Skip to content

Commit c050c38

Browse files
committed
Updates from PR review
1 parent 7e8b74f commit c050c38

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/role-based-access-control/role-assignments.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: johndowns
77
ms.service: role-based-access-control
88
ms.topic: conceptual
99
ms.workload: identity
10-
ms.date: 09/30/2022
10+
ms.date: 10/03/2022
1111
ms.author: jodowns
1212
---
1313
# Understand Azure role assignments
@@ -147,6 +147,8 @@ You typically build conditions using a visual condition editor, but here's what
147147
((!(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read'} AND NOT SubOperationMatches{'Blob.List'})) OR (@resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags:Project<$key_case_sensitive$>] StringEqualsIgnoreCase 'Cascade'))
148148
```
149149

150+
The preceding condition allows users to read blobs with a blob index tag key of *Project* and a value of *Cascade*.
151+
150152
For more information about conditions, see [What is Azure attribute-based access control (Azure ABAC)?](conditions-overview.md)
151153

152154
## Next steps

0 commit comments

Comments
 (0)