Skip to content

Commit f2755fe

Browse files
Merge pull request #285716 from pauljewellmsft/rbac-scope
Add note about assigning roles to management scope
2 parents f3ace80 + 91fb088 commit f2755fe

File tree

3 files changed

+8
-3
lines changed

3 files changed

+8
-3
lines changed

articles/storage/blobs/assign-azure-role-data-access.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: pauljewellmsft
66
ms.author: pauljewell
77
ms.service: azure-blob-storage
88
ms.topic: how-to
9-
ms.date: 02/16/2024
9+
ms.date: 08/28/2024
1010
ms.reviewer: dineshm
1111
ms.devlang: powershell
1212
# ms.devlang: powershell, azurecli
@@ -177,6 +177,7 @@ Keep in mind the following points about Azure role assignments in Azure Storage:
177177

178178
- When you create an Azure Storage account, you aren't automatically assigned permissions to access data via Microsoft Entra ID. You must explicitly assign yourself an Azure role for Azure Storage. You can assign it at the level of your subscription, resource group, storage account, or container.
179179
- When you assign roles or remove role assignments, it can take up to 10 minutes for changes to take effect.
180+
- Built-in roles with data actions can be assigned at management group [scope](/azure/role-based-access-control/scope-overview#scope-levels). However, in rare scenarios there might be a significant delay (up to 12 hours) before data action permissions are effective for certain resource types. Permissions will eventually be applied. For built-in roles with data actions, adding or removing role assignments at management group scope is not recommended for scenarios where timely permission activation or revocation, such as Microsoft Entra Privileged Identity Management (PIM), is required.
180181
- If the storage account is locked with an Azure Resource Manager read-only lock, then the lock prevents the assignment of Azure roles that are scoped to the storage account or a container.
181182
- If you set the appropriate allow permissions to access data via Microsoft Entra ID and are unable to access the data, for example you're getting an "AuthorizationPermissionMismatch" error. Be sure to allow enough time for the permissions changes you made in Microsoft Entra ID to replicate, and be sure that you don't have any deny assignments that block your access, see [Understand Azure deny assignments](../../role-based-access-control/deny-assignments.md).
182183

articles/storage/queues/assign-azure-role-data-access.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: akashdubey-ms
77

88
ms.service: azure-queue-storage
99
ms.topic: how-to
10-
ms.date: 07/13/2021
10+
ms.date: 08/28/2024
1111
ms.author: akashdubey
1212
ms.reviewer: dineshm
1313
ms.custom: devx-track-azurepowershell, devx-track-azurecli
@@ -99,6 +99,8 @@ To learn how to use an Azure Resource Manager template to assign an Azure role,
9999
Keep in mind the following points about Azure role assignments in Azure Storage:
100100

101101
- When you create an Azure Storage account, you are not automatically assigned permissions to access data via Microsoft Entra ID. You must explicitly assign yourself an Azure role for Azure Storage. You can assign it at the level of your subscription, resource group, storage account, or queue.
102+
- When you assign roles or remove role assignments, it can take up to 10 minutes for changes to take effect.
103+
- Built-in roles with data actions can be assigned at management group [scope](/azure/role-based-access-control/scope-overview#scope-levels). However, in rare scenarios there might be a significant delay (up to 12 hours) before data action permissions are effective for certain resource types. Permissions will eventually be applied. For built-in roles with data actions, adding or removing role assignments at management group scope is not recommended for scenarios where timely permission activation or revocation, such as Microsoft Entra Privileged Identity Management (PIM), is required.
102104
- If the storage account is locked with an Azure Resource Manager read-only lock, then the lock prevents the assignment of Azure roles that are scoped to the storage account or a queue.
103105

104106
## Next steps

articles/storage/tables/assign-azure-role-data-access.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: akashdubey-ms
77

88
ms.service: azure-table-storage
99
ms.topic: how-to
10-
ms.date: 03/03/2022
10+
ms.date: 08/28/2024
1111
ms.author: akashdubey
1212
ms.reviewer: nachakra
1313
ms.custom: devx-track-azurepowershell, devx-track-azurecli
@@ -81,6 +81,8 @@ To learn how to use an Azure Resource Manager template to assign an Azure role,
8181
Keep in mind the following points about Azure role assignments in Azure Storage:
8282

8383
- When you create an Azure Storage account, you are not automatically assigned permissions to access data via Microsoft Entra ID. You must explicitly assign yourself an Azure role for Azure Storage. You can assign it at the level of your subscription, resource group, storage account, or table.
84+
- When you assign roles or remove role assignments, it can take up to 10 minutes for changes to take effect.
85+
- Built-in roles with data actions can be assigned at management group [scope](/azure/role-based-access-control/scope-overview#scope-levels). However, in rare scenarios there might be a significant delay (up to 12 hours) before data action permissions are effective for certain resource types. Permissions will eventually be applied. For built-in roles with data actions, adding or removing role assignments at management group scope is not recommended for scenarios where timely permission activation or revocation, such as Microsoft Entra Privileged Identity Management (PIM), is required.
8486
- If the storage account is locked with an Azure Resource Manager read-only lock, then the lock prevents the assignment of Azure roles that are scoped to the storage account or a table.
8587

8688
## Next steps

0 commit comments

Comments
 (0)