Skip to content

Commit 9dce49e

Browse files
authored
Merge pull request #108388 from rolyon/rolyon-rbac-assignable-scopes
[Azure RBAC] Updates to assignable scopes
2 parents e6e0d29 + f9e99f4 commit 9dce49e

File tree

3 files changed

+7
-10
lines changed

3 files changed

+7
-10
lines changed

articles/role-based-access-control/custom-roles-rest.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -159,13 +159,12 @@ To create a custom role, use the [Role Definitions - Create Or Update](/rest/api
159159
> | --- | --- |
160160
> | `subscriptions/{subscriptionId}` | Subscription |
161161
> | `subscriptions/{subscriptionId}/resourceGroups/myresourcegroup1` | Resource group |
162-
> | `subscriptions/{subscriptionId}/resourceGroups/myresourcegroup1/providers/Microsoft.Web/sites/mysite1` | Resource |
163162
164163
1. Replace *{roleDefinitionId}* with the GUID identifier of the custom role.
165164
166-
1. Within the request body, in the `assignableScopes` property, replace *{roleDefinitionId}* with the GUID identifier.
165+
1. Within the request body, replace *{roleDefinitionId}* with the GUID identifier.
167166
168-
1. Replace *{subscriptionId}* with your subscription identifier.
167+
1. In the `assignableScopes` property, replace *{subscriptionId}* with your subscription identifier. Or specify a resource group.
169168
170169
1. In the `actions` property, add the operations that the role allows to be performed.
171170
@@ -225,7 +224,6 @@ To update a custom role, use the [Role Definitions - Create Or Update](/rest/api
225224
> | --- | --- |
226225
> | `subscriptions/{subscriptionId}` | Subscription |
227226
> | `subscriptions/{subscriptionId}/resourceGroups/myresourcegroup1` | Resource group |
228-
> | `subscriptions/{subscriptionId}/resourceGroups/myresourcegroup1/providers/Microsoft.Web/sites/mysite1` | Resource |
229227
230228
1. Replace *{roleDefinitionId}* with the GUID identifier of the custom role.
231229
@@ -310,7 +308,6 @@ To delete a custom role, use the [Role Definitions - Delete](/rest/api/authoriza
310308
> | --- | --- |
311309
> | `subscriptions/{subscriptionId}` | Subscription |
312310
> | `subscriptions/{subscriptionId}/resourceGroups/myresourcegroup1` | Resource group |
313-
> | `subscriptions/{subscriptionId}/resourceGroups/myresourcegroup1/providers/Microsoft.Web/sites/mysite1` | Resource |
314311
315312
1. Replace *{roleDefinitionId}* with the GUID identifier of the custom role.
316313

articles/role-based-access-control/custom-roles.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,15 @@ ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 03/02/2020
15+
ms.date: 03/19/2020
1616
ms.author: rolyon
1717
ms.reviewer: bagovind
1818
ms.custom: H1Hack27Feb2017
1919
---
2020

2121
# Custom roles for Azure resources
2222

23-
If the [built-in roles for Azure resources](built-in-roles.md) don't meet the specific needs of your organization, you can create your own custom roles. Just like built-in roles, you can assign custom roles to users, groups, and service principals at subscription, resource group, and resource scopes.
23+
If the [built-in roles for Azure resources](built-in-roles.md) don't meet the specific needs of your organization, you can create your own custom roles. Just like built-in roles, you can assign custom roles to users, groups, and service principals at subscription and resource group scopes.
2424

2525
Custom roles can be shared between subscriptions that trust the same Azure AD directory. There is a limit of **5,000** custom roles per directory. (For Azure Germany and Azure China 21Vianet, the limit is 2,000 custom roles.) Custom roles can be created using the Azure portal (Preview), Azure PowerShell, Azure CLI, or the REST API.
2626

@@ -104,8 +104,8 @@ Just like built-in roles, the `AssignableScopes` property specifies the scopes t
104104

105105
| Task | Operation | Description |
106106
| --- | --- | --- |
107-
| Create/delete a custom role | `Microsoft.Authorization/ roleDefinitions/write` | Users that are granted this operation on all the `AssignableScopes` of the custom role can create (or delete) custom roles for use in those scopes. For example, [Owners](built-in-roles.md#owner) and [User Access Administrators](built-in-roles.md#user-access-administrator) of subscriptions, resource groups, and resources. |
108-
| Update a custom role | `Microsoft.Authorization/ roleDefinitions/write` | Users that are granted this operation on all the `AssignableScopes` of the custom role can update custom roles in those scopes. For example, [Owners](built-in-roles.md#owner) and [User Access Administrators](built-in-roles.md#user-access-administrator) of subscriptions, resource groups, and resources. |
107+
| Create/delete a custom role | `Microsoft.Authorization/ roleDefinitions/write` | Users that are granted this operation on all the `AssignableScopes` of the custom role can create (or delete) custom roles for use in those scopes. For example, [Owners](built-in-roles.md#owner) and [User Access Administrators](built-in-roles.md#user-access-administrator) of subscriptions and resource groups. |
108+
| Update a custom role | `Microsoft.Authorization/ roleDefinitions/write` | Users that are granted this operation on all the `AssignableScopes` of the custom role can update custom roles in those scopes. For example, [Owners](built-in-roles.md#owner) and [User Access Administrators](built-in-roles.md#user-access-administrator) of subscriptions and resource groups. |
109109
| View a custom role | `Microsoft.Authorization/ roleDefinitions/read` | Users that are granted this operation at a scope can view the custom roles that are available for assignment at that scope. All built-in roles allow custom roles to be available for assignment. |
110110

111111
## Next steps

articles/role-based-access-control/role-definitions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ The `NotDataActions` permission specifies the data operations that are excluded
210210
211211
## AssignableScopes
212212

213-
The `AssignableScopes` property specifies the scopes (management groups, subscriptions, resource groups, or resources) that have this role definition available. You can make the role available for assignment in only the management groups, subscriptions, or resource groups that require it. You must use at least one management group, subscription, resource group, or resource ID.
213+
The `AssignableScopes` property specifies the scopes (management groups, subscriptions, or resource groups) that have this role definition available. You can make the role available for assignment in only the management groups, subscriptions, or resource groups that require it. You must use at least one management group, subscription, or resource group.
214214

215215
Built-in roles have `AssignableScopes` set to the root scope (`"/"`). The root scope indicates that the role is available for assignment in all scopes. Examples of valid assignable scopes include:
216216

0 commit comments

Comments
 (0)