Skip to content

Commit ae319bd

Browse files
committed
132th commit-create abac article specific to queues
1 parent bda3c80 commit ae319bd

File tree

2 files changed

+3
-7
lines changed

2 files changed

+3
-7
lines changed

articles/storage/queues/queues-auth-abac-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Actions and attributes for Azure role assignment conditions for Azure que
33
titleSuffix: Azure Storage
44
description: Supported actions and attributes for Azure role assignment conditions and Azure attribute-based access control (Azure ABAC) for Azure queues.
55
services: storage
6-
author: jammart
6+
author: jimmart-dev
77

88
ms.service: storage
99
ms.topic: conceptual

articles/storage/queues/queues-auth-abac.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Authorize access to queues using Azure role assignment conditions | Micro
33
titleSuffix: Azure Storage
44
description: Authorize access to Azure queues using Azure role assignment conditions and Azure attribute-based access control (Azure ABAC). Define conditions on role assignments using Storage attributes.
55
services: storage
6-
author: jammart
6+
author: jimmart-dev
77

88
ms.service: storage
99
ms.topic: conceptual
@@ -53,21 +53,17 @@ The [Azure role assignment condition format](../../role-based-access-control/con
5353

5454
Azure RBAC currently supports 2,000 role assignments in a subscription. If you need to create thousands of Azure role assignments, you may encounter this limit. Managing hundreds or thousands of role assignments can be difficult. In some cases, you can use conditions to reduce the number of role assignments on your storage account and make them easier to manage. You can [scale the management of role assignments](../../role-based-access-control/conditions-custom-security-attributes-example.md) using conditions and [Azure AD custom security attributes]() for principals.
5555

56-
5756
## Next steps
5857

5958
- [Prerequisites for Azure role assignment conditions](../../role-based-access-control/conditions-prerequisites.md)
60-
- [Tutorial: Add a role assignment condition to restrict access to blobs using the Azure portal](..\blobs\storage-auth-abac-portal.md)
61-
- [Actions and attributes for Azure role assignment conditions in Azure Storage](..\blobs\storage-auth-abac-attributes.md)
59+
- [Actions and attributes for Azure role assignment conditions in Azure Storage](queues-auth-abac-attributes.md)
6260
- [Example Azure role assignment conditions](..\blobs\storage-auth-abac-examples.md)
6361
- [Troubleshoot Azure role assignment conditions](../../role-based-access-control/conditions-troubleshoot.md)
6462

65-
6663
## See also
6764

6865
- [What is Azure attribute-based access control (Azure ABAC)?](../../role-based-access-control/conditions-overview.md)
6966
- [FAQ for Azure role assignment conditions](../../role-based-access-control/conditions-faq.md)
7067
- [Azure role assignment condition format and syntax](../../role-based-access-control/conditions-format.md)
7168
- [Scale the management of Azure role assignments by using conditions and custom security attributes (preview)](../../role-based-access-control/conditions-custom-security-attributes-example.md)
7269
- [Security considerations for Azure role assignment conditions in Azure Storage](..\blobs\storage-auth-abac-security.md)
73-
- [Authorize access to blobs and Data Lake Storage Gen2 using Azure role assignment conditions](..\blobs\storage-auth-abac.md)

0 commit comments

Comments
 (0)