|
1 | 1 | ---
|
2 |
| -title: Assign an Azure role for access to table data (preview) |
| 2 | +title: Assign an Azure role for access to table data |
3 | 3 | titleSuffix: Azure Storage
|
4 |
| -description: Learn how to assign permissions for table data (preview) to an Azure Active Directory security principal with Azure role-based access control (Azure RBAC). Azure Storage supports built-in and Azure custom roles for authentication and authorization via Azure AD. |
| 4 | +description: Learn how to assign permissions for table data to an Azure Active Directory security principal with Azure role-based access control (Azure RBAC). Azure Storage supports built-in and Azure custom roles for authentication and authorization via Azure AD. |
5 | 5 | services: storage
|
6 | 6 | author: tamram
|
7 | 7 |
|
8 | 8 | ms.service: storage
|
9 | 9 | ms.topic: how-to
|
10 |
| -ms.date: 07/13/2021 |
| 10 | +ms.date: 03/03/2022 |
11 | 11 | ms.author: tamram
|
12 |
| -ms.reviewer: dineshm |
| 12 | +ms.reviewer: nachakra |
13 | 13 | ms.subservice: common
|
14 | 14 | ms.custom: devx-track-azurepowershell, devx-track-azurecli
|
15 | 15 | ms.devlang: azurecli
|
16 | 16 | ---
|
17 | 17 |
|
18 |
| -# Assign an Azure role for access to table data (preview) |
| 18 | +# Assign an Azure role for access to table data |
19 | 19 |
|
20 |
| -Azure Active Directory (Azure AD) authorizes access rights to secured resources through [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md). Azure Storage defines a set of Azure built-in roles that encompass common sets of permissions used to access table data in Azure Storage (preview). |
| 20 | +Azure Active Directory (Azure AD) authorizes access rights to secured resources through [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md). Azure Storage defines a set of Azure built-in roles that encompass common sets of permissions used to access table data in Azure Storage. |
21 | 21 |
|
22 | 22 | When an Azure role is assigned to an Azure AD security principal, Azure grants access to those resources for that security principal. An Azure AD security principal may be a user, a group, an application service principal, or a [managed identity for Azure resources](../../active-directory/managed-identities-azure-resources/overview.md).
|
23 | 23 |
|
24 | 24 | To learn more about using Azure AD to authorize access to table data, see [Authorize access to tables using Azure Active Directory](authorize-access-azure-active-directory.md).
|
25 | 25 |
|
26 |
| -> [!IMPORTANT] |
27 |
| -> Authorization with Azure AD for tables is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability. |
28 |
| -
|
29 | 26 | ## Assign an Azure role
|
30 | 27 |
|
31 | 28 | You can use PowerShell, Azure CLI, or an Azure Resource Manager template to assign a role for data access.
|
32 | 29 |
|
| 30 | +> [!IMPORTANT] |
| 31 | +> The Azure portal does not currently support assigning an Azure RBAC role that is scoped to the table. To assign a role with table scope, use PowerShell, Azure CLI, or Azure Resource Manager. |
| 32 | +> |
| 33 | +> You can use the Azure portal to assign a role that grants access to table data to an Azure Resource Manager resource, such as the storage account, resource group, or subscription. |
| 34 | +
|
33 | 35 | # [PowerShell](#tab/powershell)
|
34 | 36 |
|
35 | 37 | To assign an Azure role to a security principal, call the [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment) command. The format of the command can differ based on the scope of the assignment. In order to run the command, you must have a role that includes **Microsoft.Authorization/roleAssignments/write** permissions assigned to you at the corresponding scope or above.
|
@@ -81,7 +83,6 @@ Keep in mind the following points about Azure role assignments in Azure Storage:
|
81 | 83 |
|
82 | 84 | - When you create an Azure Storage account, you are not automatically assigned permissions to access data via Azure AD. You must explicitly assign yourself an Azure role for Azure Storage. You can assign it at the level of your subscription, resource group, storage account, or table.
|
83 | 85 | - If the storage account is locked with an Azure Resource Manager read-only lock, then the lock prevents the assignment of Azure roles that are scoped to the storage account or a table.
|
84 |
| -- The preview version of Storage Explorer in the Azure portal does not support using Azure AD credentials to view and modify table data. Storage Explorer in the Azure portal always uses the account keys to access data. To use Storage Explorer in the Azure portal, you must be assigned a role that includes **Microsoft.Storage/storageAccounts/listkeys/action**. |
85 | 86 |
|
86 | 87 | ## Next steps
|
87 | 88 |
|
|
0 commit comments