Skip to content

Commit ef25f0b

Browse files
authored
Merge pull request #206231 from jimmart-dev/jammart-abac-RunAsSuperUser-1
make minimal changes to abac examples for RunAsSuperUser
2 parents 7a73e92 + d40fc38 commit ef25f0b

File tree

2 files changed

+11
-1
lines changed

2 files changed

+11
-1
lines changed
2.86 KB
Loading

articles/storage/common/storage-auth-abac-examples.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,13 @@ titleSuffix: Azure Storage
44
description: Example Azure role assignment conditions for Azure attribute-based access control (Azure ABAC).
55
services: storage
66
author: jimmart-dev
7+
78
ms.service: storage
89
ms.topic: conceptual
910
ms.author: jammart
1011
ms.reviewer:
1112
ms.subservice: common
12-
ms.date: 05/24/2022
13+
ms.date: 07/28/2022
1314

1415
#Customer intent: As a dev, devops, or it admin, I want to learn about the conditions so that I write more complex conditions.
1516
---
@@ -46,6 +47,7 @@ You must add this condition to any role assignments that include the following a
4647
> | Action | Notes |
4748
> | --- | --- |
4849
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read` | |
50+
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action` | Add if role definition includes this action, such as Storage Blob Data Owner. |
4951
5052
![Diagram of condition showing read access to blobs with a blob index tag.](./media/storage-auth-abac-examples/blob-index-tags-read.png)
5153

@@ -107,6 +109,7 @@ There are two actions that allow you to create new blobs, so you must target bot
107109
> | --- | --- |
108110
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write` | |
109111
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action` | |
112+
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action` | Add if role definition includes this action, such as Storage Blob Data Owner. |
110113
111114
![Diagram of condition showing new blobs must include a blob index tag.](./media/storage-auth-abac-examples/blob-index-tags-new-blobs.png)
112115

@@ -177,6 +180,7 @@ There are two actions that allow you to update tags on existing blobs, so you mu
177180
> | --- | --- |
178181
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write` | |
179182
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags/write` | |
183+
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action` | Add if role definition includes this action, such as Storage Blob Data Owner. |
180184
181185
![Diagram of condition showing existing blobs must have blob index tag keys.](./media/storage-auth-abac-examples/blob-index-tags-keys.png)
182186

@@ -246,6 +250,7 @@ There are two actions that allow you to update tags on existing blobs, so you mu
246250
> | --- | --- |
247251
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write` | |
248252
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags/write` | |
253+
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action` | Add if role definition includes this action, such as Storage Blob Data Owner. |
249254
250255
![Diagram of condition showing existing blobs must have a blob index tag key and values.](./media/storage-auth-abac-examples/blob-index-tags-key-values.png)
251256

@@ -738,6 +743,7 @@ You must add this condition to any role assignments that include the following a
738743
> | Action | Notes |
739744
> | --- | --- |
740745
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read` | |
746+
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action` | Add if role definition includes this action, such as Storage Blob Data Owner. |
741747
742748
![Diagram of condition showing read access to blobs with a blob index tag and a path.](./media/storage-auth-abac-examples/blob-index-tags-path-read.png)
743749

@@ -1100,6 +1106,7 @@ You must add this condition to any role assignments that include the following a
11001106
> | Action | Notes |
11011107
> | --- | --- |
11021108
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read` | |
1109+
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action` | Add if role definition includes this action, such as Storage Blob Data Owner. |
11031110
11041111
![Diagram of condition showing read access to blobs with encryption scope validScope1 or validScope2.](./media/storage-auth-abac-examples/encryption-scope-read-blobs.png)
11051112

@@ -1140,6 +1147,7 @@ You must add this condition to any role assignments that include the following a
11401147
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read` | |
11411148
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write` | |
11421149
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action` | |
1150+
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action` | Add if role definition includes this action, such as Storage Blob Data Owner. |
11431151
11441152
> [!NOTE]
11451153
> Since encryption scopes for different storage accounts could be different, it's recommended to use the `storageAccounts:name` attribute with the `encryptionScopes:name` attribute to restrict the specific encryption scope to be allowed.
@@ -1199,6 +1207,7 @@ You must add this condition to any role assignments that include the following a
11991207
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read` | |
12001208
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write` | |
12011209
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action` | |
1210+
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action` | Add if role definition includes this action, such as Storage Blob Data Owner. |
12021211
12031212
For more information, see [Allow read access to blobs based on tags and custom security attributes](../../role-based-access-control/conditions-custom-security-attributes.md).
12041213

@@ -1268,6 +1277,7 @@ You must add this condition to any role assignments that include the following a
12681277
> | Action | Notes |
12691278
> | --- | --- |
12701279
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read` | |
1280+
> | `Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action` | Add if role definition includes this action, such as Storage Blob Data Owner. |
12711281
12721282
For more information, see [Allow read access to blobs based on tags and custom security attributes](../../role-based-access-control/conditions-custom-security-attributes.md).
12731283

0 commit comments

Comments
 (0)