You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/overview.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.devlang: na
12
12
ms.topic: overview
13
13
ms.tgt_pltfrm: na
14
14
ms.workload: identity
15
-
ms.date: 09/11/2019
15
+
ms.date: 03/19/2020
16
16
ms.author: rolyon
17
17
ms.reviewer: bagovind
18
18
@@ -44,7 +44,7 @@ When planning your access control strategy, it's a best practice to grant users
44
44
45
45
## How RBAC works
46
46
47
-
The way you control access to resources using RBAC is to create role assignments. This is a key concept to understand – it’s how permissions are enforced. A role assignment consists of three elements: security principal, role definition, and scope.
47
+
The way you control access to resources using RBAC is to create role assignments. This is a key concept to understand – it's how permissions are enforced. A role assignment consists of three elements: security principal, role definition, and scope.
48
48
49
49
### Security principal
50
50
@@ -66,7 +66,7 @@ A *role definition* is a collection of permissions. It's typically just called a
66
66
Azure includes several [built-in roles](built-in-roles.md) that you can use. The following lists four fundamental built-in roles. The first three apply to all resource types.
67
67
68
68
-[Owner](built-in-roles.md#owner) - Has full access to all resources including the right to delegate access to others.
69
-
-[Contributor](built-in-roles.md#contributor) - Can create and manage all types of Azure resources but can’t grant access to others.
69
+
-[Contributor](built-in-roles.md#contributor) - Can create and manage all types of Azure resources but can't grant access to others.
70
70
-[Reader](built-in-roles.md#reader) - Can view existing Azure resources.
71
71
-[User Access Administrator](built-in-roles.md#user-access-administrator) - Lets you manage user access to Azure resources.
72
72
@@ -100,7 +100,7 @@ You can create role assignments using the Azure portal, Azure CLI, Azure PowerSh
100
100
101
101
## Multiple role assignments
102
102
103
-
So what happens if you have multiple overlapping role assignments? RBAC is an additive model, so your effective permissions are the addition of your role assignments. Consider the following example where a user is granted the Contributor role at the subscription scope and the Reader role on a resource group. The addition of the Contributor permissions and the Reader permissions is effectively the Contributor role for the resource group. Therefore, in this case, the Reader role assignment has no impact.
103
+
So what happens if you have multiple overlapping role assignments? RBAC is an additive model, so your effective permissions are the sum of your role assignments. Consider the following example where a user is granted the Contributor role at the subscription scope and the Reader role on a resource group. The sum of the Contributor permissions and the Reader permissions is effectively the Contributor role for the resource group. Therefore, in this case, the Reader role assignment has no impact.
104
104
105
105

106
106
@@ -124,7 +124,7 @@ The following are the high-level steps that RBAC uses to determine if you have a
124
124
125
125
1. Azure Resource Manager determines if the action in the API call is included in the roles the user has for this resource.
126
126
127
-
1. If the user doesn’t have a role with the action at the requested scope, access is not granted. Otherwise, Azure Resource Manager checks if a deny assignment applies.
127
+
1. If the user doesn't have a role with the action at the requested scope, access is not granted. Otherwise, Azure Resource Manager checks if a deny assignment applies.
128
128
129
129
1. If a deny assignment applies, access is blocked. Otherwise access is granted.
0 commit comments