Understanding Azure RBAC
Azure RBAC is the authorization system used to control access to Azure resources. Authentication answers who you are, but authorization answers what you are allowed to do. Azure RBAC operates by assigning a role to a security principal at a specific scope.
A role assignment always has three components:
Only when all three come together does access exist.
Who Can Be Assigned a Role
When granting access, the first question is who needs access.
Using groups and managed identities is considered a best practice because it reduces administrative overhead and improves security.
Built-in Azure Roles
Azure provides many built-in roles that cover common scenarios.
There are also many resource-specific roles, such as Virtual Machine Contributor or Storage Blob Data Reader, which are preferable to broad roles.
Understanding Scope
Scope defines where the role applies. Azure scopes follow a hierarchy.
Permissions assigned at a higher scope are inherited by lower scopes. This means a role assigned at the management group level can impact many subscriptions, which can be dangerous if misused.
Examples:
Best practice is always to assign the narrowest scope possible.
Assigning Roles
Before assigning a role, confirm that your own account has permission to assign roles. Roles can be assigned using:
There are limits to role assignments:
Most administrators use the Access control (IAM) blade in the Azure portal, which provides a consistent experience across resources.