You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/conditions-format.md
+2-6Lines changed: 2 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ manager: amycolannino
6
6
ms.service: role-based-access-control
7
7
ms.subservice: conditions
8
8
ms.topic: conceptual
9
-
ms.date: 11/15/2023
9
+
ms.date: 04/01/2024
10
10
ms.author: rolyon
11
11
#Customer intent: As a dev, devops, or it admin, I want to learn about the conditions so that I write more complex conditions.
12
12
---
@@ -247,7 +247,7 @@ Depending on the selected actions, the attribute might be found in different pla
247
247
> [!div class="mx-tableFixed"]
248
248
> | Attribute source | Description | Code |
249
249
> | --- | --- | --- |
250
-
> |[Environment](#environment-attributes)| Attribute is associated with the environment of the request, such as the network origin of the request or the current date and time.</br>***(Environment attributes are currently in preview.)***|`@Environment`|
250
+
> |[Environment](#environment-attributes)| Attribute is associated with the environment of the request, such as the network origin of the request or the current date and time.</br> |`@Environment`|
251
251
> |[Principal](#principal-attributes)| Attribute is a custom security attribute assigned to the principal, such as a user or enterprise application (service principal). |`@Principal`|
252
252
> |[Request](#request-attributes)| Attribute is part of the action request, such as setting the blob index tag. |`@Request`|
253
253
> |[Resource](#resource-attributes)| Attribute is a property of the resource, such as a container name. |`@Resource`|
@@ -261,10 +261,6 @@ For a complete list of the storage attributes you can use in conditions, see:
261
261
262
262
Environment attributes are associated with the circumstances under which the access request is made, such as the date and time of day or the network environment. The network environment might be whether access is over a specific private endpoint or a virtual network subnet, or perhaps over any private link.
263
263
264
-
> [!IMPORTANT]
265
-
> Environment attributes are currently in PREVIEW.
266
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
267
-
268
264
The following table lists the supported environment attributes for conditions.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/conditions-overview.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ manager: amycolannino
6
6
ms.service: role-based-access-control
7
7
ms.subservice: conditions
8
8
ms.topic: overview
9
-
ms.date: 12/01/2023
9
+
ms.date: 04/01/2024
10
10
ms.author: rolyon
11
11
#Customer intent: As a dev, devops, or it admin, I want to learn how to constrain access within a role assignment by using conditions.
12
12
---
@@ -100,11 +100,11 @@ For more information about the format of conditions, see [Azure role assignment
100
100
101
101
## Status of condition features
102
102
103
-
Some features of conditions are still in preview. The following table lists the status of condition features:
103
+
The following table lists the status of condition features:
104
104
105
105
| Feature | Status | Date |
106
106
| --- | --- | --- |
107
-
| Use [environment attributes](conditions-format.md#environment-attributes) in a condition |Preview| April 2023|
107
+
| Use [environment attributes](conditions-format.md#environment-attributes) in a condition |GA| April 2024|
108
108
| Add conditions using the [condition editor in the Azure portal](conditions-role-assignments-portal.md)| GA | October 2022 |
109
109
| Add conditions using [Azure PowerShell](conditions-role-assignments-powershell.md), [Azure CLI](conditions-role-assignments-cli.md), or [REST API](conditions-role-assignments-rest.md)| GA | October 2022 |
110
110
| Use [resource and request attributes](conditions-format.md#attributes) for specific combinations of Azure storage resources, access attribute types, and storage account performance tiers. For more information, see [Status of condition features in Azure Storage](../storage/blobs/storage-auth-abac.md#status-of-condition-features-in-azure-storage). | GA | October 2022 |
Copy file name to clipboardExpand all lines: articles/role-based-access-control/conditions-role-assignments-portal.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ manager: amycolannino
6
6
ms.service: role-based-access-control
7
7
ms.subservice: conditions
8
8
ms.topic: conceptual
9
-
ms.date: 11/15/2023
9
+
ms.date: 04/01/2024
10
10
ms.author: rolyon
11
11
ms.custom: subject-rbac-steps
12
12
---
@@ -105,7 +105,7 @@ Once you have the Add role assignment condition page open, you can review the ba
105
105
106
106
1. In the **Attribute source** list, select where the attribute can be found.
107
107
108
-
-**Environment**(preview) indicates that the attribute is associated with the network environment over which the resource is accessed such as a private link, or the current date and time.
108
+
-**Environment** indicates that the attribute is associated with the network environment over which the resource is accessed such as a private link, or the current date and time.
109
109
-**Resource** indicates that the attribute is on the resource, such as container name.
110
110
-**Request** indicates that the attribute is part of the action request, such as setting the blob index tag.
111
111
-**Principal** indicates that the attribute is a Microsoft Entra custom security attribute principal, such as a user, enterprise application (service principal), or managed identity.
> | Value | {'metadata', 'snapshots', 'versions'} |
1411
1411
1412
+
:::image type="content" source="./media/storage-auth-abac-examples/blob-include-list-allow-portal.png" alt-text="Screenshot of condition editor in Azure portal showing a condition to allow a user to list blobs in a container and include metadata, snapshot, and version information." lightbox="./media/storage-auth-abac-examples/blob-include-list-allow-portal.png":::
1413
+
1412
1414
# [Portal: Code editor](#tab/portal-code-editor)
1413
1415
1414
1416
To add the condition using the code editor, copy the condition code sample and paste it into the code editor. After entering your code, switch back to the visual editor to validate it.
@@ -1467,6 +1469,8 @@ Here are the settings to add this condition using the Azure portal.
:::image type="content" source="./media/storage-auth-abac-examples/blob-include-list-metadata-deny-portal.png" alt-text="Screenshot of condition editor in Azure portal showing a condition to restrict a user from listing blobs when metadata is included in the request." lightbox="./media/storage-auth-abac-examples/blob-include-list-metadata-deny-portal.png":::
1473
+
1470
1474
# [Portal: Code editor](#tab/portal-code-editor)
1471
1475
1472
1476
To add the condition using the code editor, copy the condition code sample and paste it into the code editor. After entering your code, switch back to the visual editor to validate it.
Copy file name to clipboardExpand all lines: articles/storage/blobs/storage-auth-abac.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: pauljewellmsft
6
6
ms.author: pauljewell
7
7
ms.service: azure-blob-storage
8
8
ms.topic: conceptual
9
-
ms.date: 01/26/2024
9
+
ms.date: 04/01/2024
10
10
ms.reviewer: nachakra
11
11
---
12
12
@@ -62,19 +62,18 @@ The [Azure role assignment condition format](../../role-based-access-control/con
62
62
63
63
## Status of condition features in Azure Storage
64
64
65
-
Currently, Azure attribute-based access control (Azure ABAC) is generally available (GA) for controlling access only to Azure Blob Storage, Azure Data Lake Storage Gen2, and Azure Queues using `request`, `resource`, and `principal` attributes in the standard storage account performance tier. It's either not available or in PREVIEW for other storage account performance tiers, resource types, and attributes.
65
+
Azure attribute-based access control (Azure ABAC) is generally available (GA) for controlling access to Azure Blob Storage, Azure Data Lake Storage Gen2, and Azure Queues using `request`, `resource`, `environment`, and `principal` attributes in both the standard and premium storage account performance tiers. Currently, the container metadata resource attribute and the list blob include request attribute are in PREVIEW.
66
66
67
-
See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
68
-
69
-
The following table shows the current status of ABAC by storage account performance tier, storage resource type, and attribute type. Exceptions for specific attributes are also shown.
67
+
The following table shows the current status of ABAC by storage resource type and attribute type. Exceptions for specific attributes are also shown.
|Standard |Blobs<br/>Data Lake Storage Gen2<br/>Queues | request<br/>resource<br/>principal | All attributes except for the snapshot resource attribute for Data Lake Storage Gen2| GA |
| Blobs<br/>Data Lake Storage Gen2<br/>Queues | request<br/>resource<br/>environment<br/>principal | All attributes except those explicitly noted in this table| GA |
72
+
| Data Lake Storage Gen2 | resource |[snapshot](storage-auth-abac-attributes.md#snapshot)| Preview |
73
+
| Blobs<br/>Data Lake Storage Gen2| resource |[container metadata](storage-auth-abac-attributes.md#container-metadata)| Preview |
See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
78
77
79
78
> [!NOTE]
80
79
> Some storage features aren't supported for Data Lake Storage Gen2 storage accounts, which use a hierarchical namespace (HNS). To learn more, see [Blob storage feature support](storage-feature-support-in-storage-accounts.md).
@@ -84,6 +83,7 @@ The following table shows the current status of ABAC by storage account performa
84
83
> -[Blob index tags [Keys]](storage-auth-abac-attributes.md#blob-index-tags-keys)
85
84
> -[Blob index tags [Values in key]](storage-auth-abac-attributes.md#blob-index-tags-values-in-key)
Copy file name to clipboardExpand all lines: includes/storage-abac-preview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,12 +5,12 @@ services: storage
5
5
author: pauljewellmsft
6
6
ms.service: azure-storage
7
7
ms.topic: "include"
8
-
ms.date: 11/15/2023
8
+
ms.date: 04/01/2024
9
9
ms.author: pauljewell
10
10
ms.custom: "include file"
11
11
---
12
12
13
13
> [!IMPORTANT]
14
-
> Currently, Azure attribute-based access control (Azure ABAC) is generally available (GA) for controlling access only to Azure Blob Storage, Azure Data Lake Storage Gen2, and Azure Queues using `request`, `resource`, and `principal` attributes in the standard storage account performance tier. It is either not available or in PREVIEW for other storage account performance tiers, resource types, and attributes. For complete feature status information of ABAC for Azure Storage, see [Status of condition features in Azure Storage](../articles/storage/blobs/storage-auth-abac.md#status-of-condition-features-in-azure-storage).
14
+
> Azure attribute-based access control (Azure ABAC) is generally available (GA) for controlling access to Azure Blob Storage, Azure Data Lake Storage Gen2, and Azure Queues using `request`, `resource`, `environment`, and `principal` attributes in both the standard and premium storage account performance tiers. Currently, the container metadata resource attribute and the list blob include request attribute are in PREVIEW. For complete feature status information of ABAC for Azure Storage, see [Status of condition features in Azure Storage](../articles/storage/blobs/storage-auth-abac.md#status-of-condition-features-in-azure-storage).
15
15
>
16
16
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
0 commit comments