Skip to content

Commit 990b8df

Browse files
committed
Added intro sentences
1 parent cf8abd6 commit 990b8df

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

articles/role-based-access-control/role-definitions.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,8 @@ notDataActions []
5353
assignableScopes []
5454
```
5555

56+
The following table describes what the role properties mean.
57+
5658
| Property | Description |
5759
| --- | --- |
5860
| `Name`</br>`roleName` | The display name of the role. |
@@ -85,6 +87,8 @@ The `{action}` portion of an operation string specifies the type of operations y
8587

8688
Here's the [Contributor](built-in-roles.md#contributor) role definition as displayed in Azure PowerShell and Azure CLI. The wildcard (`*`) operation under `Actions` indicates that the principal assigned to this role can perform all actions, or in other words, it can manage everything. This includes actions defined in the future, as Azure adds new resource types. The operations under `NotActions` are subtracted from `Actions`. In the case of the [Contributor](built-in-roles.md#contributor) role, `NotActions` removes this role's ability to manage access to resources and also assign access to resources.
8789

90+
Contributor role as displayed in Azure PowerShell:
91+
8892
```json
8993
{
9094
"Name": "Contributor",
@@ -109,6 +113,8 @@ Here's the [Contributor](built-in-roles.md#contributor) role definition as displ
109113
}
110114
```
111115

116+
Contributor role as displayed in Azure CLI:
117+
112118
```json
113119
{
114120
"assignableScopes": [
@@ -159,6 +165,8 @@ To support data operations, new data properties have been added to the role defi
159165

160166
Here's the [Storage Blob Data Reader](built-in-roles.md#storage-blob-data-reader) role definition, which includes operations in both the `Actions` and `DataActions` properties. This role allows you to read the blob container and also the underlying blob data.
161167

168+
Storage Blob Data Reader role as displayed in Azure PowerShell:
169+
162170
```json
163171
{
164172
"Name": "Storage Blob Data Reader",
@@ -180,6 +188,8 @@ Here's the [Storage Blob Data Reader](built-in-roles.md#storage-blob-data-reader
180188
}
181189
```
182190

191+
Storage Blob Data Reader role as displayed in Azure CLI:
192+
183193
```json
184194
{
185195
"assignableScopes": [
@@ -230,9 +240,11 @@ Storage Blob Data Contributor
230240
&nbsp;&nbsp;&nbsp;&nbsp;`Microsoft.Storage/storageAccounts/blobServices/containers/delete`<br>
231241
&nbsp;&nbsp;&nbsp;&nbsp;`Microsoft.Storage/storageAccounts/blobServices/containers/read`<br>
232242
&nbsp;&nbsp;&nbsp;&nbsp;`Microsoft.Storage/storageAccounts/blobServices/containers/write`<br>
243+
&nbsp;&nbsp;&nbsp;&nbsp;`Microsoft.Storage/storageAccounts/blobServices/generateUserDelegationKey/action`<br>
233244
&nbsp;&nbsp;&nbsp;&nbsp;DataActions<br>
234245
&nbsp;&nbsp;&nbsp;&nbsp;`Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete`<br>
235246
&nbsp;&nbsp;&nbsp;&nbsp;`Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read`<br>
247+
&nbsp;&nbsp;&nbsp;&nbsp;`Microsoft.Storage/storageAccounts/blobServices/containers/blobs/move/action`<br>
236248
&nbsp;&nbsp;&nbsp;&nbsp;`Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write`
237249

238250
Since Alice has a wildcard (`*`) action at a subscription scope, their permissions inherit down to enable them to perform all management actions. Alice can read, write, and delete containers. However, Alice cannot perform data operations without taking additional steps. For example, by default, Alice cannot read the blobs inside a container. To read the blobs, Alice would have to retrieve the storage access keys and use them to access the blobs.

0 commit comments

Comments
 (0)