You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Share Azure portal dashboards by using RBAC | Microsoft Docs
2
+
title: Share Azure portal dashboards by using Role-Based Access Control
3
3
description: This article explains how to share a dashboard in the Azure portal by using Role-Based Access Control.
4
4
services: azure-portal
5
5
documentationcenter: ''
@@ -13,65 +13,81 @@ ms.devlang: NA
13
13
ms.topic: conceptual
14
14
ms.tgt_pltfrm: NA
15
15
ms.workload: na
16
-
ms.date: 08/01/2016
16
+
ms.date: 01/29/2020
17
17
ms.author: mblythe
18
18
19
19
---
20
20
# Share Azure dashboards by using Role-Based Access Control
21
21
22
-
After configuring a dashboard, you can publish it and share it with other users in your organization. You allow others to view your dashboard by using Azure [Role-Based Access Control](../role-based-access-control/role-assignments-portal.md). You assign a user or group of users to a role, and that role defines whether those users can view or modify the published dashboard.
22
+
After configuring a dashboard, you can publish it and share it with other users in your organization. You allow others to view your dashboard by using Azure [Role-Based Access Control](../role-based-access-control/role-assignments-portal.md) (RBAC). Assign a user or group of users to a role. That role defines whether those users can view or modify the published dashboard.
23
23
24
-
All published dashboards are implemented as Azure resources, which means they exist as manageable items within your subscription and are contained in a resource group. From an access control perspective, dashboards are no different than other resources, such as a virtual machine or a storage account.
24
+
All published dashboards are implemented as Azure resources. They exist as manageable items within your subscription and are contained in a resource group. From an access control perspective, dashboards are no different than other resources, such as a virtual machine or a storage account.
25
25
26
26
> [!TIP]
27
-
> Individual tiles on the dashboard enforce their own access control requirements based on the resources they display. Therefore, you can design a dashboard that is shared broadly while still protecting the data on individual tiles.
27
+
> Individual tiles on the dashboard enforce their own access control requirements based on the resources they display. You can share a dashboard broadly while protecting the data on individual tiles.
28
28
>
29
29
>
30
30
31
31
## Understanding access control for dashboards
32
+
32
33
With Role-Based Access Control (RBAC), you can assign users to roles at three different levels of scope:
33
34
34
35
* subscription
35
36
* resource group
36
37
* resource
37
38
38
-
The permissions you assign are inherited from subscription down to the resource. The published dashboard is a resource. Therefore, you may already have users assigned to roles for the subscription which also work for the published dashboard.
39
+
The permissions you assign inherit from subscription down to the resource. The published dashboard is a resource. You may already have users assigned to roles for the subscription that apply for the published dashboard.
39
40
40
-
Here is an example. Let's say you have an Azure subscription and various members of your team have been assigned the roles of **owner**, **contributor**, or **reader** for the subscription. Users who are owners or contributors are able to list, view, create, modify, or delete dashboards within the subscription. Users who are readers are able to list and view dashboards, but cannot modify or delete them. Users with reader access are able to make local edits to a published dashboard (such as, when troubleshooting an issue), but are not able to publish those changes back to the server. They will have the option to make a private copy of the dashboard for themselves
41
+
Let's say you have an Azure subscription and various members of your team have been assigned the roles of *owner*, *contributor*, or *reader* for the subscription. Users who are owners or contributors can list, view, create, modify, or delete dashboards within the subscription. Users who are readers can list and view dashboards, but can't modify or delete them. Users with reader access can make local edits to a published dashboard, such as when troubleshooting an issue, but they can't publish those changes back to the server. They can make a private copy of the dashboard for themselves.
41
42
42
-
However, you could also assign permissions to the resource group that contains several dashboards or to an individual dashboard. For example, you may decide that a group of users should have limited permissions across the subscription but greater access to a particular dashboard. You assign those users to a role for that dashboard.
43
+
You could also assign permissions to the resource group that contains several dashboards or to an individual dashboard. For example, you may decide that a group of users should have limited permissions across the subscription but greater access to a particular dashboard. Assign those users to a role for that dashboard.
43
44
44
45
## Publish dashboard
45
-
Let's suppose you have finished configuring a dashboard that you want to share with a group of users in your subscription. The steps below depict a customized group called Storage Managers, but you can name your group whatever you would like. For information about creating an Active Directory group and adding users to that group, see [Managing groups in Azure Active Directory](../active-directory/fundamentals/active-directory-groups-create-azure-portal.md).
46
+
47
+
Let's suppose you configure a dashboard that you want to share with a group of users in your subscription. The following steps show how to share a dashboard to a group called Storage Managers. You can name your group whatever you like. For more information, see [Managing groups in Azure Active Directory](../active-directory/fundamentals/active-directory-groups-create-azure-portal.md).
48
+
49
+
Before assigning access, you must publish the dashboard.
2. Before assigning access, you must publish the dashboard. By default, the dashboard will be published to a resource group named **dashboards**. Select **Publish**.
Your dashboard is now published. If the permissions inherited from the subscription are suitable, you do not need to do anything more. Other users in your organization will be able to access and modify the dashboard based on their subscription level role. However, for this tutorial, let's assign a group of users to a role for that dashboard.
53
+

54
+
55
+
1. In **Sharing + access control**, select **Publish**.
56
+
57
+

58
+
59
+
By default, sharing publishes your dashboard to a resource group named **dashboards**.
60
+
61
+
Your dashboard is now published. If the permissions inherited from the subscription are suitable, you don't need to do anything more. Other users in your organization can access and modify the dashboard based on their subscription level role.
55
62
56
63
## Assign access to a dashboard
57
-
1. After publishing the dashboard, select **Manage users**.
2. You will see a list of existing users that are already assigned a role for this dashboard. Your list of existing users will be different than the image below. Most likely, the assignments are inherited from the subscription. To add a new user or group, select **Add**.
4. Select the user or group that you wish to assign to the role. If you do not see the user or group you are looking for in the list, use the search box. Your list of available groups will depend on the groups you have created in your Active Directory.
You can assign a group of users to a role for that dashboard.
66
+
67
+
1. After publishing the dashboard, in **Sharing + access control**, select **Manage users**.
68
+
69
+

70
+
71
+
To access **Sharing + access control** from a dashboard, select the **Share** or **Unshare** option.
72
+
73
+
1. Select **Role assignments** to see existing users that are already assigned a role for this dashboard.
74
+
75
+
1. To add a new user or group, select **Add**.
76
+
77
+

78
+
79
+
1. Select the role that represents the permissions to grant. For this example, select **Contributor**.
80
+
81
+
1. Select the user or group to assign to the role. If you don't see the user or group you're looking for in the list, use the search box. Your list of available groups depends on the groups you've created in Active Directory.
82
+
83
+
1. When you have finished adding users or groups, select **OK**.
84
+
85
+
The new assignment is added to the list of users. Its **Access** is listed as **Assigned** rather than **Inherited**.
0 commit comments