Skip to content

Commit bdb5013

Browse files
Merge pull request #260065 from rolyon/rolyon-abac-custom-security-attributes-ga-v3
[Azure ABAC] [Custom security attributes] Principal attributes updates
2 parents 7334c35 + dee8265 commit bdb5013

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/role-based-access-control/conditions-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: role-based-access-control
88
ms.subservice: conditions
99
ms.topic: overview
1010
ms.workload: identity
11-
ms.date: 04/11/2023
11+
ms.date: 12/01/2023
1212
ms.author: rolyon
1313

1414
#Customer intent: As a dev, devops, or it admin, I want to learn how to constrain access within a role assignment by using conditions.
@@ -111,7 +111,7 @@ Some features of conditions are still in preview. The following table lists the
111111
| Add conditions using the [condition editor in the Azure portal](conditions-role-assignments-portal.md) | GA | October 2022 |
112112
| Add conditions using [Azure PowerShell](conditions-role-assignments-powershell.md), [Azure CLI](conditions-role-assignments-cli.md), or [REST API](conditions-role-assignments-rest.md) | GA | October 2022 |
113113
| Use [resource and request attributes](conditions-format.md#attributes) for specific combinations of Azure storage resources, access attribute types, and storage account performance tiers. For more information, see [Status of condition features in Azure Storage](../storage/blobs/storage-auth-abac.md#status-of-condition-features-in-azure-storage). | GA | October 2022 |
114-
| Use [custom security attributes on a principal](conditions-format.md#principal-attributes) in a condition | Preview | November 2021 |
114+
| Use [custom security attributes on a principal](conditions-format.md#principal-attributes) in a condition | GA | November 2023 |
115115

116116
<a name='conditions-and-azure-ad-pim'></a>
117117

0 commit comments

Comments
 (0)