Skip to content

Commit 9dc9b01

Browse files
authored
Update assign-azure-role-data-access.md
1 parent abb60ab commit 9dc9b01

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/storage/blobs/assign-azure-role-data-access.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -170,6 +170,9 @@ Keep in mind the following points about Azure role assignments in Azure Storage:
170170
- If the storage account is locked with an Azure Resource Manager read-only lock, then the lock prevents the assignment of Azure roles that are scoped to the storage account or a container.
171171
- If you set the appropriate allow permissions to access data via Microsoft Entra ID and are unable to access the data, for example you're getting an "AuthorizationPermissionMismatch" error. Be sure to allow enough time for the permissions changes you made in Microsoft Entra ID to replicate, and be sure that you don't have any deny assignments that block your access, see [Understand Azure deny assignments](../../role-based-access-control/deny-assignments.md).
172172

173+
> [!NOTE]
174+
> When you assign roles or remove role assignments, it can take up to 10 minutes for changes to take effect.
175+
173176
> [!NOTE]
174177
> You can create custom Azure RBAC roles for granular access to blob data. For more information, see [Azure custom roles](../../role-based-access-control/custom-roles.md).
175178

0 commit comments

Comments
 (0)