0
0
Azurecloud~10 mins

Access policies vs RBAC in Azure - Interactive Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to assign a role to a user using Azure RBAC.

Azure
az role assignment create --assignee [1] --role "Reader" --scope /subscriptions/00000000-0000-0000-0000-000000000000
Drag options to blanks, or click blank then click option'
AstorageAccount1
BvirtualMachine1
CresourceGroup1
Duser@example.com
Attempts:
3 left
💡 Hint
Common Mistakes
Using a resource name instead of a user identity as assignee.
Confusing the role name with the assignee.
2fill in blank
medium

Complete the code to create an access policy for an Azure Key Vault.

Azure
az keyvault set-policy --name MyKeyVault --object-id [1] --secret-permissions get list
Drag options to blanks, or click blank then click option'
AresourceGroup1
B00000000-0000-0000-0000-000000000000
CReader
DMyKeyVault
Attempts:
3 left
💡 Hint
Common Mistakes
Using the Key Vault name instead of the object-id.
Using role names instead of object-id.
3fill in blank
hard

Fix the error in the command to assign a role at the resource group level.

Azure
az role assignment create --assignee user@example.com --role [1] --scope /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myResourceGroup
Drag options to blanks, or click blank then click option'
AContributor
BmyResourceGroup
Cuser@example.com
DKey Vault
Attempts:
3 left
💡 Hint
Common Mistakes
Using resource group name as role.
Using user email as role.
4fill in blank
hard

Fill both blanks to create an access policy that grants secret permissions.

Azure
az keyvault set-policy --name MyVault --object-id [1] --[2]-permissions get list
Drag options to blanks, or click blank then click option'
A00000000-0000-0000-0000-000000000001
Bkey
Csecret
Dcertificate
Attempts:
3 left
💡 Hint
Common Mistakes
Using resource names instead of object-id.
Mixing permission types incorrectly.
5fill in blank
hard

Fill all three blanks to assign the Reader role to a user at a subscription scope.

Azure
az role assignment create --assignee [1] --role [2] --scope [3]
Drag options to blanks, or click blank then click option'
Auser@example.com
BReader
C/subscriptions/00000000-0000-0000-0000-000000000000
DContributor
Attempts:
3 left
💡 Hint
Common Mistakes
Using resource names instead of user email for assignee.
Using invalid role names.
Incorrect scope format.