官术网_书友最值得收藏!

Built-in roles

Azure offers various built-in roles that you can use for assigning permissions to users, groups, and applications. RBAC offers the following three standard roles that you can assign to each Azure resource:

  • Owner: Users in this role can manage everything, and can create new resources.
  • Contributor: Users in this role can manage everything, just like users in the owner role, but they can't assign access to others.
  • Reader: Users in this role can read everything, but they are not allowed to make any changes.

Aside from the standard roles, each Azure resource also has roles that are scoped to particular resources. For instance, you can assign users, groups, or applications to the SQL security manager, from which they can manage all security-related policies of the Azure SQL Server, or you can assign them to the VM contributor role, where they can manage the VMs, but not the VNet or storage accounts that are connected to a VM.

For an overview of all the built-in roles that Azure offers, you can refer to  https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles.

While these built-in roles usually cover all possible use cases, they can never account for every requirement in an organization. To allow for flexibility in role assignment, RBAC provides the ability to make custom roles. Let's look at this feature.

主站蜘蛛池模板: 贡觉县| 卢龙县| 沿河| 安图县| 玉溪市| 南漳县| 宁陕县| 宣化县| 仁怀市| 广德县| 漾濞| 长葛市| 青海省| 镶黄旗| 长海县| 大竹县| 内乡县| 乌鲁木齐市| 德保县| 阿鲁科尔沁旗| 当阳市| 巴塘县| 无极县| 凤山县| 石棉县| 石首市| 那坡县| 东山县| 寻乌县| 长沙市| 雷波县| 柘荣县| 安陆市| 鸡泽县| 尼玛县| 江源县| 图片| 基隆市| 兴文县| 广东省| 汝阳县|