Skip to content

Commit f433a30

Browse files
authored
Merge pull request #203048 from rolyon/rolyon-rbac-custom-roles-wildcard-note
[Azure RBAC] Custom roles wildcard best practice
2 parents eb4c1e2 + ad0bc00 commit f433a30

File tree

2 files changed

+8
-2
lines changed

2 files changed

+8
-2
lines changed

articles/role-based-access-control/best-practices.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: karenhoran
77
ms.service: role-based-access-control
88
ms.topic: conceptual
99
ms.workload: identity
10-
ms.date: 11/15/2021
10+
ms.date: 06/28/2022
1111
ms.author: rolyon
1212

1313
#Customer intent: As a dev, devops, or it admin, I want to learn how to best use Azure RBAC.
@@ -54,6 +54,10 @@ Even if a role is renamed, the role ID does not change. If you are using scripts
5454

5555
For more information, see [Assign a role using the unique role ID and Azure PowerShell](role-assignments-powershell.md#assign-a-role-for-a-user-using-the-unique-role-id-at-a-resource-group-scope) and [Assign a role using the unique role ID and Azure CLI](role-assignments-cli.md#assign-a-role-for-a-user-using-the-unique-role-id-at-a-resource-group-scope).
5656

57+
## Avoid using a wildcard when creating custom roles
58+
59+
When creating custom roles, you can use the wildcard (`*`) character to define permissions. It's recommended that you specify `Actions` and `DataActions` explicitly instead of using the wildcard (`*`) character. The additional access and permissions granted through future `Actions` or `DataActions` may be unwanted behavior using the wildcard. For more information, see [Azure custom roles](custom-roles.md#wildcard-permissions).
60+
5761
## Next steps
5862

5963
- [Troubleshoot Azure RBAC](troubleshooting.md)

articles/role-based-access-control/custom-roles.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: karenhoran
77
ms.service: role-based-access-control
88
ms.topic: conceptual
99
ms.workload: identity
10-
ms.date: 06/14/2022
10+
ms.date: 06/28/2022
1111
ms.author: rolyon
1212
---
1313

@@ -178,6 +178,8 @@ Instead of adding all of these strings, you could just add a wildcard string. Fo
178178
Microsoft.CostManagement/exports/*
179179
```
180180

181+
It's recommended that you specify `Actions` and `DataActions` explicitly instead of using the wildcard (`*`) character. The additional access and permissions granted through future `Actions` or `DataActions` may be unwanted behavior using the wildcard.
182+
181183
## Who can create, delete, update, or view a custom role
182184

183185
Just like built-in roles, the `AssignableScopes` property specifies the scopes that the role is available for assignment. The `AssignableScopes` property for a custom role also controls who can create, delete, update, or view the custom role.

0 commit comments

Comments
 (0)