Skip to content

Commit b90873b

Browse files
authored
Merge pull request #180314 from rolyon/rolyon-abac-principal-attributes-updates
[Azure RBAC] Principal attributes updates
2 parents b89f40d + 784bd31 commit b90873b

File tree

2 files changed

+2
-4
lines changed

2 files changed

+2
-4
lines changed

articles/role-based-access-control/conditions-custom-security-attributes-example.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,8 +94,6 @@ Access keys are a common way to provide access to data plane resources. Access k
9494

9595
Like access keys, shared access signature (SAS) tokens do not have identity binding, but expire on a regularly basis. The lack of identity binding represents the same security risks as access keys do. You must manage the expiration to ensure that clients do not get errors. SAS tokens require additional code to manage and operate daily and can be a significant overhead for a DevOps team.
9696

97-
Resource-based access control lists (ACLs) are typically stored on a resource as a list of users and allowed actions on that specific resource. ACLs offer fine-grained access control and have identity bindings. However, ACLs require you to manage access on each object, creates performance implications related to managing ACLs recursively, and creates management overhead for custom scripts and permission drift remediation.
98-
9997
Azure RBAC provides centralized fine-grained access control. Azure RBAC has identity binding that reduces your security risk. Using conditions you can potentially scale the management of role assignments and make access control easier to maintain because access is based on flexible and dynamic attributes.
10098

10199
Here are some of the benefits of this solution:

articles/role-based-access-control/conditions-prerequisites.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,10 +48,10 @@ Just like role assignments, to add or update conditions, you must be signed in t
4848

4949
## Principal attributes
5050

51-
To use principal attributes, you must have **all** of the following:
51+
To use principal attributes ([custom security attributes in Azure AD](../active-directory/fundamentals/custom-security-attributes-overview.md)), you must have **all** of the following:
5252

5353
- Azure AD Premium P1 or P2 license
54-
- [Attribute Assignment Administrator](../active-directory/roles/permissions-reference.md#attribute-assignment-administrator)
54+
- [Attribute Assignment Administrator](../active-directory/roles/permissions-reference.md#attribute-assignment-administrator) at attribute set or tenant scope
5555
- Custom security attributes defined in Azure AD
5656

5757
For more information about custom security attributes, see:

0 commit comments

Comments
 (0)