Skip to content

Commit f2c3709

Browse files
committed
add xref to built-in roles and Service Admin
1 parent ae5fb14 commit f2c3709

File tree

3 files changed

+13
-7
lines changed

3 files changed

+13
-7
lines changed

articles/storage/common/storage-account-keys-manage.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: tamram
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 12/18/2019
10+
ms.date: 03/31/2020
1111
ms.author: tamram
1212
---
1313

@@ -30,6 +30,8 @@ Microsoft recommends using Azure Key Vault to manage and rotate your access keys
3030
- [Manage storage account keys with Azure Key Vault and PowerShell](../../key-vault/key-vault-overview-storage-keys-powershell.md)
3131
- [Manage storage account keys with Azure Key Vault and the Azure CLI](../../key-vault/key-vault-ovw-storage-keys.md)
3232

33+
To view or read an account's access keys, the user must either be a Service Administrator, or the user must be assigned an RBAC role that includes the **Microsoft.Storage/storageAccounts/listkeys/action**. For more information about the Service Administrator role, see [Classic subscription administrator roles, Azure RBAC roles, and Azure AD roles](../../role-based-access-control/rbac-and-directory-admin-roles.md). For detailed information about built-in roles for Azure Storage, see the **Storage** section in [Azure built-in roles for Azure RBAC](../articles/role-based-access-control/built-in-roles.md#storage).
34+
3335
## Manually rotate access keys
3436

3537
Microsoft recommends that you rotate your access keys periodically to help keep your storage account secure. If possible, use Azure Key Vault to manage your access keys. If you are not using Key Vault, you will need to rotate your keys manually.
@@ -49,6 +51,8 @@ Follow this process to rotate your storage account keys:
4951
> [!NOTE]
5052
> Microsoft recommends using only one of the keys in all of your applications at the same time. If you use Key 1 in some places and Key 2 in others, you will not be able to rotate your keys without some application losing access.
5153
54+
To rotate an account's access keys, the user must either be a Service Administrator, or must be assigned an RBAC role that includes the **Microsoft.Storage/storageAccounts/regeneratekey/action**. For more information about the Service Administrator role, see [Classic subscription administrator roles, Azure RBAC roles, and Azure AD roles](../../role-based-access-control/rbac-and-directory-admin-roles.md). For detailed information about built-in RBAC roles for Azure Storage, see the **Storage** section in [Azure built-in roles for Azure RBAC](../articles/role-based-access-control/built-in-roles.md#storage).
55+
5256
## Next steps
5357

5458
- [Azure storage account overview](storage-account-overview.md)

articles/storage/common/storage-auth-aad-rbac-portal.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: tamram
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 01/10/2020
10+
ms.date: 03/31/2020
1111
ms.author: tamram
1212
ms.reviewer: cbrooks
1313
ms.subservice: common
@@ -19,13 +19,13 @@ Azure Active Directory (Azure AD) authorizes access rights to secured resources
1919

2020
When an RBAC role is assigned to an Azure AD security principal, Azure grants access to those resources for that security principal. Access can be scoped to the level of the subscription, the resource group, the storage account, or an individual container or queue. An Azure AD security principal may be a user, a group, an application service principal, or a [managed identity for Azure resources](../../active-directory/managed-identities-azure-resources/overview.md).
2121

22-
This article describes how to use the Azure portal to assign RBAC roles. The Azure portal provides a simple interface for assigning RBAC roles and managing access to your storage resources. You can also assign RBAC roles for blob and queue resources using Azure command-line tools or the Azure Storage management APIs. For more information about RBAC roles for storage resources, see [Authenticate access to Azure blobs and queues using Azure Active Directory](storage-auth-aad.md).
22+
This article describes how to use the Azure portal to assign RBAC roles. The Azure portal provides a simple interface for assigning RBAC roles and managing access to your storage resources. You can also assign RBAC roles for blob and queue resources using Azure command-line tools or the Azure Storage management APIs. For more information about RBAC roles for storage resources, see [Authenticate access to Azure blobs and queues using Azure Active Directory](storage-auth-aad.md).
2323

2424
## RBAC roles for blobs and queues
2525

2626
[!INCLUDE [storage-auth-rbac-roles-include](../../../includes/storage-auth-rbac-roles-include.md)]
2727

28-
## Determine resource scope
28+
## Determine resource scope
2929

3030
[!INCLUDE [storage-auth-resource-scope-include](../../../includes/storage-auth-resource-scope-include.md)]
3131

@@ -48,11 +48,11 @@ The following sections describe each of these steps in more detail.
4848

4949
Before you assign a role to a security principal, be sure to consider the scope of the permissions you are granting. Review the [Determine resource scope](#determine-resource-scope) section to decide the appropriate scope.
5050

51-
The procedure shown here assigns a role scoped to a container, but you can follow the same steps to assign a role scoped to a queue:
51+
The procedure shown here assigns a role scoped to a container, but you can follow the same steps to assign a role scoped to a queue:
5252

5353
1. In the [Azure portal](https://portal.azure.com), go to your storage account and display the **Overview** for the account.
54-
1. Under Services, select **Blobs**.
55-
1. Locate the container for which you want to assign a role, and display the container's settings.
54+
1. Under Services, select **Blobs**.
55+
1. Locate the container for which you want to assign a role, and display the container's settings.
5656
1. Select **Access control (IAM)** to display access control settings for the container. Select the **Role assignments** tab to see the list of role assignments.
5757

5858
![Screenshot showing container access control settings](media/storage-auth-aad-rbac-portal/portal-access-control-for-storage.png)

includes/storage-auth-rbac-roles-include.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ Azure provides the following built-in RBAC roles for authorizing access to blob
2020
- [Storage Queue Data Message Processor](../articles/role-based-access-control/built-in-roles.md#storage-queue-data-message-processor): Use to grant peek, retrieve, and delete permissions to messages in Azure Storage queues.
2121
- [Storage Queue Data Message Sender](../articles/role-based-access-control/built-in-roles.md#storage-queue-data-message-sender): Use to grant add permissions to messages in Azure Storage queues.
2222

23+
For detailed information about built-in RBAC roles for Azure Storage for both the data services and the management service, see the **Storage** section in [Azure built-in roles for Azure RBAC](../articles/role-based-access-control/built-in-roles.md#storage). Additionally, for information about the different types of roles that provide permissions in Azure, see [Classic subscription administrator roles, Azure RBAC roles, and Azure AD roles](../../role-based-access-control/rbac-and-directory-admin-roles.md).
24+
2325
> [!NOTE]
2426
> RBAC role assignments may take up to five minutes to propagate.
2527
>

0 commit comments

Comments
 (0)