You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-relay/includes/relay-roles.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,5 +32,5 @@ The following list describes the levels at which you can scope access to Azure R
32
32
-**Subscription**: Role assignment applies to all the Relay resources in all of the resource groups in the subscription.
33
33
34
34
> [!NOTE]
35
-
> Keep in mind that Azure role assignments may take up to five minutes to propagate. For more information about how built-in roles are defined, see [Understand role definitions](../../role-based-access-control/role-definitions.md#management-and-data-operations). For information about creating Azure custom roles, see [Azure custom roles](../../role-based-access-control/custom-roles.md).
35
+
> Keep in mind that Azure role assignments may take up to five minutes to propagate. For more information about how built-in roles are defined, see [Understand role definitions](../../role-based-access-control/role-definitions.md#control-and-data-actions). For information about creating Azure custom roles, see [Azure custom roles](../../role-based-access-control/custom-roles.md).
Copy file name to clipboardExpand all lines: articles/event-hubs/authorize-access-azure-active-directory.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ The following list describes the levels at which you can scope access to Event H
52
52
> - This content applies to both Event Hubs and Event Hubs for Apache Kafka. For more information on Event Hubs for Kafka support, see [Event Hubs for Kafka - security and authentication](event-hubs-for-kafka-ecosystem-overview.md#security-and-authentication).
53
53
54
54
55
-
For more information about how built-in roles are defined, see [Understand role definitions](../role-based-access-control/role-definitions.md#management-and-data-operations). For information about creating Azure custom roles, see [Azure custom roles](../role-based-access-control/custom-roles.md).
55
+
For more information about how built-in roles are defined, see [Understand role definitions](../role-based-access-control/role-definitions.md#control-and-data-actions). For information about creating Azure custom roles, see [Azure custom roles](../role-based-access-control/custom-roles.md).
Copy file name to clipboardExpand all lines: articles/role-based-access-control/built-in-roles.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.custom: generated
17
17
18
18
This article lists the Azure built-in roles. If you are looking for administrator roles for Azure Active Directory (Azure AD), see [Azure AD built-in roles](../active-directory/roles/permissions-reference.md).
19
19
20
-
The following table provides a brief description of each built-in role. Click the role name to see the list of `Actions`, `NotActions`, `DataActions`, and `NotDataActions` for each role. For information about what these actions mean and how they apply to the management and data planes, see [Understand Azure role definitions](role-definitions.md).
20
+
The following table provides a brief description of each built-in role. Click the role name to see the list of `Actions`, `NotActions`, `DataActions`, and `NotDataActions` for each role. For information about what these actions mean and how they apply to the control and data planes, see [Understand Azure role definitions](role-definitions.md).
Copy file name to clipboardExpand all lines: articles/role-based-access-control/custom-roles-cli.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -141,7 +141,7 @@ To create a custom role, use [az role definition create](/cli/azure/role/definit
141
141
az role definition create --role-definition {roleDefinition}
142
142
```
143
143
144
-
The following example creates a custom role named *Virtual Machine Operator*. This custom role assigns access to all read operations of *Microsoft.Compute*, *Microsoft.Storage*, and *Microsoft.Network* resource providers and assigns access to start, restart, and monitor virtual machines. This custom role can be used in two subscriptions. This example uses a JSON file as an input.
144
+
The following example creates a custom role named *Virtual Machine Operator*. This custom role assigns access to all read actions of *Microsoft.Compute*, *Microsoft.Storage*, and *Microsoft.Network* resource providers and assigns access to start, restart, and monitor virtual machines. This custom role can be used in two subscriptions. This example uses a JSON file as an input.
145
145
146
146
vmoperator.json
147
147
@@ -184,7 +184,7 @@ To update a custom role, first use [az role definition list](/cli/azure/role/def
184
184
az role definition update --role-definition {roleDefinition}
185
185
```
186
186
187
-
The following example adds the *Microsoft.Insights/diagnosticSettings/*operation to `Actions` and adds a management group to `AssignableScopes` for the *Virtual Machine Operator* custom role. Adding a management group to `AssignableScopes` is currently in preview.
187
+
The following example adds the *Microsoft.Insights/diagnosticSettings/*action to `Actions` and adds a management group to `AssignableScopes` for the *Virtual Machine Operator* custom role. Adding a management group to `AssignableScopes` is currently in preview.
1. If you are looking for permissions that apply to the data plane, click **Data Actions**. Otherwise, leave the actions toggle set to **Actions** to list permissions that apply to the management plane. For more information, about the differences between the management plane and data plane, see [Management and data operations](role-definitions.md#management-and-data-operations).
182
+
1. If you are looking for permissions that apply to the data plane, click **Data Actions**. Otherwise, leave the actions toggle set to **Actions** to list permissions that apply to the control plane. For more information, about the differences between the control plane and data plane, see [Control and data actions](role-definitions.md#control-and-data-actions).
183
183
184
184
1. If necessary, update the search string to further refine your search.
When you use PowerShell to create a custom role, you can use one of the [built-in roles](built-in-roles.md) as a starting point or you can start from scratch. The first example in this section starts with a built-in role and then customizes it with more permissions. Edit the attributes to add the `Actions`, `NotActions`, or `AssignableScopes` that you want, and then save the changes as a new role.
161
161
162
-
The following example starts with the [Virtual Machine Contributor](built-in-roles.md#virtual-machine-contributor) built-in role to create a custom role named *Virtual Machine Operator*. The new role grants access to all read operations of *Microsoft.Compute*, *Microsoft.Storage*, and *Microsoft.Network* resource providers and grants access to start, restart, and monitor virtual machines. The custom role can be used in two subscriptions.
162
+
The following example starts with the [Virtual Machine Contributor](built-in-roles.md#virtual-machine-contributor) built-in role to create a custom role named *Virtual Machine Operator*. The new role grants access to all read actions of *Microsoft.Compute*, *Microsoft.Storage*, and *Microsoft.Network* resource providers and grants access to start, restart, and monitor virtual machines. The custom role can be used in two subscriptions.
The following example shows another way to create the *Virtual Machine Operator* custom role. It starts by creating a new `PSRoleDefinition` object. The action operations are specified in the `perms` variable and set to the `Actions` property. The `NotActions` property is set by reading the `NotActions` from the [Virtual Machine Contributor](built-in-roles.md#virtual-machine-contributor) built-in role. Since [Virtual Machine Contributor](built-in-roles.md#virtual-machine-contributor) does not have any `NotActions`, this line is not required, but it shows how information can be retrieved from another role.
186
+
The following example shows another way to create the *Virtual Machine Operator* custom role. It starts by creating a new `PSRoleDefinition` object. The actions are specified in the `perms` variable and set to the `Actions` property. The `NotActions` property is set by reading the `NotActions` from the [Virtual Machine Contributor](built-in-roles.md#virtual-machine-contributor) built-in role. Since [Virtual Machine Contributor](built-in-roles.md#virtual-machine-contributor) does not have any `NotActions`, this line is not required, but it shows how information can be retrieved from another role.
@@ -240,7 +240,7 @@ Similar to creating a custom role, you can modify an existing custom role using
240
240
241
241
To modify a custom role, first, use the [Get-AzRoleDefinition](/powershell/module/az.resources/get-azroledefinition) command to retrieve the role definition. Second, make the desired changes to the role definition. Finally, use the [Set-AzRoleDefinition](/powershell/module/az.resources/set-azroledefinition) command to save the modified role definition.
242
242
243
-
The following example adds the `Microsoft.Insights/diagnosticSettings/*`operation to the *Virtual Machine Operator* custom role.
243
+
The following example adds the `Microsoft.Insights/diagnosticSettings/*`action to the *Virtual Machine Operator* custom role.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/custom-roles-rest.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -181,9 +181,9 @@ To create a custom role, use the [Role Definitions - Create Or Update](/rest/api
181
181
182
182
1. If `assignableScopes` is a management group, replace the *{groupId}* instance with your management group identifier. Adding a management group to `assignableScopes` is currently in preview.
183
183
184
-
1. In the `actions` property, add the operations that the role allows to be performed.
184
+
1. In the `actions` property, add the actions that the role allows to be performed.
185
185
186
-
1. In the `notActions` property, add the operations that are excluded from the allowed `actions`.
186
+
1. In the `notActions` property, add the actions that are excluded from the allowed `actions`.
187
187
188
188
1. In the `roleName` and `description` properties, specify a unique role name and a description. For more information about the properties, see [Azure custom roles](custom-roles.md).
Copy file name to clipboardExpand all lines: articles/role-based-access-control/custom-roles.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ Here are the basic steps to create a custom role.
28
28
29
29
1. Determine the permissions you need.
30
30
31
-
When you create a custom role, you need to know the operations that are available to define your permissions. Typically, you start with an existing built-in role and then modify it for your needs. You will add the operations to the `Actions` or `NotActions` properties of the [role definition](role-definitions.md). If you have data operations, you will add those to the `DataActions` or `NotDataActions` properties.
31
+
When you create a custom role, you need to know the actions that are available to define your permissions. Typically, you start with an existing built-in role and then modify it for your needs. You will add the actions to the `Actions` or `NotActions` properties of the [role definition](role-definitions.md). If you have data actions, you will add those to the `DataActions` or `NotDataActions` properties.
32
32
33
33
For more information, see the next section [How to determine the permissions you need](#how-to-determine-the-permissions-you-need).
34
34
@@ -152,10 +152,10 @@ The following table describes what the custom role properties mean.
152
152
|`Id`</br>`name`| Yes | String | The unique ID of the custom role. For Azure PowerShell and Azure CLI, this ID is automatically generated when you create a new role. |
153
153
|`IsCustom`</br>`roleType`| Yes | String | Indicates whether this is a custom role. Set to `true` or `CustomRole` for custom roles. Set to `false` or `BuiltInRole` for built-in roles. |
154
154
|`Description`</br>`description`| Yes | String | The description of the custom role. Can include letters, numbers, spaces, and special characters. Maximum number of characters is 1024. |
155
-
|`Actions`</br>`actions`| Yes | String[]| An array of strings that specifies the management operations that the role allows to be performed. For more information, see [Actions](role-definitions.md#actions). |
156
-
|`NotActions`</br>`notActions`| No | String[]| An array of strings that specifies the management operations that are excluded from the allowed `Actions`. For more information, see [NotActions](role-definitions.md#notactions). |
157
-
|`DataActions`</br>`dataActions`| No | String[]| An array of strings that specifies the data operations that the role allows to be performed to your data within that object. If you create a custom role with `DataActions`, that role cannot be assigned at the management group scope. For more information, see [DataActions](role-definitions.md#dataactions). |
158
-
|`NotDataActions`</br>`notDataActions`| No | String[]| An array of strings that specifies the data operations that are excluded from the allowed `DataActions`. For more information, see [NotDataActions](role-definitions.md#notdataactions). |
155
+
|`Actions`</br>`actions`| Yes | String[]| An array of strings that specifies the control plane actions that the role allows to be performed. For more information, see [Actions](role-definitions.md#actions). |
156
+
|`NotActions`</br>`notActions`| No | String[]| An array of strings that specifies the control plane actions that are excluded from the allowed `Actions`. For more information, see [NotActions](role-definitions.md#notactions). |
157
+
|`DataActions`</br>`dataActions`| No | String[]| An array of strings that specifies the data plane actions that the role allows to be performed to your data within that object. If you create a custom role with `DataActions`, that role cannot be assigned at the management group scope. For more information, see [DataActions](role-definitions.md#dataactions). |
158
+
|`NotDataActions`</br>`notDataActions`| No | String[]| An array of strings that specifies the data plane actions that are excluded from the allowed `DataActions`. For more information, see [NotDataActions](role-definitions.md#notdataactions). |
159
159
|`AssignableScopes`</br>`assignableScopes`| Yes | String[]| An array of strings that specifies the scopes that the custom role is available for assignment. You can only define one management group in `AssignableScopes` of a custom role. Adding a management group to `AssignableScopes` is currently in preview. For more information, see [AssignableScopes](role-definitions.md#assignablescopes). |
160
160
161
161
Permission strings are case-insensitive. When you create your custom roles, the convention is to match the case that you see for permissions in [Azure resource provider operations](resource-provider-operations.md).
Just like built-in roles, the `AssignableScopes` property specifies the scopes that the role is available for assignment. The `AssignableScopes` property for a custom role also controls who can create, delete, update, or view the custom role.
184
184
185
-
| Task |Operation| Description |
185
+
| Task |Action| Description |
186
186
| --- | --- | --- |
187
-
| Create/delete a custom role |`Microsoft.Authorization/ roleDefinitions/write`| Users that are granted this operation on all the `AssignableScopes` of the custom role can create (or delete) custom roles for use in those scopes. For example, [Owners](built-in-roles.md#owner) and [User Access Administrators](built-in-roles.md#user-access-administrator) of management groups, subscriptions, and resource groups. |
188
-
| Update a custom role |`Microsoft.Authorization/ roleDefinitions/write`| Users that are granted this operation on all the `AssignableScopes` of the custom role can update custom roles in those scopes. For example, [Owners](built-in-roles.md#owner) and [User Access Administrators](built-in-roles.md#user-access-administrator) of management groups, subscriptions, and resource groups. |
189
-
| View a custom role |`Microsoft.Authorization/ roleDefinitions/read`| Users that are granted this operation at a scope can view the custom roles that are available for assignment at that scope. All built-in roles allow custom roles to be available for assignment. |
187
+
| Create/delete a custom role |`Microsoft.Authorization/ roleDefinitions/write`| Users that are granted this action on all the `AssignableScopes` of the custom role can create (or delete) custom roles for use in those scopes. For example, [Owners](built-in-roles.md#owner) and [User Access Administrators](built-in-roles.md#user-access-administrator) of management groups, subscriptions, and resource groups. |
188
+
| Update a custom role |`Microsoft.Authorization/ roleDefinitions/write`| Users that are granted this action on all the `AssignableScopes` of the custom role can update custom roles in those scopes. For example, [Owners](built-in-roles.md#owner) and [User Access Administrators](built-in-roles.md#user-access-administrator) of management groups, subscriptions, and resource groups. |
189
+
| View a custom role |`Microsoft.Authorization/ roleDefinitions/read`| Users that are granted this action at a scope can view the custom roles that are available for assignment at that scope. All built-in roles allow custom roles to be available for assignment. |
Copy file name to clipboardExpand all lines: articles/role-based-access-control/deny-assignments.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,10 +53,10 @@ Deny assignments follow a similar pattern as role assignments, but also have som
53
53
> | --- | --- | --- | --- |
54
54
> |`DenyAssignmentName`| Yes | String | The display name of the deny assignment. Names must be unique for a given scope. |
55
55
> |`Description`| No | String | The description of the deny assignment. |
56
-
> |`Permissions.Actions`| At least one Actions or one DataActions | String[]| An array of strings that specify the management operations to which the deny assignment blocks access. |
57
-
> |`Permissions.NotActions`| No | String[]| An array of strings that specify the management operations to exclude from the deny assignment. |
58
-
> |`Permissions.DataActions`| At least one Actions or one DataActions | String[]| An array of strings that specify the data operations to which the deny assignment blocks access. |
59
-
> |`Permissions.NotDataActions`| No | String[]| An array of strings that specify the data operations to exclude from the deny assignment. |
56
+
> |`Permissions.Actions`| At least one Actions or one DataActions | String[]| An array of strings that specify the control plane actions to which the deny assignment blocks access. |
57
+
> |`Permissions.NotActions`| No | String[]| An array of strings that specify the control plane action to exclude from the deny assignment. |
58
+
> |`Permissions.DataActions`| At least one Actions or one DataActions | String[]| An array of strings that specify the data plane actions to which the deny assignment blocks access. |
59
+
> |`Permissions.NotDataActions`| No | String[]| An array of strings that specify the data plane actions to exclude from the deny assignment. |
60
60
> |`Scope`| No | String | A string that specifies the scope that the deny assignment applies to. |
61
61
> |`DoNotApplyToChildScopes`| No | Boolean | Specifies whether the deny assignment applies to child scopes. Default value is false. |
62
62
> |`Principals[i].Id`| Yes | String[]| An array of Azure AD principal object IDs (user, group, service principal, or managed identity) to which the deny assignment applies. Set to an empty GUID `00000000-0000-0000-0000-000000000000` to represent all principals. |
0 commit comments