From f5c7490026db5758296fb18750a39ea17e70d887 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Sat, 8 Feb 2025 19:47:32 +0100 Subject: [PATCH] mor einfo --- .../azure-security/az-basic-information/README.md | 15 ++++++++++++++- 1 file changed, 14 insertions(+), 1 deletion(-) diff --git a/src/pentesting-cloud/azure-security/az-basic-information/README.md b/src/pentesting-cloud/azure-security/az-basic-information/README.md index ceddaac34..50247df25 100644 --- a/src/pentesting-cloud/azure-security/az-basic-information/README.md +++ b/src/pentesting-cloud/azure-security/az-basic-information/README.md @@ -227,7 +227,7 @@ Example: Depending on the scope the role was assigned to, the **role** cold be **inherited** to **other resources** inside the scope container. For example, if a user A has a **role on the subscription**, he will have that **role on all the resource groups** inside the subscription and on **all the resources** inside the resource group. -### **Classic Roles** +### Classic Roles | **Owner** | | All resource types | | ----------------------------- | ---------------------------------------------------------------------------------------- | ------------------ | @@ -312,6 +312,19 @@ This elevation can be done at the end of the page: [https://portal.azure.com/#vi
+### Assignments Conditions & MFA + +It’s possible to **establish some conditions when a role is assigned** to a principal. A common condition to add is to require MFA to access some role permissions: + +```bash +az role assignment create \ + --assignee \ + --role \ + --scope "/subscriptions/9291ff6e-6afb-430e-82a4-6f04b2d05c7f" \ + --condition "PrincipalClaims['amr'] contains 'mfa'" \ + --condition-version 2.0 +``` + ### Deny Assignments Just like role assignments, **deny assignments** are used to **control access to Azure resources**. However, **deny assignments** are used to **explicitly deny access** to a resource, even if a user has been granted access through a role assignment. **Deny assignments** take precedence over **role assignments**, meaning that if a user is granted access through a role assignment but is also explicitly denied access through a deny assignment, the deny assignment will take precedence.