You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cosmos-db/mongodb/how-to-setup-rbac.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,14 +15,14 @@ ms.subservice: mongodb
15
15
16
16
This article is about role-based access control for data plane operations in Azure Cosmos DB for MongoDB.
17
17
18
-
If you are using management plane operations, see [role-based access control](../role-based-access-control.md) applied to your management plane operations article.
18
+
If you're using management plane operations, see [role-based access control](../role-based-access-control.md) applied to your management plane operations article.
19
19
20
20
Azure Cosmos DB for MongoDB exposes a built-in role-based access control (RBAC) system that lets you authorize your data requests with a fine-grained, role-based permission model. Users and roles reside within a database and are managed using the Azure CLI, Azure PowerShell, or Azure Resource Manager (ARM).
21
21
22
22
## Concepts
23
23
24
24
### Resource
25
-
A resource is a collection or database to which we are applying access control rules.
25
+
A resource is a collection or database to which we're applying access control rules.
26
26
27
27
### Privileges
28
28
Privileges are actions that can be performed on a specific resource. For example, "read access to collection xyz". Privileges are assigned to a specific role.
@@ -31,7 +31,7 @@ Privileges are actions that can be performed on a specific resource. For example
31
31
A role has one or more privileges. Roles are assigned to users (zero or more) to enable them to perform the actions defined in those privileges. Roles are stored within a single database.
32
32
33
33
### Diagnostic log auditing
34
-
An additional column called `userId` has been added to the `MongoRequests` table in the Azure Portal Diagnostics feature. This column will identify which user performed which data plan operation. The value in this column is empty when RBAC is not enabled.
34
+
An another column called `userId` has been added to the `MongoRequests` table in the Azure Portal Diagnostics feature. This column identifies which user performed which data plan operation. The value in this column is empty when RBAC isn't enabled.
35
35
36
36
## Available Privileges
37
37
#### Query and Write
@@ -63,7 +63,7 @@ An additional column called `userId` has been added to the `MongoRequests` table
63
63
* listIndexes
64
64
65
65
## Built-in Roles
66
-
These roles already exist on every database and do not need to be created.
66
+
These roles already exist on every database and don't need to be created.
67
67
68
68
### read
69
69
Has the following privileges: changeStream, collStats, find, killCursors, listIndexes, listCollections
@@ -87,7 +87,7 @@ az cloud set -n AzureCloud
87
87
az login
88
88
az account set --subscription <your subscription ID>
89
89
```
90
-
3. Enable the RBAC capability on your existing API for MongoDB database account. You'll need to [add the capability](how-to-configure-capabilities.md) "EnableMongoRoleBasedAccessControl" to your database account. RBAC can also be enabled via the features tab in the Azure portal instead.
90
+
3. Enable the RBAC capability on your existing API for MongoDB database account. You need to [add the capability](how-to-configure-capabilities.md) "EnableMongoRoleBasedAccessControl" to your database account. RBAC can also be enabled via the features tab in the Azure portal instead.
91
91
If you prefer a new database account instead, create a new database account with the RBAC capability set to true.
@@ -265,16 +265,17 @@ az cosmosdb mongodb user definition delete --account-name <account-name> --resou
265
265
266
266
- The number of users and roles you can create must equal less than 10,000.
267
267
- The commands listCollections, listDatabases, killCursors, and currentOp are excluded from RBAC.
268
-
- Users and Roles across databases are not supported.
268
+
- Users and Roles across databases aren't supported.
269
269
- A user's password can only be set/reset by through the Azure CLI / Azure PowerShell.
270
270
- Configuring Users and Roles is only supported through Azure CLI / PowerShell.
271
-
- Disabling primary/secondary key authentication is not supported. We recommend rotating your keys to prevent access when enabling RBAC.
271
+
- Disabling primary/secondary key authentication isn't supported. We recommend rotating your keys to prevent access when enabling RBAC.
272
+
- RBAC policies for Cosmos DB for Mongo DB RU won't be automatically reinstated following a restore operation. You'll be required to reconfigure these policies after the restoration process is complete.
272
273
273
274
## Frequently asked questions (FAQs)
274
275
275
276
### Is it possible to manage role definitions and role assignments from the Azure portal?
276
277
277
-
Azure portal support for role management is not available. However, RBAC can be enabled via the features tab in the Azure portal.
278
+
Azure portal support for role management isn't available. However, RBAC can be enabled via the features tab in the Azure portal.
0 commit comments