SC‑300 Study Portal Path 3

Unit 2: Assign Azure Roles

Understanding Azure RBAC

Azure RBAC is the authorization system used to control access to Azure resources. Authentication answers who you are, but authorization answers what you are allowed to do. Azure RBAC operates by assigning a role to a security principal at a specific scope.

A role assignment always has three components:

Only when all three come together does access exist.

Who Can Be Assigned a Role

When granting access, the first question is who needs access.

Using groups and managed identities is considered a best practice because it reduces administrative overhead and improves security.

Built-in Azure Roles

Azure provides many built-in roles that cover common scenarios.

There are also many resource-specific roles, such as Virtual Machine Contributor or Storage Blob Data Reader, which are preferable to broad roles.

Understanding Scope

Scope defines where the role applies. Azure scopes follow a hierarchy.

Permissions assigned at a higher scope are inherited by lower scopes. This means a role assigned at the management group level can impact many subscriptions, which can be dangerous if misused.

Examples:

Best practice is always to assign the narrowest scope possible.

Assigning Roles

Before assigning a role, confirm that your own account has permission to assign roles. Roles can be assigned using:

There are limits to role assignments:

Most administrators use the Access control (IAM) blade in the Azure portal, which provides a consistent experience across resources.