Skip to content

Commit 6fae8b9

Browse files
committed
Updated link text
1 parent 80efa94 commit 6fae8b9

21 files changed

+37
-37
lines changed

articles/role-based-access-control/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ When planning your access control strategy, it's a best practice to grant users
2929

3030
![Azure RBAC and least privilege](./media/best-practices/rbac-least-privilege.png)
3131

32-
For information about how to add role assignments, see [Add or remove role assignments](role-assignments-portal.md).
32+
For information about how to add role assignments, see [Add or remove Azure role assignments using the Azure portal](role-assignments-portal.md).
3333

3434
## Limit the number of subscription owners
3535

articles/role-based-access-control/check-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,4 +53,4 @@ You can use the **Access control (IAM)** blade in [Azure role-based access contr
5353
## Next steps
5454

5555
> [!div class="nextstepaction"]
56-
> [Tutorial: Grant a user access to Azure resources using Azure RBAC and the Azure portal](quickstart-assign-role-user-portal.md)
56+
> [Tutorial: Grant a user access to Azure resources using the Azure portal](quickstart-assign-role-user-portal.md)

articles/role-based-access-control/classic-administrators.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Guest users that have been assigned the Co-Administrator role might see some dif
6767

6868
You would expect that user B could manage everything. The reason for this difference is that the Microsoft account is added to the subscription as a guest user instead of a member user. Guest users have different default permissions in Azure AD as compared to member users. For example, member users can read other users in Azure AD and guest users cannot. Member users can register new service principals in Azure AD and guest users cannot.
6969

70-
If a guest user needs to be able to perform these tasks, a possible solution is to assign the specific Azure AD roles the guest user needs. For example, in the previous scenario, you could assign the [Directory Readers](../active-directory/users-groups-roles/directory-assign-admin-roles.md#directory-readers) role to read other users and assign the [Application Developer](../active-directory/users-groups-roles/directory-assign-admin-roles.md#application-developer) role to be able to create service principals. For more information about member and guest users and their permissions, see [What are the default user permissions in Azure Active Directory?](../active-directory/fundamentals/users-default-permissions.md). For more information about granting access for guest users, see [Manage access to Azure resources for external guest users using Azure RBAC](role-assignments-external-users.md).
70+
If a guest user needs to be able to perform these tasks, a possible solution is to assign the specific Azure AD roles the guest user needs. For example, in the previous scenario, you could assign the [Directory Readers](../active-directory/users-groups-roles/directory-assign-admin-roles.md#directory-readers) role to read other users and assign the [Application Developer](../active-directory/users-groups-roles/directory-assign-admin-roles.md#application-developer) role to be able to create service principals. For more information about member and guest users and their permissions, see [What are the default user permissions in Azure Active Directory?](../active-directory/fundamentals/users-default-permissions.md). For more information about granting access for guest users, see [Add or remove Azure role assignments for external guest users using the Azure portal](role-assignments-external-users.md).
7171

7272
Note that the [Azure built-in roles](../role-based-access-control/built-in-roles.md) are different than the [Azure AD roles](../active-directory/users-groups-roles/directory-assign-admin-roles.md). The built-in roles don't grant any access to Azure AD. For more information, see [Understand the different roles](../role-based-access-control/rbac-and-directory-admin-roles.md).
7373

@@ -146,6 +146,6 @@ Follow these steps to view the Account Administrator.
146146

147147
## Next steps
148148

149-
* [Understand the different roles in Azure](../role-based-access-control/rbac-and-directory-admin-roles.md)
150-
* [Manage access to Azure resources using Azure RBAC and the Azure portal](../role-based-access-control/role-assignments-portal.md)
149+
* [Understand the different roles](../role-based-access-control/rbac-and-directory-admin-roles.md)
150+
* [Add or remove Azure role assignments using the Azure portal](../role-based-access-control/role-assignments-portal.md)
151151
* [Add or change Azure subscription administrators](../cost-management-billing/manage/add-change-subscription-administrator.md)

articles/role-based-access-control/custom-roles-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ If you prefer, you can specify most of your custom role values in a JSON file. Y
100100
}
101101
```
102102

103-
1. In the JSON file, specify values for the various properties. Here's an example with some values added. For information about the different properties, see [Understand role definitions](role-definitions.md).
103+
1. In the JSON file, specify values for the various properties. Here's an example with some values added. For information about the different properties, see [Understand Azure role definitions](role-definitions.md).
104104

105105
```json
106106
{
@@ -343,6 +343,6 @@ Follow these steps to view your custom roles.
343343
344344
## Next steps
345345
346-
- [Tutorial: Create a custom role using Azure PowerShell](tutorial-custom-role-powershell.md)
347-
- [Custom roles in Azure](custom-roles.md)
346+
- [Tutorial: Create an Azure custom role using Azure PowerShell](tutorial-custom-role-powershell.md)
347+
- [Azure custom roles](custom-roles.md)
348348
- [Azure Resource Manager resource provider operations](resource-provider-operations.md)

articles/role-based-access-control/custom-roles-rest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ To create a custom role, use the [Role Definitions - Create Or Update](/rest/api
185185
186186
1. In the `notActions` property, add the operations that are excluded from the allowed `actions`.
187187
188-
1. In the `roleName` and `description` properties, specify a unique role name and a description. For more information about the properties, see [Custom roles](custom-roles.md).
188+
1. In the `roleName` and `description` properties, specify a unique role name and a description. For more information about the properties, see [Azure custom roles](custom-roles.md).
189189
190190
The following shows an example of a request body:
191191
@@ -337,5 +337,5 @@ To delete a custom role, use the [Role Definitions - Delete](/rest/api/authoriza
337337
## Next steps
338338
339339
- [Azure custom roles](custom-roles.md)
340-
- [Manage access to Azure resources using Azure RBAC and the REST API](role-assignments-rest.md)
340+
- [Add or remove Azure role assignments using the REST API](role-assignments-rest.md)
341341
- [Azure REST API Reference](/rest/api/azure/)

articles/role-based-access-control/custom-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ When you create a custom role, it appears in the Azure portal with an orange res
8585

8686
Once you have your custom role, you have to test it to verify that it works as you expect. If you need to make adjustments later, you can update the custom role.
8787

88-
For a step-by-step tutorial on how to create a custom role, see [Tutorial: Create a custom role using Azure PowerShell](tutorial-custom-role-powershell.md) or [Tutorial: Create a custom role using Azure CLI](tutorial-custom-role-cli.md).
88+
For a step-by-step tutorial on how to create a custom role, see [Tutorial: Create an Azure custom role using Azure PowerShell](tutorial-custom-role-powershell.md) or [Tutorial: Create an Azure custom role using Azure CLI](tutorial-custom-role-cli.md).
8989

9090
## Custom role properties
9191

articles/role-based-access-control/deny-assignments-rest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ To get information about a deny assignment, you must have:
8787
8888
## List deny assignments at the root scope (/)
8989
90-
1. Elevate your access as described in [Elevate access for a Global Administrator in Azure Active Directory](elevate-access-global-admin.md).
90+
1. Elevate your access as described in [Elevate access to manage all Azure subscriptions and management groups](elevate-access-global-admin.md).
9191
9292
1. Use the following request:
9393
@@ -108,5 +108,5 @@ To get information about a deny assignment, you must have:
108108
## Next steps
109109
110110
- [Understand Azure deny assignments](deny-assignments.md)
111-
- [Elevate access for a Global Administrator in Azure Active Directory](elevate-access-global-admin.md)
111+
- [Elevate access to manage all Azure subscriptions and management groups](elevate-access-global-admin.md)
112112
- [Azure REST API Reference](/rest/api/azure/)

articles/role-based-access-control/elevate-access-global-admin.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Follow these steps to elevate access for a Global Administrator using the Azure
8080

8181
1. Make the changes you need to make at the elevated access.
8282

83-
For information about assigning roles, see [Manage access using Azure RBAC and the Azure portal](role-assignments-portal.md). If you are using Azure AD Privileged Identity Management (PIM), see [Discover Azure resources to manage in PIM](../active-directory/privileged-identity-management/pim-resource-roles-discover-resources.md) or [Assign Azure resource roles in PIM](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md).
83+
For information about assigning roles, see [Add or remove Azure role assignments using the Azure portal](role-assignments-portal.md). If you are using Azure AD Privileged Identity Management (PIM), see [Discover Azure resources to manage in PIM](../active-directory/privileged-identity-management/pim-resource-roles-discover-resources.md) or [Assign Azure resource roles in PIM](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md).
8484

8585
### Remove elevated access
8686

@@ -318,5 +318,5 @@ When you call `elevateAccess`, you create a role assignment for yourself, so to
318318
319319
## Next steps
320320
321-
- [Understand the different roles in Azure](rbac-and-directory-admin-roles.md)
322-
- [Manage access to Azure resources using Azure RBAC and the REST API](role-assignments-rest.md)
321+
- [Understand the different roles](rbac-and-directory-admin-roles.md)
322+
- [Add or remove Azure role assignments using the REST API](role-assignments-rest.md)

articles/role-based-access-control/index.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
### YamlMime:Landing
22

3-
title: Azure role-based access control (Azure RBAC) documentation
3+
title: Azure RBAC documentation
44
summary: Azure role-based access control (Azure RBAC) is a system that provides fine-grained access management of Azure resources. Using Azure RBAC, you can segregate duties within your team and grant only the amount of access to users that they need to perform their jobs.
55

66
metadata:
7-
title: Azure role-based access control (Azure RBAC) documentation
7+
title: Azure RBAC documentation
88
description: Learn about Azure role-based access control (Azure RBAC) to manage who has access to Azure resources, what they can do with those resources, and what areas they have access to.
99
services: role-based-access-control
1010
ms.service: role-based-access-control
@@ -66,7 +66,7 @@ landingContent:
6666
- text: Template
6767
url: role-assignments-template.md
6868
# Card
69-
- title: Create custom roles
69+
- title: Create and update custom roles
7070
linkLists:
7171
- linkListType: overview
7272
links:

articles/role-based-access-control/overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ The following are the high-level steps that Azure RBAC uses to determine if you
126126

127127
## Next steps
128128

129-
- [Quickstart: View the access a user has to Azure resources using the Azure portal](check-access.md)
130-
- [Manage access to Azure resources using Azure RBAC and the Azure portal](role-assignments-portal.md)
131-
- [Understand the different roles in Azure](rbac-and-directory-admin-roles.md)
129+
- [Quickstart: View the access a user has to Azure resources](check-access.md)
130+
- [Add or remove Azure role assignments using the Azure portal](role-assignments-portal.md)
131+
- [Understand the different roles](rbac-and-directory-admin-roles.md)
132132
- [Cloud Adoption Framework: Resource access management in Azure](/azure/cloud-adoption-framework/govern/resource-consistency/resource-access-management)

0 commit comments

Comments
 (0)