Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| azure:az-500:alt:role_based_access_control [2022/08/05 13:05] – [Azure AD roles vs. Azure Resource Manager (ARM) roles] mmuze | azure:az-500:alt:role_based_access_control [2023/02/06 22:44] (current) – [Role Based Access Control/RBAC] mmuze | ||
|---|---|---|---|
| Line 2: | Line 2: | ||
| > RBAC is an authorization system built on Azure Resource Manager that provides fine-grained access management of Azure resources. | > RBAC is an authorization system built on Azure Resource Manager that provides fine-grained access management of Azure resources. | ||
| - | * RBAC roles can be assigned at the level of subscription, | + | |
| + | * **//role scope://** RBAC roles can be assigned at the level of management group, | ||
| * Roles (role definitions) are comprised of scopes and permissions that apply to the scopes. | * Roles (role definitions) are comprised of scopes and permissions that apply to the scopes. | ||
| * The [[https:// | * The [[https:// | ||
| + | * Roles give some identity (user, group, service principle, managed identity) permission to perform some set of actions against some service providers for some defined scope (management group, subscription, | ||
| + | * Unlike AAD roles ARM roles can be assigned to synced groups in addition to cloud groups and users. | ||
| + | * **Custom Roles** require a P1 or P2 license | ||
| + | * In RBAC role definitions there are //actions// and //data actions//, with the former being actions on the //control plane// and the later on the //data plane//. For example, a permission that allows a storage account to be read (as in listing blob containers) is a control plane action, whereas reading the actual blobs is a data plane action. | ||
| + | |||
| ===== Azure AD roles vs. Azure Resource Manager (ARM) roles ===== | ===== Azure AD roles vs. Azure Resource Manager (ARM) roles ===== | ||
| * AAD Roles vs. ARM/Azure Roles | * AAD Roles vs. ARM/Azure Roles | ||
| + | * AzureAD Roles vs. AzureRM Roles | ||
| + | * Azure directory roles vs. Azure resource roles | ||
| * [[https:// | * [[https:// | ||
| Line 14: | Line 22: | ||
| * [[https:// | * [[https:// | ||
| * RBAC is generally thought of as being used to apply to the control plane, but it can also be used to apply to data plane operations. | * RBAC is generally thought of as being used to apply to the control plane, but it can also be used to apply to data plane operations. | ||
| - | * AAD roles cannot be assigned to regular user groups, but ARM roles can be assigned to regular groups. | + | * AAD roles cannot be assigned to regular user groups |
| + | |||
| + | |||
| + | * Azure AD roles control access to Azure AD resources such as users, groups, and applications using the Microsoft Graph API | ||
| + | * Azure roles control access to Azure resources such as virtual machines or storage using Azure Resource Management | ||
| + | * [[https:// | ||
| Line 57: | Line 70: | ||
| | Reader | Lets you view everything, but not make any changes | | | Reader | Lets you view everything, but not make any changes | | ||
| | User Access Administrator | Lets you manage user access to Azure resources. | | | User Access Administrator | Lets you manage user access to Azure resources. | | ||
| + | |||
| + | ====== Access Policies ====== | ||
| + | * In addition to RBAC roles some resources have an additional layer of access control in form of //access policies//. | ||
| + | * Roles operate at the // | ||