You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/best-practices.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ The following diagram shows a suggested pattern for using Azure RBAC.
24
24
25
25
:::image type="content" source="./media/best-practices/rbac-least-privilege.png" alt-text="Diagram of suggested pattern for using Azure RBAC and least privilege." lightbox="./media/best-practices/rbac-least-privilege.png":::
26
26
27
-
For information about how to assign roles, see [Assign Azure roles using the Azure portal](role-assignments-portal.yml).
27
+
For information about how to assign roles, see [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal).
@@ -235,7 +235,7 @@ Your Service Administrator might be a Microsoft account or a Microsoft Entra acc
235
235
236
236
1. If Service Administrator user is a Microsoft Entra account and you want this user to keep the same permissions, [convert the Service Administrator to Owner role](#how-to-convert-the-service-administrator-to-owner-role).
237
237
238
-
1. If you want to change the Service Administrator user to a different user, [assign the Owner role](role-assignments-portal.yml) to this new user at subscription scope without conditions. Then, [remove the Service Administrator](#how-to-remove-the-service-administrator).
238
+
1. If you want to change the Service Administrator user to a different user, [assign the Owner role](/azure/role-based-access-control/role-assignments-portal) to this new user at subscription scope without conditions. Then, [remove the Service Administrator](#how-to-remove-the-service-administrator).
239
239
240
240
### How to convert the Service Administrator to Owner role
241
241
@@ -281,5 +281,5 @@ The easiest way to convert the Service Administrator role assignment to the [Own
281
281
## Next steps
282
282
283
283
- [Understand the different roles](../role-based-access-control/rbac-and-directory-admin-roles.md)
284
-
- [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.yml)
284
+
- [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal)
285
285
- [Understand Microsoft Customer Agreement administrative roles in Azure](../cost-management-billing/manage/understand-mca-roles.md)
Copy file name to clipboardExpand all lines: articles/role-based-access-control/delegate-role-assignments-portal.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ Once you know the permissions that delegate needs, you use the following steps t
38
38
39
39
1. Sign in to the [Azure portal](https://portal.azure.com).
40
40
41
-
1. Follow the steps to [open the Add role assignment page](role-assignments-portal.yml).
41
+
1. Follow the steps to [open the Add role assignment page](/azure/role-based-access-control/role-assignments-portal).
42
42
43
43
1. On the **Roles** tab, select the **Privileged administrator roles** tab.
44
44
@@ -163,7 +163,7 @@ If the condition templates don't work for your scenario or if you want more cont
163
163
164
164
## Step 5: Delegate assigns roles with conditions
165
165
166
-
- Delegate can now follow steps to [assign roles](role-assignments-portal.yml).
166
+
- Delegate can now follow steps to [assign roles](/azure/role-based-access-control/role-assignments-portal).
167
167
168
168
:::image type="content" source="./media/shared/groups-constrained.png" alt-text="Diagram of role assignments constrained to specific roles and specific groups." lightbox="./media/shared/groups-constrained.png":::
Copy file name to clipboardExpand all lines: articles/role-based-access-control/elevate-access-global-admin.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,7 +76,7 @@ Follow these steps to elevate access for a Global Administrator using the Azure
76
76
77
77
1. Make the changes you need to make at elevated access.
78
78
79
-
For information about assigning roles, see [Assign Azure roles using the Azure portal](role-assignments-portal.yml). If you are using Privileged Identity Management, see [Discover Azure resources to manage](/entra/id-governance/privileged-identity-management/pim-resource-roles-discover-resources) or [Assign Azure resource roles](/entra/id-governance/privileged-identity-management/pim-resource-roles-assign-roles).
79
+
For information about assigning roles, see [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal). If you are using Privileged Identity Management, see [Discover Azure resources to manage](/entra/id-governance/privileged-identity-management/pim-resource-roles-discover-resources) or [Assign Azure resource roles](/entra/id-governance/privileged-identity-management/pim-resource-roles-assign-roles).
80
80
81
81
1. Perform the steps in the following section to remove your elevated access.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/pim-integration.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,7 +86,7 @@ If your organization has process or compliance reasons to limit the use of PIM,
86
86
87
87
1. In the **Edit assignment** pane, select **Active** for the assignment type and **Permanent** for the assignment duration.
88
88
89
-
For more information, see [Edit assignment](role-assignments-portal.yml#edit-assignment).
89
+
For more information, see [Edit assignment](/azure/role-based-access-control/role-assignments-portal#edit-assignment).
90
90
91
91
:::image type="content" source="./media/shared/assignment-type-edit.png" alt-text="Screenshot of Edit assignment pane with Assignment type options displayed." lightbox="./media/shared/assignment-type-edit.png":::
92
92
@@ -232,5 +232,5 @@ For information about how to assign an Azure Policy with parameters, see [Tutori
232
232
233
233
## Next steps
234
234
235
-
-[Assign Azure roles using the Azure portal](role-assignments-portal.yml)
235
+
-[Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal)
236
236
-[What is Microsoft Entra Privileged Identity Management?](/entra/id-governance/privileged-identity-management/pim-configure)
Copy file name to clipboardExpand all lines: articles/role-based-access-control/rbac-and-directory-admin-roles.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ When you click the **Roles** tab, you'll see the list of built-in and custom rol
53
53
54
54
:::image type="content" source="./media/shared/roles-list.png" alt-text="Screenshot of built-in roles in the Azure portal." lightbox="./media/shared/roles-list.png":::
55
55
56
-
For more information, see [Assign Azure roles using the Azure portal](role-assignments-portal.yml).
56
+
For more information, see [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal).
57
57
58
58
<aname='azure-ad-roles'></a>
59
59
@@ -127,6 +127,6 @@ Accounts and subscriptions are managed in the [Azure portal](https://portal.azur
127
127
128
128
## Next steps
129
129
130
-
-[Assign Azure roles using the Azure portal](role-assignments-portal.yml)
130
+
-[Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal)
131
131
-[Assign Microsoft Entra roles to users](../active-directory/roles/manage-roles-portal.md)
132
132
-[Roles for Microsoft 365 services in Microsoft Entra ID](../active-directory/roles/m365-workload-docs.md)
0 commit comments