You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/manage-access.md
+16-13Lines changed: 16 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -308,7 +308,7 @@ Granting table-level read access involves assigning a user two roles:
308
308
- At the workspace level - a custom role that provides limited permissions to read workspace details and run a query in the workspace, but not to read data from any tables.
309
309
- At the table level - a **Reader** role, scoped to the specific table.
310
310
311
-
To grant a user or group table-level read access to a specific table:
311
+
**To grant a user or group limited permissions to the Log Analytics workspace:**
312
312
313
313
1. Create a [custom role](../../role-based-access-control/custom-roles.md) at the workspace level to let users read workspace details and run a query in the workspace, without providing read access to data in any tables:
314
314
@@ -365,21 +365,24 @@ To grant a user or group table-level read access to a specific table:
365
365
366
366
1. Search for and select a user and click **Select**.
367
367
1. Select **Review and assign**.
368
-
369
-
1. Grant the user read access to a specific table:
368
+
369
+
The user can now read workspace details and run a query, but can't read data from any tables.
370
370
371
-
1. From the **Log Analytics workspaces** menu, select **Tables**.
372
-
1. Select the ellipsis ( **...** ) to the right of your table and select **Access control (IAM)**.
373
-
374
-
:::image type="content" source="media/manage-access/table-level-access-control.png" alt-text="Screenshot that shows the Log Analytics workspace table management screen with the table-level access control button highlighted." lightbox="media/manage-access/manage-access-create-custom-role-json.png":::
371
+
**To grant the user read access to a specific table:**
372
+
373
+
1. From the **Log Analytics workspaces** menu, select **Tables**.
374
+
1. Select the ellipsis ( **...** ) to the right of your table and select **Access control (IAM)**.
375
375
376
-
1. On the **Access control (IAM)** screen, select **Add** > **Add role assignment**.
377
-
1. Select the **Reader** role and select **Next**.
378
-
1. Click **+ Select members** to open the **Select members** screen.
379
-
1. Search for and select the user and click **Select**.
380
-
1. Select **Review and assign**.
376
+
:::image type="content" source="media/manage-access/table-level-access-control.png" alt-text="Screenshot that shows the Log Analytics workspace table management screen with the table-level access control button highlighted." lightbox="media/manage-access/manage-access-create-custom-role-json.png":::
377
+
378
+
1. On the **Access control (IAM)** screen, select **Add** > **Add role assignment**.
379
+
1. Select the **Reader** role and select **Next**.
380
+
1. Click **+ Select members** to open the **Select members** screen.
381
+
1. Search for and select the user and click **Select**.
382
+
1. Select **Review and assign**.
381
383
382
-
The user can now read data from this specific table.
384
+
The user can now read data from this specific table. Grant the user read access to other tables in the workspace, as needed.
385
+
383
386
### Legacy method of setting table-level read access
384
387
385
388
The legacy method of table-level also uses [Azure custom roles](../../role-based-access-control/custom-roles.md) to let you grant specific users or groups access to specific tables in the workspace. Azure custom roles apply to workspaces with either workspace-context or resource-context [access control modes](#access-control-mode) regardless of the user's [access mode](#access-mode).
0 commit comments