
Loading
66.7 KB
Loading

0 commit comments

Comments
 (0)