Fundamentals of azure
Fundamentals of azure
Azure services
Compute services
This includes the Azure Virtual Machines—both Linux and Windows, Cloud
Services, App Services (Web Apps, Mobile Apps, Logic Apps, API Apps, and
Function Apps), Batch (for large-scale parallel and batch compute jobs),
RemoteApp, Service Fabric, and the Azure Container Service.
Data services
This includes Microsoft Azure Storage (comprised of the Blob, Queue, Table, and
Azure Files services), Azure SQL Database, DocumentDB, StorSimple, and the
Redis Cache.
Application services
This includes services that you can use to help build and operate your
applications, such as Azure Active Directory (Azure AD), Service Bus for
connecting distributed systems, HDInsight for processing big data, Azure
Scheduler, and Azure Media Services.
Network services This includes Azure features such as Virtual Networks,
ExpressRoute, Azure DNS, Azure Traffic Manager, and the Azure Content Delivery
Network.
Role-Based Access Control
Role-Based Access Control (RBAC) to understand how you can use it to manage
the security for your Resource Manager resources. Resource Manager
deployment model that allows you to group and manage your related resources,
Microsoft introduced RBAC, providing fine-grained control over the operations
and scope with which a user can perform a control-plant action.
With Resource Manager, you can grant permissions at a specified scope:
subscription, resource group, or resource. This means you can deploy a set of
resources into a resource group and then grant permissions to one or more
specific users, groups, or service principal. Those users will only have the
permissions granted to those resources in that resource group. This access does
not allow them to modify resources in other resource groups.
Azure RBAC also supports service principals that formally identities representing
applications, but informally are used by RBAC to allow automated processes to
CHAPTER 1 | Getting started with Microsoft Azure 27 of 540 manage Resource
Manager resources.
To grant access, you assign a role to the user, group, or service principal. There
are many predefined roles, and you can also define your own custom roles.
Roles
Each role has a list of Actions and Not Actions. The Actions are allowed, and the
Not Actions are excluded.
Contributor
With this role, a user can manage everything except access. This role has the
following Actions and Not Actions:
Actions : Can create and manage resources of all types
Not Action : Write Can’t create roles or assign roles
Not Action: Delete Can’t delete roles or role assignments
Owner:
A user with this role can manage everything, including access. This role has no
Not Actions. This is synonymous with Co Administrator in the classic deployment
model.
Reader:
A user with this role can read resources of all types (except secrets) but can’t
make changes. This role will allow someone to look at the properties of a storage
account, but it won’t let that person retrieve the access keys.
SQL DB Contributor:
A user with this role can manage SQL databases but not their security-related
policies. SQL Security Manager A user with this role can manage the security-
related policies of SQL Servers and databases.
Storage Account Contributor:
A user with this role can manage storage accounts but cannot manage access to
the storage accounts. This means the user with this role can’t assign any roles to
any users for the storage account. Note that the user with this role can retrieve
the access keys for the storage account, which means they have full access to
the data in the storage account.
Virtual Machine Contributor:
A user with this role can manage virtual machines but can’t manage the VNet to
which they are connected or the storage account where the VHD file resides.
Note that this role does include access to the storage account keys, which is
needed to create the container for the VHD files as well as the VHD files
themselves.
Custom roles:
Custom roles can be created by using PowerShell, the Azure CLI, or the REST
APIs. Once you create a custom role, you can assign it to a user, group, or
application for a subscription, resource group, or resource.
Custom roles are stored in the Azure AD and can be shared across all
subscriptions that use the same Active Directory.
Examples:
Microsoft.Storage/*/read
Microsoft.Network/*/read
Microsoft.Compute/*/read
Microsoft.Compute/virtualMachines;/start/action
Microsoft.Compute/virtualMachines/restart/ action
This role can only start and restart virtual machines. It can’t create them or
delete them. A convenient way to create a custom role is to download the
definition of an existing role and use that as a starting point.