You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Microsoft Entra authorizes access rights to secured resources through [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md). Azure Storage defines a set of Azure built-in roles that encompass common sets of permissions used to access blob data.
19
25
20
26
When an Azure role is assigned to a Microsoft Entra security principal, Azure grants access to those resources for that security principal. A Microsoft Entra security principal can be a user, a group, an application service principal, or a [managed identity for Azure resources](../../active-directory/managed-identities-azure-resources/overview.md).
@@ -96,6 +102,7 @@ To assign a role scoped to a storage account, specify a string containing the sc
96
102
97
103
The following example assigns the **Storage Blob Data Contributor** role to a user. The role assignment is scoped to level of the container. Make sure to replace the sample values and the placeholder values in brackets (`<>`) with your own values:
98
104
105
+
<!-- replaycheck-task id="fee1778" -->
99
106
```powershell
100
107
New-AzRoleAssignment -SignInName <email> `
101
108
-RoleDefinitionName "Storage Blob Data Contributor" `
The following example assigns the **Storage Blob Data Reader** role to a user by specifying the object ID. The role assignment is scoped to the level of the storage account. Make sure to replace the sample values and the placeholder values in brackets (`<>`) with your own values:
@@ -138,6 +146,7 @@ To assign a role scoped to a container, specify a string containing the scope of
138
146
139
147
The following example assigns the **Storage Blob Data Contributor** role to a user. The role assignment is scoped to the level of the container. Make sure to replace the sample values and the placeholder values in brackets (`<>`) with your own values:
140
148
149
+
<!-- replaycheck-task id="60f1639b" -->
141
150
```azurecli-interactive
142
151
az role assignment create \
143
152
--role "Storage Blob Data Contributor" \
@@ -147,7 +156,7 @@ az role assignment create \
147
156
148
157
The following example assigns the **Storage Blob Data Reader** role to a user by specifying the object ID. To learn more about the `--assignee-object-id` and `--assignee-principal-type` parameters, see [az role assignment](/cli/azure/role/assignment). In this example, the role assignment is scoped to the level of the storage account. Make sure to replace the sample values and the placeholder values in brackets (`<>`) with your own values:
0 commit comments