You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/conditions-authorization-actions-attributes.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ manager: pmwongera
6
6
ms.service: role-based-access-control
7
7
ms.subservice: conditions
8
8
ms.topic: reference
9
-
ms.date: 04/15/2024
9
+
ms.date: 03/30/2026
10
10
ms.author: rolyon
11
11
#Customer intent: As a dev, devops, or it admin, I want to
12
12
---
@@ -19,6 +19,8 @@ This section lists the supported authorization actions you can target for condit
19
19
20
20
### Create or update role assignments
21
21
22
+
Target this action to control permissions for creating or updating role assignments. This action applies to both adding new role assignments and updating existing role assignments.
23
+
22
24
> [!div class="mx-tdCol2BreakAll"]
23
25
> | Property | Value |
24
26
> | --- | --- |
@@ -31,6 +33,8 @@ This section lists the supported authorization actions you can target for condit
31
33
32
34
### Delete a role assignment
33
35
36
+
Target this action to control permissions for deleting role assignments. This action applies to removing existing role assignments.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/delegate-role-assignments-overview.md
+18-7Lines changed: 18 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ manager: pmwongera
6
6
ms.service: role-based-access-control
7
7
ms.subservice: conditions
8
8
ms.topic: how-to
9
-
ms.date: 08/29/2024
9
+
ms.date: 03/30/2026
10
10
ms.author: rolyon
11
11
#Customer intent: As a dev, devops, or it admin, I want to delegate Azure role assignment management to other users who are closer to the decision, but want to limit the scope of the role assignments.
12
12
---
@@ -30,12 +30,12 @@ Here are some reasons why you might want to delegate role assignment management
30
30
31
31
## How you currently can delegate role assignment management
32
32
33
-
The [Owner](built-in-roles.md#owner) and [User Access Administrator](built-in-roles.md#user-access-administrator) roles are built-in roles that allow users to create role assignments. Members of these roles can decide who can have write, read, and delete permissions for any resource in a subscription. To delegate role assignment management to another user, you can assign the Owner or User Access Administrator role to a user.
33
+
The [Owner](built-in-roles.md#owner) and [User Access Administrator](built-in-roles.md#user-access-administrator) roles are built-in roles that allow users to create or delete role assignments. Members of these roles can decide who can have write, read, and delete permissions for any resource in a subscription. To delegate role assignment management to another user, you can assign the Owner or User Access Administrator role to a user.
34
34
35
35
The following diagram shows how Alice can delegate role assignment responsibilities to Dara. For specific steps, see [Assign a user as an administrator of an Azure subscription](/azure/role-based-access-control/role-assignments-portal-subscription-admin).
36
36
37
37
1. Alice assigns the User Access Administrator role to Dara.
38
-
1. Dara can now assign any role to any user, group, or service principal at the same scope.
38
+
1. Dara can now add (or remove) any role assignment for any user, group, or service principal at the same scope.
39
39
40
40
:::image type="content" source="./media/delegate-role-assignments-overview/delegate-role-assignments-steps.png" alt-text="Diagram that shows an example where Dara can assign any role to any user." lightbox="./media/delegate-role-assignments-overview/delegate-role-assignments-steps.png":::
41
41
@@ -51,7 +51,7 @@ Instead of assigning the Owner or User Access Administrator roles, a more secure
51
51
52
52
## A more secure method: Delegate role assignment management with conditions
53
53
54
-
Delegating role assignment management with conditions is a way to restrict the role assignments a user can create. In the preceding example, Alice can allow Dara to create some role assignments on her behalf, but not all role assignments. For example, Alice can constrain the roles that Dara can assign and constrain the principals that Dara can assign roles to. This delegation with conditions is sometimes referred to as *constrained delegation* and is implemented using [Azure attribute-based access control (Azure ABAC) conditions](conditions-overview.md).
54
+
Delegating role assignment management with conditions is a way to restrict the role assignments a user can create or delete. In the preceding example, Alice can allow Dara to create (or delete) some role assignments on her behalf, but not all role assignments. For example, Alice can constrain the roles that Dara can assign, constrain the principals that Dara can assign roles to, and constrain the role assignments Dara can remove. This delegation with conditions is sometimes referred to as *constrained delegation* and is implemented using [Azure attribute-based access control (Azure ABAC) conditions](conditions-overview.md).
55
55
56
56
This video provides an overview of delegating role assignment management with conditions.
57
57
@@ -62,17 +62,19 @@ This video provides an overview of delegating role assignment management with co
62
62
Here are some reasons why delegating role assignment management to others with conditions is more secure:
63
63
64
64
- You can restrict the role assignments the delegate is allowed to create.
65
+
- You can restrict the role assignments the delegate is allowed to delete.
65
66
- You can prevent a delegate from allowing another user to assign roles.
66
67
- You can enforce compliance of your organization's policies of least privilege.
67
68
- You can automate the management of Azure resources without having to grant full permissions to a service account.
68
69
69
70
## Conditions example
70
71
71
-
Consider an example where Alice is an administrator with the User Access Administrator role for a subscription. Alice wants to grant Dara the ability to assign specific roles for specific groups. Alice doesn't want Dara to have any other role assignment permissions. The following diagram shows how Alice can delegate role assignment responsibilities to Dara with conditions.
72
+
Consider an example where Alice is an administrator with the User Access Administrator role for a subscription. Alice wants to grant Dara the ability to assign specific roles for specific groups and remove specific role assignments. Alice doesn't want Dara to have any other role assignment permissions. The following diagram shows how Alice can delegate role assignment responsibilities to Dara with conditions.
72
73
73
-
1. Alice assigns the Role Based Access Control Administrator role to Dara. Alice adds conditions so that Dara can only assign the Backup Contributor or Backup Reader roles to the Marketing and Sales groups.
74
-
1. Dara can now assign the Backup Contributor or Backup Reader roles to the Marketing and Sales groups.
74
+
1. Alice assigns the Role Based Access Control Administrator role to Dara. Alice adds conditions so that Dara can only add (or remove) Backup Contributor or Backup Reader role assignments to the Marketing and Sales groups.
75
+
1. Dara can now add (or remove) Backup Contributor or Backup Reader role assignments to the Marketing and Sales groups.
75
76
1. If Dara attempts to assign other roles or assign any roles to different principals (such as a user or managed identity), the role assignment fails.
77
+
1. If Dara attempts to remove other role assignments or remove any role assignments from different principals (such as a user or managed identity), the removal fails.
76
78
77
79
:::image type="content" source="./media/delegate-role-assignments-overview/delegate-role-assignments-conditions-steps.png" alt-text="Diagram that shows an example where Dara can only assign the Backup Contributor or Backup Reader roles to Marketing or Sales groups." lightbox="./media/delegate-role-assignments-overview/delegate-role-assignments-conditions-steps.png":::
78
80
@@ -91,18 +93,26 @@ Here are the ways that role assignments can be constrained with conditions. You
91
93
92
94
- Constrain the **roles** that can be assigned
93
95
96
+
In this example, Dara can only assign (or remove) the Backup Contributor or Backup Reader roles.
97
+
94
98
:::image type="content" source="./media/shared/roles-constrained.png" alt-text="Diagram of role assignments constrained to Backup Contributor and Backup Reader roles." lightbox="./media/shared/roles-constrained.png":::
95
99
96
100
- Constrain the **roles** and **types of principals** (users, groups, or service principals) that can be assigned roles
97
101
102
+
In this example, Dara can only assign (or remove) the Backup Contributor or Backup Reader roles to user or group principal types.
103
+
98
104
:::image type="content" source="./media/shared/principal-types-constrained.png" alt-text="Diagram of role assignments constrained to Backup Contributor or Backup Reader roles and user or group principal types." lightbox="./media/shared/principal-types-constrained.png":::
99
105
100
106
- Constrain the **roles** and **specific principals** that can be assigned roles
101
107
108
+
In this example, Dara can only assign (or remove) the Backup Contributor or Backup Reader roles to the Marketing and Sales groups.
109
+
102
110
:::image type="content" source="./media/shared/groups-constrained.png" alt-text="Diagram of role assignments constrained to Backup Contributor or Backup Reader roles and specific groups." lightbox="./media/shared/groups-constrained.png":::
103
111
104
112
- Specify different conditions for the add and remove **role assignment actions**
105
113
114
+
In this example, Dara can only assign the Backup Contributor or Backup Reader roles. Dara can remove any role assignments.
115
+
106
116
:::image type="content" source="./media/shared/actions-constrained.png" alt-text="Diagram of add and remove role assignments constrained to Backup Contributor or Backup Reader roles." lightbox="./media/shared/actions-constrained.png":::
107
117
108
118
## How to delegate role assignment management with conditions
@@ -112,6 +122,7 @@ To delegate role assignment management with conditions, you assign roles as you
112
122
1. Determine the permissions the delegate needs
113
123
114
124
- What roles can the delegate assign?
125
+
- What role assignments can the delegate remove?
115
126
- What types of principals can the delegate assign roles to?
116
127
- Which principals can the delegate assign roles to?
Copy file name to clipboardExpand all lines: articles/role-based-access-control/delegate-role-assignments-portal.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ manager: pmwongera
6
6
ms.service: role-based-access-control
7
7
ms.subservice: conditions
8
8
ms.topic: how-to
9
-
ms.date: 04/15/2024
9
+
ms.date: 03/30/2026
10
10
ms.author: rolyon
11
11
#Customer intent: As a dev, devops, or it admin, I want to delegate Azure role assignment management to other users who are closer to the decision, but want to limit the scope of the role assignments.
12
12
---
@@ -15,7 +15,7 @@ ms.author: rolyon
15
15
16
16
As an administrator, you might get several requests to grant access to Azure resources that you want to delegate to someone else. You could assign a user the [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator) roles, but these are highly privileged roles. This article describes a more secure way to [delegate role assignment management](delegate-role-assignments-overview.md) to other users in your organization, but add restrictions for those role assignments. For example, you can constrain the roles that can be assigned or constrain the principals the roles can be assigned to.
17
17
18
-
The following diagram shows how a delegate with conditions can only assign the Backup Contributor or Backup Reader roles to only the Marketing or Sales groups.
18
+
The following diagram shows how a delegate with conditions can only assign (or remove) the Backup Contributor or Backup Reader roles to only the Marketing or Sales groups.
19
19
20
20
:::image type="content" source="./media/delegate-role-assignments-portal/delegate-role-assignments.png" alt-text="Diagram that shows an administrator delegating role assignment management with conditions." lightbox="./media/delegate-role-assignments-portal/delegate-role-assignments.png":::
21
21
@@ -28,12 +28,15 @@ The following diagram shows how a delegate with conditions can only assign the B
28
28
To help determine the permissions the delegate needs, answer the following questions:
29
29
30
30
- What roles can the delegate assign?
31
+
- What role assignments can the delegate remove?
31
32
- What types of principals can the delegate assign roles to?
32
33
- Which principals can the delegate assign roles to?
33
-
- Can delegate remove any role assignments?
34
34
35
35
Once you know the permissions that delegate needs, you use the following steps to add a condition to the delegate's role assignment. For example conditions, see [Examples to delegate Azure role assignment management with conditions](delegate-role-assignments-examples.md).
36
36
37
+
> [!NOTE]
38
+
> The conditions you add in these steps apply to assigning specific roles, but they also typically apply to removing role assignments for those same roles.
39
+
37
40
## Step 2: Start a new role assignment
38
41
39
42
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -70,10 +73,10 @@ There are two ways that you can add a condition. You can use a condition templat
70
73
71
74
| Condition template | Select this template to |
72
75
| --- | --- |
73
-
| Constrain roles | Allow user to only assign roles you select |
74
-
| Constrain roles and principal types | Allow user to only assign roles you select<br/>Allow user to only assign these roles to principal types you select (users, groups, or service principals) |
75
-
| Constrain roles and principals | Allow user to only assign roles you select<br/>Allow user to only assign these roles to principals you select |
76
-
| Allow all except specific roles | Allow user to assign all roles except the roles you select |
76
+
|[Constrain roles](delegate-role-assignments-examples.md#example-constrain-roles)| Allow user to only assign roles you select<br/>Allow user to only remove role assignments for the selected roles|
77
+
|[Constrain roles and principal types](delegate-role-assignments-examples.md#example-constrain-roles-and-principal-types)| Allow user to only assign roles you select<br/>Allow user to only assign these roles to principal types you select (users, groups, or service principals)<br/>Allow user to only remove role assignments for the selected roles and principal types|
78
+
|[Constrain roles and principals](delegate-role-assignments-examples.md#example-constrain-roles-and-specific-groups)| Allow user to only assign roles you select<br/>Allow user to only assign these roles to principals you select<br/>Allow user to only remove role assignments for the selected roles and principals|
79
+
| Allow all except specific roles | Allow user to assign all roles except the roles you select<br/>Allow user to remove role assignments for all roles except the selected roles|
77
80
78
81
1. In the configure pane, add the required configurations.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/whats-new.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: rolyon
5
5
manager: pmwongera
6
6
ms.service: role-based-access-control
7
7
ms.topic: whats-new
8
-
ms.date: 03/08/2026
8
+
ms.date: 03/30/2026
9
9
ms.author: rolyon
10
10
11
11
---
@@ -18,6 +18,7 @@ This article provides information about new features and documentation improveme
18
18
19
19
| Date | Area | Description |
20
20
| --- | --- | --- |
21
+
| March 2026 | ABAC conditions | Added clarifications for conditions and deleting role assignments. See [Delegate Azure role assignment management to others with conditions](delegate-role-assignments-portal.md), [Delegate Azure access management to others](delegate-role-assignments-overview.md), and [Authorization actions and attributes](conditions-authorization-actions-attributes.md). |
| February 2026 | Roles and permissions | Updated permissions for several roles and resource providers. See [Azure built-in roles](built-in-roles.md) and [Azure permissions](resource-provider-operations.md). |
23
24
| February 2026 | Classic administrators | Update steps to reflect that Azure Resource Graph will no longer list classic administrators. See [Azure classic subscription administrators](classic-administrators.md). |
0 commit comments