官术网_书友最值得收藏!

RBAC

With RBAC, you can manage who has access to the different Azure resources inside of your tenant. You can also set what the users can do with different Azure resources.

A best practice for assigning permissions is using the principle of least permissions; this involves giving users the exact permissions they need to do their jobs properly. Users, groups, and applications are added to roles in Azure, and those roles have certain permissions. You can use the built-in roles that Azure offers, or you can create custom roles in RBAC.

The roles in Azure can be added to a certain scope. This scope can be an Azure subscription, an Azure resource group, or a web application. Azure then uses access inheritance; roles that are added to a parent resource give access to child resources automatically. For instance, a group that is added to an Azure subscription gets access to all the resource groups and underlying resources that are in that subscription as well. A user that is added to a virtual machine (VM) only gets access to that particular VM.

Let's start looking at RBAC in detail by first looking at built-in roles.

主站蜘蛛池模板: 仁化县| 兰西县| 花垣县| 神木县| 扎囊县| 雷州市| 迁安市| 永平县| 河南省| 陵川县| 隆林| 渝中区| 大足县| 五家渠市| 高陵县| 长宁区| 芒康县| 抚顺市| 习水县| 龙泉市| 比如县| 翁牛特旗| 黑龙江省| 临洮县| 大悟县| 甘洛县| 平谷区| 东海县| 弥渡县| 宝鸡市| 桑日县| 西宁市| 新野县| 南川市| 南溪县| 贵阳市| 扶绥县| 汕尾市| 于都县| 泽库县| 托克逊县|