update rbac

This commit is contained in:
Joey Caparas 2018-04-09 13:48:55 -07:00
parent 0f794444bd
commit b0784e1d40

View File

@ -52,14 +52,17 @@ To implement role-based access, you'll need to define admin roles, assign corres
### Before you begin
> [!WARNING]
> Before enabling the feature, it's important that you have a Global Administrator role in Azure AD and that have your Azure AD groups ready to reduce the risk of being locked out of the portal.
When you first log in to the Windows Defender ATP portal, you're granted either full access or read only access. Full access rights are granted to users with Security Administrator or Global Administrator roles in Azure AD. Read only access is granted to users with a Security Reader role in Azure AD.
> [!WARNING]
> Before enabling the feature, it's important that you have a Global Administrator role in Azure AD and that have your Azure AD groups ready to reduce the risk of being locked out of the portal.
>
> Only those with Azure AD Global Administrator rights will be able to create and assign roles in the Windows Defender ATP portal, therefore, having the right groups ready in Azure AD is important.
>
> Turning on role-based access control will cause users with read-only permissions to lose access until they are assigned to a role. Users with admin permissions are automatically assigned the default Windows Defender ATP global administrator role with full permissions.
> **Turning on role-based access control will cause users with read-only permissions to lose access until they are assigned to a role.**
>
>Users with admin permissions are automatically assigned the default Windows Defender ATP global administrator role with full permissions.
>
> After opting in to use RBAC, you cannot revert to the initial roles as when you first logged into the portal.