Skip to content

Commit bb132dc

Browse files
Merge pull request #265810 from pauljewellmsft/ga-abac-env
[ABAC] Environment attributes / Premium account perf tier GA
2 parents 7cee7d6 + 81a58f2 commit bb132dc

File tree

6 files changed

+24
-24
lines changed

6 files changed

+24
-24
lines changed

articles/role-based-access-control/conditions-format.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: amycolannino
66
ms.service: role-based-access-control
77
ms.subservice: conditions
88
ms.topic: conceptual
9-
ms.date: 11/15/2023
9+
ms.date: 04/01/2024
1010
ms.author: rolyon
1111
#Customer intent: As a dev, devops, or it admin, I want to learn about the conditions so that I write more complex conditions.
1212
---
@@ -247,7 +247,7 @@ Depending on the selected actions, the attribute might be found in different pla
247247
> [!div class="mx-tableFixed"]
248248
> | Attribute source | Description | Code |
249249
> | --- | --- | --- |
250-
> | [Environment](#environment-attributes) | Attribute is associated with the environment of the request, such as the network origin of the request or the current date and time.</br>***(Environment attributes are currently in preview.)*** | `@Environment` |
250+
> | [Environment](#environment-attributes) | Attribute is associated with the environment of the request, such as the network origin of the request or the current date and time.</br> | `@Environment` |
251251
> | [Principal](#principal-attributes) | Attribute is a custom security attribute assigned to the principal, such as a user or enterprise application (service principal). | `@Principal` |
252252
> | [Request](#request-attributes) | Attribute is part of the action request, such as setting the blob index tag. | `@Request` |
253253
> | [Resource](#resource-attributes) | Attribute is a property of the resource, such as a container name. | `@Resource` |
@@ -261,10 +261,6 @@ For a complete list of the storage attributes you can use in conditions, see:
261261

262262
Environment attributes are associated with the circumstances under which the access request is made, such as the date and time of day or the network environment. The network environment might be whether access is over a specific private endpoint or a virtual network subnet, or perhaps over any private link.
263263

264-
> [!IMPORTANT]
265-
> Environment attributes are currently in PREVIEW.
266-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
267-
268264
The following table lists the supported environment attributes for conditions.
269265

270266
| Display name | Description | Attribute | Type |

articles/role-based-access-control/conditions-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: amycolannino
66
ms.service: role-based-access-control
77
ms.subservice: conditions
88
ms.topic: overview
9-
ms.date: 12/01/2023
9+
ms.date: 04/01/2024
1010
ms.author: rolyon
1111
#Customer intent: As a dev, devops, or it admin, I want to learn how to constrain access within a role assignment by using conditions.
1212
---
@@ -100,11 +100,11 @@ For more information about the format of conditions, see [Azure role assignment
100100

101101
## Status of condition features
102102

103-
Some features of conditions are still in preview. The following table lists the status of condition features:
103+
The following table lists the status of condition features:
104104

105105
| Feature | Status | Date |
106106
| --- | --- | --- |
107-
| Use [environment attributes](conditions-format.md#environment-attributes) in a condition | Preview | April 2023 |
107+
| Use [environment attributes](conditions-format.md#environment-attributes) in a condition | GA | April 2024 |
108108
| Add conditions using the [condition editor in the Azure portal](conditions-role-assignments-portal.md) | GA | October 2022 |
109109
| Add conditions using [Azure PowerShell](conditions-role-assignments-powershell.md), [Azure CLI](conditions-role-assignments-cli.md), or [REST API](conditions-role-assignments-rest.md) | GA | October 2022 |
110110
| Use [resource and request attributes](conditions-format.md#attributes) for specific combinations of Azure storage resources, access attribute types, and storage account performance tiers. For more information, see [Status of condition features in Azure Storage](../storage/blobs/storage-auth-abac.md#status-of-condition-features-in-azure-storage). | GA | October 2022 |

articles/role-based-access-control/conditions-role-assignments-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: amycolannino
66
ms.service: role-based-access-control
77
ms.subservice: conditions
88
ms.topic: conceptual
9-
ms.date: 11/15/2023
9+
ms.date: 04/01/2024
1010
ms.author: rolyon
1111
ms.custom: subject-rbac-steps
1212
---
@@ -105,7 +105,7 @@ Once you have the Add role assignment condition page open, you can review the ba
105105

106106
1. In the **Attribute source** list, select where the attribute can be found.
107107

108-
- **Environment** (preview) indicates that the attribute is associated with the network environment over which the resource is accessed such as a private link, or the current date and time.
108+
- **Environment** indicates that the attribute is associated with the network environment over which the resource is accessed such as a private link, or the current date and time.
109109
- **Resource** indicates that the attribute is on the resource, such as container name.
110110
- **Request** indicates that the attribute is part of the action request, such as setting the blob index tag.
111111
- **Principal** indicates that the attribute is a Microsoft Entra custom security attribute principal, such as a user, enterprise application (service principal), or managed identity.

articles/storage/blobs/storage-auth-abac-examples.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1409,6 +1409,8 @@ Here are the settings to add this condition using the Azure portal.
14091409
> | Operator | [ForAllOfAnyValues:StringEqualsIgnoreCase](../../role-based-access-control/conditions-format.md#forallofanyvalues) |
14101410
> | Value | {'metadata', 'snapshots', 'versions'} |
14111411
1412+
:::image type="content" source="./media/storage-auth-abac-examples/blob-include-list-allow-portal.png" alt-text="Screenshot of condition editor in Azure portal showing a condition to allow a user to list blobs in a container and include metadata, snapshot, and version information." lightbox="./media/storage-auth-abac-examples/blob-include-list-allow-portal.png":::
1413+
14121414
# [Portal: Code editor](#tab/portal-code-editor)
14131415

14141416
To add the condition using the code editor, copy the condition code sample and paste it into the code editor. After entering your code, switch back to the visual editor to validate it.
@@ -1467,6 +1469,8 @@ Here are the settings to add this condition using the Azure portal.
14671469
> | Operator | [ForAllOfAllValues:StringNotEquals](../../role-based-access-control/conditions-format.md#forallofallvalues) |
14681470
> | Value | {'metadata'} |
14691471
1472+
:::image type="content" source="./media/storage-auth-abac-examples/blob-include-list-metadata-deny-portal.png" alt-text="Screenshot of condition editor in Azure portal showing a condition to restrict a user from listing blobs when metadata is included in the request." lightbox="./media/storage-auth-abac-examples/blob-include-list-metadata-deny-portal.png":::
1473+
14701474
# [Portal: Code editor](#tab/portal-code-editor)
14711475

14721476
To add the condition using the code editor, copy the condition code sample and paste it into the code editor. After entering your code, switch back to the visual editor to validate it.

articles/storage/blobs/storage-auth-abac.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: pauljewellmsft
66
ms.author: pauljewell
77
ms.service: azure-blob-storage
88
ms.topic: conceptual
9-
ms.date: 01/26/2024
9+
ms.date: 04/01/2024
1010
ms.reviewer: nachakra
1111
---
1212

@@ -62,19 +62,18 @@ The [Azure role assignment condition format](../../role-based-access-control/con
6262

6363
## Status of condition features in Azure Storage
6464

65-
Currently, Azure attribute-based access control (Azure ABAC) is generally available (GA) for controlling access only to Azure Blob Storage, Azure Data Lake Storage Gen2, and Azure Queues using `request`, `resource`, and `principal` attributes in the standard storage account performance tier. It's either not available or in PREVIEW for other storage account performance tiers, resource types, and attributes.
65+
Azure attribute-based access control (Azure ABAC) is generally available (GA) for controlling access to Azure Blob Storage, Azure Data Lake Storage Gen2, and Azure Queues using `request`, `resource`, `environment`, and `principal` attributes in both the standard and premium storage account performance tiers. Currently, the container metadata resource attribute and the list blob include request attribute are in PREVIEW.
6666

67-
See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
68-
69-
The following table shows the current status of ABAC by storage account performance tier, storage resource type, and attribute type. Exceptions for specific attributes are also shown.
67+
The following table shows the current status of ABAC by storage resource type and attribute type. Exceptions for specific attributes are also shown.
7068

71-
| Performance tier | Resource types | Attribute types | Attributes | Availability |
72-
|---|---|---|---|---|
73-
| Standard | Blobs<br/>Data Lake Storage Gen2<br/>Queues | request<br/>resource<br/>principal | All attributes except for the snapshot resource attribute for Data Lake Storage Gen2 | GA |
74-
| Standard | Data Lake Storage Gen2 | resource | snapshot | Preview |
75-
| Standard | Blobs<br/>Data Lake Storage Gen2<br/>Queues | environment | All attributes | Preview |
76-
| Premium | Blobs<br/>Data Lake Storage Gen2<br/>Queues | environment<br/>principal<br/>request<br/>resource | All attributes | Preview |
69+
| Resource types | Attribute types | Attributes | Availability |
70+
|---|---|---|---|
71+
| Blobs<br/>Data Lake Storage Gen2<br/>Queues | request<br/>resource<br/>environment<br/>principal | All attributes except those explicitly noted in this table | GA |
72+
| Data Lake Storage Gen2 | resource | [snapshot](storage-auth-abac-attributes.md#snapshot) | Preview |
73+
| Blobs<br/>Data Lake Storage Gen2 | resource | [container metadata](storage-auth-abac-attributes.md#container-metadata) | Preview |
74+
| Blobs | request | [list blob include](storage-auth-abac-attributes.md#list-blob-include) | Preview |
7775

76+
See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
7877

7978
> [!NOTE]
8079
> Some storage features aren't supported for Data Lake Storage Gen2 storage accounts, which use a hierarchical namespace (HNS). To learn more, see [Blob storage feature support](storage-feature-support-in-storage-accounts.md).
@@ -84,6 +83,7 @@ The following table shows the current status of ABAC by storage account performa
8483
> - [Blob index tags [Keys]](storage-auth-abac-attributes.md#blob-index-tags-keys)
8584
> - [Blob index tags [Values in key]](storage-auth-abac-attributes.md#blob-index-tags-values-in-key)
8685
> - [Version ID](storage-auth-abac-attributes.md#version-id)
86+
> - [List blob include](storage-auth-abac-attributes.md#list-blob-include)
8787
8888
## Next steps
8989

includes/storage-abac-preview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,12 @@ services: storage
55
author: pauljewellmsft
66
ms.service: azure-storage
77
ms.topic: "include"
8-
ms.date: 11/15/2023
8+
ms.date: 04/01/2024
99
ms.author: pauljewell
1010
ms.custom: "include file"
1111
---
1212

1313
> [!IMPORTANT]
14-
> Currently, Azure attribute-based access control (Azure ABAC) is generally available (GA) for controlling access only to Azure Blob Storage, Azure Data Lake Storage Gen2, and Azure Queues using `request`, `resource`, and `principal` attributes in the standard storage account performance tier. It is either not available or in PREVIEW for other storage account performance tiers, resource types, and attributes. For complete feature status information of ABAC for Azure Storage, see [Status of condition features in Azure Storage](../articles/storage/blobs/storage-auth-abac.md#status-of-condition-features-in-azure-storage).
14+
> Azure attribute-based access control (Azure ABAC) is generally available (GA) for controlling access to Azure Blob Storage, Azure Data Lake Storage Gen2, and Azure Queues using `request`, `resource`, `environment`, and `principal` attributes in both the standard and premium storage account performance tiers. Currently, the container metadata resource attribute and the list blob include request attribute are in PREVIEW. For complete feature status information of ABAC for Azure Storage, see [Status of condition features in Azure Storage](../articles/storage/blobs/storage-auth-abac.md#status-of-condition-features-in-azure-storage).
1515
>
1616
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.

0 commit comments

Comments
 (0)