Skip to content

Commit 8d78480

Browse files
authored
Merge pull request #203202 from rolyon/rolyon-abac-resource-request-ga
[Azure ABAC] Resource and request attributes ga
2 parents 4881d4e + 3d24598 commit 8d78480

23 files changed

+106
-140
lines changed

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1717,7 +1717,7 @@ To access these details, go to the Azure AD sign-in logs, select a sign-in, and
17171717
**Service category:** Privileged Identity Management
17181718
**Product capability:** Privileged Identity Management
17191719

1720-
Along with the public preview of attributed based access control for specific Azure RBAC role, you can also add ABAC conditions inside Privileged Identity Management for your eligible assignments. [Learn more](../../role-based-access-control/conditions-overview.md#conditions-and-privileged-identity-management-pim).
1720+
Along with the public preview of attributed-based access control (ABAC) for specific Azure roles, you can also add ABAC conditions inside Privileged Identity Management for your eligible assignments. [Learn more](../../role-based-access-control/conditions-overview.md#conditions-and-azure-ad-pim).
17211721

17221722
---
17231723

articles/active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md

Lines changed: 15 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818

1919
# Assign Azure resource roles in Privileged Identity Management
2020

21-
With Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, can manage the built-in Azure resource roles, and custom roles, including (but not limited to):
21+
With Azure AD Privileged Identity Management (Azure AD PIM), part of Microsoft Entra, can manage the built-in Azure resource roles, and custom roles, including (but not limited to):
2222

2323
- Owner
2424
- User Access Administrator
@@ -33,13 +33,21 @@ Privileged Identity Management support both built-in and custom Azure roles. For
3333

3434
## Role assignment conditions
3535

36-
You can use the Azure attribute-based access control (Azure ABAC) preview to place resource conditions on eligible role assignments using Privileged Identity Management (PIM). With PIM, your end users must activate an eligible role assignment to get permission to perform certain actions. Using Azure attribute-based access control conditions in PIM enables you not only to limit a users role permissions to a resource using fine-grained conditions, but also to use PIM to secure the role assignment with a time-bound setting, approval workflow, audit trail, and so on. For more information, see [Azure attribute-based access control public preview](../../role-based-access-control/conditions-overview.md).
36+
You can use the Azure attribute-based access control (Azure ABAC) to add conditions on eligible role assignments using Azure AD PIM for Azure resources. With Azure AD PIM, your end users must activate an eligible role assignment to get permission to perform certain actions. Using conditions in Azure AD PIM enables you not only to limit a user's role permissions to a resource using fine-grained conditions, but also to use Azure AD PIM to secure the role assignment with a time-bound setting, approval workflow, audit trail, and so on.
3737

3838
>[!Note]
3939
>When a role is assigned, the assignment:
40-
>- Can't be assign for a duration of less than five minutes
40+
>- Can't be assigned for a duration of less than five minutes
4141
>- Can't be removed within five minutes of it being assigned
4242
43+
Currently, the following built-in roles can have conditions added:
44+
45+
- [Storage Blob Data Contributor](../../role-based-access-control/built-in-roles.md#storage-blob-data-contributor)
46+
- [Storage Blob Data Owner](../../role-based-access-control/built-in-roles.md#storage-blob-data-owner)
47+
- [Storage Blob Data Reader](../../role-based-access-control/built-in-roles.md#storage-blob-data-reader)
48+
49+
For more information, see [What is Azure attribute-based access control (Azure ABAC)](../../role-based-access-control/conditions-overview.md).
50+
4351
## Assign a role
4452

4553
Follow these steps to make a user eligible for an Azure resource role.
@@ -73,11 +81,11 @@ Follow these steps to make a user eligible for an Azure resource role.
7381

7482
![Screenshot of add assignments settings pane.](./media/pim-resource-roles-assign-roles/resources-membership-settings-type.png)
7583

76-
Privileged Identity Management for Azure resources provides two distinct assignment types:
84+
Azure AD PIM for Azure resources provides two distinct assignment types:
7785

78-
- **Eligible** assignments require the member of the role to perform an action to use the role. Actions might include performing a multi-factor authentication (MFA) check, providing a business justification, or requesting approval from designated approvers.
86+
- **Eligible** assignments require the member to activate the role before using it. Administrator may require role member to perform certain actions before role activation which might include performing a multi-factor authentication (MFA) check, providing a business justification, or requesting approval from designated approvers.
7987

80-
- **Active** assignments don't require the member to perform any action to use the role. Members assigned as active have the privileges assigned ready to use.
88+
- **Active** assignments don't require the member to activate the role before usage. Members assigned as active have the privileges assigned ready to use. This type of assignment is also available to customers that don't use Azure AD PIM.
8189

8290
1. To specify a specific assignment duration, change the start and end dates and times.
8391

@@ -207,7 +215,7 @@ Follow these steps to update or remove an existing role assignment.
207215

208216
:::image type="content" source="./media/pim-resource-roles-assign-roles/resources-update-remove.png" alt-text="Screenshot demonstrates how to update or remove role assignment." lightbox="./media/pim-resource-roles-assign-roles/resources-update-remove.png":::
209217

210-
1. To add or update a condition to refine Azure resource access, select **Add** or **View/Edit** in the **Condition** column for the role assignment. Currently, the Storage Blob Data Owner, Storage Blob Data Reader, and the Blob Storage Blob Data Contributor roles in Privileged Identity Management are the only two roles supported as part of the [Azure attribute-based access control public preview](../../role-based-access-control/conditions-overview.md).
218+
1. To add or update a condition to refine Azure resource access, select **Add** or **View/Edit** in the **Condition** column for the role assignment. Currently, the Storage Blob Data Owner, Storage Blob Data Reader, and Storage Blob Data Contributor roles in Azure AD PIM are the only roles that can have conditions added.
211219

212220
1. Select **Add expression** or **Delete** to update the expression. You can also select **Add condition** to add a new condition to your role.
213221

articles/role-based-access-control/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@
4141
href: scope-overview.md
4242
- name: Best practices
4343
href: best-practices.md
44-
- name: Conditions
44+
- name: ABAC conditions
4545
items:
4646
- name: Condition format
4747
href: conditions-format.md
@@ -95,7 +95,7 @@
9595
- name: ARM template
9696
displayName: Resource Manager
9797
href: role-assignments-template.md
98-
- name: Add or edit conditions
98+
- name: Add or edit ABAC conditions
9999
items:
100100
- name: Portal
101101
href: conditions-role-assignments-portal.md

articles/role-based-access-control/conditions-custom-security-attributes-example.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,4 +140,4 @@ Create one or more role assignments that use a condition at a higher scope to ma
140140

141141
- [What is Azure attribute-based access control (Azure ABAC)?](conditions-overview.md)
142142
- [What are custom security attributes in Azure AD?](../active-directory/fundamentals/custom-security-attributes-overview.md)
143-
- [Allow read access to blobs based on tags and custom security attributes](conditions-custom-security-attributes.md)
143+
- [Allow read access to blobs based on tags and custom security attributes (Preview)](conditions-custom-security-attributes.md)

articles/role-based-access-control/conditions-custom-security-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ You can also use Azure PowerShell to add role assignment conditions. The followi
214214
1. Set the `Condition` property of the role assignment object. Be sure to use your attribute set name.
215215
216216
```powershell
217-
$groupRoleAssignment.Condition="((!(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read'} AND NOT SubOperationMatches{'Blob.List' })) OR (@Principal[Microsoft.Directory/CustomSecurityAttributes/Id:Engineering_Project] StringEquals @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags:Project<`$key_case_sensitive`$>]))"
217+
$groupRoleAssignment.Condition="((!(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read'} AND NOT SubOperationMatches{'Blob.List'})) OR (@Principal[Microsoft.Directory/CustomSecurityAttributes/Id:Engineering_Project] StringEquals @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags:Project<`$key_case_sensitive`$>]))"
218218
```
219219
220220
1. Set the `ConditionVersion` property of the role assignment object.
@@ -312,7 +312,7 @@ You can also use Azure CLI to add role assignments conditions. The following com
312312
1. Update the `condition` property. Be sure to use your attribute set name.
313313
314314
```azurecli
315-
"condition": "((!(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read'} AND NOT SubOperationMatches{'Blob.List' })) OR (@Principal[Microsoft.Directory/CustomSecurityAttributes/Id:Engineering_Project] StringEquals @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags:Project<$key_case_sensitive$>]))",
315+
"condition": "((!(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read'} AND NOT SubOperationMatches{'Blob.List'})) OR (@Principal[Microsoft.Directory/CustomSecurityAttributes/Id:Engineering_Project] StringEquals @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags:Project<$key_case_sensitive$>]))",
316316
```
317317
318318
1. Update the `conditionVersion` property.

articles/role-based-access-control/conditions-faq.md

Lines changed: 8 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,20 @@
11
---
2-
title: FAQ for Azure role assignment conditions (preview)
3-
description: Frequently asked questions for Azure role assignment conditions (preview)
2+
title: FAQ for Azure role assignment conditions - Azure ABAC
3+
description: Frequently asked questions for Azure role assignment conditions
44
services: active-directory
55
author: rolyon
66
manager: amycolannino
77
ms.service: role-based-access-control
88
ms.subservice: conditions
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 11/16/2021
11+
ms.date: 10/24/2022
1212
ms.author: rolyon
1313

1414
#Customer intent:
1515
---
1616

17-
# FAQ for Azure role assignment conditions (preview)
18-
19-
> [!IMPORTANT]
20-
> Azure ABAC and Azure role assignment conditions are currently in preview.
21-
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
22-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
17+
# FAQ for Azure role assignment conditions
2318

2419
## Frequently asked questions
2520

@@ -31,9 +26,9 @@ You must write the storage container name, blob path, tag name, or values in the
3126

3227
If you add three or more expressions for a targeted action, you must define the logical grouping of those expressions in the code editor, Azure PowerShell, or Azure CLI. A logical grouping of `a AND b OR c` can be either `(a AND b) OR c` or `a AND (b OR c )`.
3328

34-
**Are conditions supported via Privileged Identity Management (PIM) for Azure resources in preview?**
29+
**Are conditions supported via Azure AD Privileged Identity Management (Azure AD PIM) for Azure resources?**
3530

36-
Yes. For more information, see [Assign Azure resource roles in Privileged Identity Management](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md).
31+
Yes, for specific roles. For more information, see [Assign Azure resource roles in Privileged Identity Management](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md).
3732

3833
**Are conditions supported for classic administrators?**
3934

@@ -80,5 +75,5 @@ No, conditions in role assignments do not have an explicit deny effect. Conditio
8075

8176
## Next steps
8277

83-
- [Azure role assignment condition format and syntax (preview)](conditions-format.md)
84-
- [Troubleshoot Azure role assignment conditions (preview)](conditions-troubleshoot.md)
78+
- [Azure role assignment condition format and syntax](conditions-format.md)
79+
- [Troubleshoot Azure role assignment conditions](conditions-troubleshoot.md)

articles/role-based-access-control/conditions-format.md

Lines changed: 16 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Azure role assignment condition format and syntax (preview) - Azure RBAC
2+
title: Azure role assignment condition format and syntax - Azure ABAC
33
description: Get an overview of the format and syntax of Azure role assignment conditions for Azure attribute-based access control (Azure ABAC).
44
services: active-directory
55
author: rolyon
@@ -8,18 +8,13 @@ ms.service: role-based-access-control
88
ms.subservice: conditions
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 09/28/2022
11+
ms.date: 10/24/2022
1212
ms.author: rolyon
1313

1414
#Customer intent: As a dev, devops, or it admin, I want to learn about the conditions so that I write more complex conditions.
1515
---
1616

17-
# Azure role assignment condition format and syntax (preview)
18-
19-
> [!IMPORTANT]
20-
> Azure ABAC and Azure role assignment conditions are currently in preview.
21-
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
22-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
17+
# Azure role assignment condition format and syntax
2318

2419
A condition is an additional check that you can optionally add to your role assignment to provide more fine-grained access control. For example, you can add a condition that requires an object to have a specific tag to read the object. This article describes the format and syntax of role assignment conditions.
2520

@@ -243,7 +238,7 @@ Currently, conditions can be added to built-in or custom role assignments that h
243238
- [Storage Queue Data Message Sender](built-in-roles.md#storage-queue-data-message-sender)
244239
- [Storage Queue Data Reader](built-in-roles.md#storage-queue-data-reader)
245240

246-
For a list of the storage actions you can use in conditions, see [Actions and attributes for Azure role assignment conditions for Azure Blob Storage (preview)](../storage/blobs/storage-auth-abac-attributes.md) and [Actions and attributes for Azure role assignment conditions for Azure queues (preview)](../storage/queues/queues-auth-abac-attributes.md).
241+
For a list of the storage actions you can use in conditions, see [Actions and attributes for Azure role assignment conditions for Azure Blob Storage](../storage/blobs/storage-auth-abac-attributes.md) and [Actions and attributes for Azure role assignment conditions for Azure queues](../storage/queues/queues-auth-abac-attributes.md).
247242

248243
## Attributes
249244

@@ -254,17 +249,21 @@ Depending on the selected actions, the attribute might be found in different pla
254249
> | --- | --- | --- |
255250
> | Resource | Indicates that the attribute is on the resource, such as a container name. | `@Resource` |
256251
> | Request | Indicates that the attribute is part of the action request, such as setting the blob index tag. | `@Request` |
257-
> | Principal | Indicates that the attribute is an Azure AD custom security attribute on the principal, such as a user, enterprise application (service principal), or managed identity. | `@Principal` |
252+
> | Principal | Indicates that the attribute is an Azure AD custom security attribute on the principal, such as a user, enterprise application (service principal), or managed identity. Principal attributes are currently in preview. | `@Principal` |
258253
259254
#### Resource and request attributes
260255

261256
For a list of the blob storage or queue storage attributes you can use in conditions, see:
262257

263-
- [Actions and attributes for Azure role assignment conditions for Azure Blob Storage (preview)](../storage/blobs/storage-auth-abac-attributes.md)
264-
- [Actions and attributes for Azure role assignment conditions for Azure queues (preview)](../storage/queues/queues-auth-abac-attributes.md)
258+
- [Actions and attributes for Azure role assignment conditions for Azure Blob Storage](../storage/blobs/storage-auth-abac-attributes.md)
259+
- [Actions and attributes for Azure role assignment conditions for Azure queues](../storage/queues/queues-auth-abac-attributes.md)
265260

266261
#### Principal attributes
267262

263+
> [!IMPORTANT]
264+
> Principal attributes are currently in PREVIEW.
265+
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
266+
268267
To use principal attributes, you must have **all** of the following:
269268

270269
- Azure AD Premium P1 or P2 license
@@ -273,9 +272,9 @@ To use principal attributes, you must have **all** of the following:
273272

274273
For more information about custom security attributes, see:
275274

276-
- [Allow read access to blobs based on tags and custom security attributes](conditions-custom-security-attributes.md)
277-
- [Principal does not appear in Attribute source](conditions-troubleshoot.md#symptom---principal-does-not-appear-in-attribute-source)
278-
- [Add or deactivate custom security attributes in Azure AD](../active-directory/fundamentals/custom-security-attributes-add.md)
275+
- [Allow read access to blobs based on tags and custom security attributes (Preview)](conditions-custom-security-attributes.md)
276+
- [Principal does not appear in Attribute source (Preview)](conditions-troubleshoot.md#symptom---principal-does-not-appear-in-attribute-source)
277+
- [Add or deactivate custom security attributes in Azure AD (Preview)](../active-directory/fundamentals/custom-security-attributes-add.md)
279278

280279
## Function operators
281280

@@ -494,5 +493,5 @@ a AND (b OR c)
494493

495494
## Next steps
496495

497-
- [Example Azure role assignment conditions for Blob Storage (preview)](../storage/blobs/storage-auth-abac-examples.md)
498-
- [Add or edit Azure role assignment conditions using the Azure portal (preview)](conditions-role-assignments-portal.md)
496+
- [Example Azure role assignment conditions for Blob Storage](../storage/blobs/storage-auth-abac-examples.md)
497+
- [Add or edit Azure role assignment conditions using the Azure portal](conditions-role-assignments-portal.md)

0 commit comments

Comments
 (0)