Skip to content

Commit ec67276

Browse files
authored
Merge pull request #100346 from rolyon/rolyon-rbac-title-fix
[Azure RBAC] Updated header
2 parents a9e36b5 + 5e28f16 commit ec67276

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/role-based-access-control/elevate-access-global-admin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ If you are a Global Administrator, there might be times when you want to do the
3333
- See all Azure subscriptions or management groups in an organization
3434
- Allow an automation app (such as an invoicing or auditing app) to access all Azure subscriptions or management groups
3535

36-
## How does elevate access work?
36+
## How does elevated access work?
3737

3838
Azure AD and Azure resources are secured independently from one another. That is, Azure AD role assignments do not grant access to Azure resources, and Azure role assignments do not grant access to Azure AD. However, if you are a [Global Administrator](../active-directory/users-groups-roles/directory-assign-admin-roles.md#company-administrator-permissions) in Azure AD, you can assign yourself access to all Azure subscriptions and management groups in your directory. Use this capability if you don't have access to Azure subscription resources, such as virtual machines or storage accounts, and you want to use your Global Administrator privilege to gain access to those resources.
3939

0 commit comments

Comments
 (0)