Skip to content

Commit 77fa815

Browse files
authored
Merge pull request #124364 from MeckenS/patch-1
Update from Azure AD to Microsoft Entra
2 parents f22395a + 236f95a commit 77fa815

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/role-based-access-control/role-definitions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ Role-based access control for control plane actions is specified in the `Actions
179179
- Create, update, or delete a blob container
180180
- Delete a resource group and all of its resources
181181

182-
Control plane access is not inherited to your data plane provided that the container authentication method is set to **Azure AD User Account** and not **Access Key**. This separation prevents roles with wildcards (`*`) from having unrestricted access to your data. For example, if a user has a [Reader](built-in-roles.md#reader) role on a subscription, then they can view the storage account, but by default they can't view the underlying data.
182+
Control plane access is not inherited to your data plane provided that the container authentication method is set to **Microsoft Entra User Account** and not **Access Key**. This separation prevents roles with wildcards (`*`) from having unrestricted access to your data. For example, if a user has a [Reader](built-in-roles.md#reader) role on a subscription, then they can view the storage account, but by default they can't view the underlying data.
183183

184184
Previously, role-based access control was not used for data actions. Authorization for data actions varied across resource providers. The same role-based access control authorization model used for control plane actions has been extended to data plane actions.
185185

0 commit comments

Comments
 (0)