Skip to content

Commit bea6679

Browse files
Merge pull request #253281 from sajeetharan/mongo_rbac_restore
add restore limitation
2 parents 53555c4 + 2416a1d commit bea6679

File tree

1 file changed

+9
-8
lines changed

1 file changed

+9
-8
lines changed

articles/cosmos-db/mongodb/how-to-setup-rbac.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,14 @@ ms.subservice: mongodb
1515

1616
This article is about role-based access control for data plane operations in Azure Cosmos DB for MongoDB.
1717

18-
If you are using management plane operations, see [role-based access control](../role-based-access-control.md) applied to your management plane operations article.
18+
If you're using management plane operations, see [role-based access control](../role-based-access-control.md) applied to your management plane operations article.
1919

2020
Azure Cosmos DB for MongoDB exposes a built-in role-based access control (RBAC) system that lets you authorize your data requests with a fine-grained, role-based permission model. Users and roles reside within a database and are managed using the Azure CLI, Azure PowerShell, or Azure Resource Manager (ARM).
2121

2222
## Concepts
2323

2424
### Resource
25-
A resource is a collection or database to which we are applying access control rules.
25+
A resource is a collection or database to which we're applying access control rules.
2626

2727
### Privileges
2828
Privileges are actions that can be performed on a specific resource. For example, "read access to collection xyz". Privileges are assigned to a specific role.
@@ -31,7 +31,7 @@ Privileges are actions that can be performed on a specific resource. For example
3131
A role has one or more privileges. Roles are assigned to users (zero or more) to enable them to perform the actions defined in those privileges. Roles are stored within a single database.
3232

3333
### Diagnostic log auditing
34-
An additional column called `userId` has been added to the `MongoRequests` table in the Azure Portal Diagnostics feature. This column will identify which user performed which data plan operation. The value in this column is empty when RBAC is not enabled.
34+
An another column called `userId` has been added to the `MongoRequests` table in the Azure Portal Diagnostics feature. This column identifies which user performed which data plan operation. The value in this column is empty when RBAC isn't enabled.
3535

3636
## Available Privileges
3737
#### Query and Write
@@ -63,7 +63,7 @@ An additional column called `userId` has been added to the `MongoRequests` table
6363
* listIndexes
6464

6565
## Built-in Roles
66-
These roles already exist on every database and do not need to be created.
66+
These roles already exist on every database and don't need to be created.
6767

6868
### read
6969
Has the following privileges: changeStream, collStats, find, killCursors, listIndexes, listCollections
@@ -87,7 +87,7 @@ az cloud set -n AzureCloud
8787
az login
8888
az account set --subscription <your subscription ID>
8989
```
90-
3. Enable the RBAC capability on your existing API for MongoDB database account. You'll need to [add the capability](how-to-configure-capabilities.md) "EnableMongoRoleBasedAccessControl" to your database account. RBAC can also be enabled via the features tab in the Azure portal instead.
90+
3. Enable the RBAC capability on your existing API for MongoDB database account. You need to [add the capability](how-to-configure-capabilities.md) "EnableMongoRoleBasedAccessControl" to your database account. RBAC can also be enabled via the features tab in the Azure portal instead.
9191
If you prefer a new database account instead, create a new database account with the RBAC capability set to true.
9292
```powershell
9393
az cosmosdb create -n <account_name> -g <azure_resource_group> --kind MongoDB --capabilities EnableMongoRoleBasedAccessControl
@@ -265,16 +265,17 @@ az cosmosdb mongodb user definition delete --account-name <account-name> --resou
265265

266266
- The number of users and roles you can create must equal less than 10,000.
267267
- The commands listCollections, listDatabases, killCursors, and currentOp are excluded from RBAC.
268-
- Users and Roles across databases are not supported.
268+
- Users and Roles across databases aren't supported.
269269
- A user's password can only be set/reset by through the Azure CLI / Azure PowerShell.
270270
- Configuring Users and Roles is only supported through Azure CLI / PowerShell.
271-
- Disabling primary/secondary key authentication is not supported. We recommend rotating your keys to prevent access when enabling RBAC.
271+
- Disabling primary/secondary key authentication isn't supported. We recommend rotating your keys to prevent access when enabling RBAC.
272+
- RBAC policies for Cosmos DB for Mongo DB RU won't be automatically reinstated following a restore operation. You'll be required to reconfigure these policies after the restoration process is complete.
272273

273274
## Frequently asked questions (FAQs)
274275

275276
### Is it possible to manage role definitions and role assignments from the Azure portal?
276277

277-
Azure portal support for role management is not available. However, RBAC can be enabled via the features tab in the Azure portal.
278+
Azure portal support for role management isn't available. However, RBAC can be enabled via the features tab in the Azure portal.
278279

279280
### How do I change a user's password?
280281

0 commit comments

Comments
 (0)