官术网_书友最值得收藏!

RBAC

With RBAC, you can manage who has access to the different Azure resources inside of your tenant. You can also set what the users can do with different Azure resources.

A best practice for assigning permissions is using the principle of least permissions; this involves giving users the exact permissions they need to do their jobs properly. Users, groups, and applications are added to roles in Azure, and those roles have certain permissions. You can use the built-in roles that Azure offers, or you can create custom roles in RBAC.

The roles in Azure can be added to a certain scope. This scope can be an Azure subscription, an Azure resource group, or a web application. Azure then uses access inheritance; roles that are added to a parent resource give access to child resources automatically. For instance, a group that is added to an Azure subscription gets access to all the resource groups and underlying resources that are in that subscription as well. A user that is added to a virtual machine (VM) only gets access to that particular VM.

Let's start looking at RBAC in detail by first looking at built-in roles.

主站蜘蛛池模板: 扶风县| 平阴县| 金坛市| 湘潭市| 鹤壁市| 建阳市| 德化县| 西乡县| 沾化县| 耿马| 炉霍县| 包头市| 安义县| 安多县| 抚顺市| 蓬安县| 南开区| 商城县| 郁南县| 定日县| 和平区| 万荣县| 会昌县| 四川省| 莎车县| 虎林市| 靖宇县| 宜春市| 武城县| 句容市| 尉氏县| 招远市| 闽侯县| 都安| 都安| 仁布县| 永寿县| 红河县| 天门市| 合山市| 连云港市|