Skip to content

Commit ecf9725

Browse files
Merge pull request #248116 from guywi-ms/table-level-rbac-updates
Update manage-access.md
2 parents 9c8edeb + 663e535 commit ecf9725

File tree

1 file changed

+16
-13
lines changed

1 file changed

+16
-13
lines changed

articles/azure-monitor/logs/manage-access.md

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -308,7 +308,7 @@ Granting table-level read access involves assigning a user two roles:
308308
- At the workspace level - a custom role that provides limited permissions to read workspace details and run a query in the workspace, but not to read data from any tables.
309309
- At the table level - a **Reader** role, scoped to the specific table.
310310

311-
To grant a user or group table-level read access to a specific table:
311+
**To grant a user or group limited permissions to the Log Analytics workspace:**
312312

313313
1. Create a [custom role](../../role-based-access-control/custom-roles.md) at the workspace level to let users read workspace details and run a query in the workspace, without providing read access to data in any tables:
314314

@@ -365,21 +365,24 @@ To grant a user or group table-level read access to a specific table:
365365

366366
1. Search for and select a user and click **Select**.
367367
1. Select **Review and assign**.
368-
369-
1. Grant the user read access to a specific table:
368+
369+
The user can now read workspace details and run a query, but can't read data from any tables.
370370

371-
1. From the **Log Analytics workspaces** menu, select **Tables**.
372-
1. Select the ellipsis ( **...** ) to the right of your table and select **Access control (IAM)**.
373-
374-
:::image type="content" source="media/manage-access/table-level-access-control.png" alt-text="Screenshot that shows the Log Analytics workspace table management screen with the table-level access control button highlighted." lightbox="media/manage-access/manage-access-create-custom-role-json.png":::
371+
**To grant the user read access to a specific table:**
372+
373+
1. From the **Log Analytics workspaces** menu, select **Tables**.
374+
1. Select the ellipsis ( **...** ) to the right of your table and select **Access control (IAM)**.
375375

376-
1. On the **Access control (IAM)** screen, select **Add** > **Add role assignment**.
377-
1. Select the **Reader** role and select **Next**.
378-
1. Click **+ Select members** to open the **Select members** screen.
379-
1. Search for and select the user and click **Select**.
380-
1. Select **Review and assign**.
376+
:::image type="content" source="media/manage-access/table-level-access-control.png" alt-text="Screenshot that shows the Log Analytics workspace table management screen with the table-level access control button highlighted." lightbox="media/manage-access/manage-access-create-custom-role-json.png":::
377+
378+
1. On the **Access control (IAM)** screen, select **Add** > **Add role assignment**.
379+
1. Select the **Reader** role and select **Next**.
380+
1. Click **+ Select members** to open the **Select members** screen.
381+
1. Search for and select the user and click **Select**.
382+
1. Select **Review and assign**.
381383

382-
The user can now read data from this specific table.
384+
The user can now read data from this specific table. Grant the user read access to other tables in the workspace, as needed.
385+
383386
### Legacy method of setting table-level read access
384387

385388
The legacy method of table-level also uses [Azure custom roles](../../role-based-access-control/custom-roles.md) to let you grant specific users or groups access to specific tables in the workspace. Azure custom roles apply to workspaces with either workspace-context or resource-context [access control modes](#access-control-mode) regardless of the user's [access mode](#access-mode).

0 commit comments

Comments
 (0)