Scenario:
You have a set of user`s that need to access just one Azure SQL database on the Azure Portal. This users should not be able to access other databases inside the same logical server.
Problem:
The Azure portal doesn`t provide a graphical interface on the database for you to set permissions only at database level.
Solution:
We can achieve our final goal using powershell.
On this example I`m providing only Reader permissions.
You can find details on RBAC roles on the link below:
https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles
New-AzRoleAssignment -RoleDefinitionName "Reader" -SignInName my_user@microsoft.com -Scope "/subscriptions/XXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXXX/resourceGroups/myResourceGroup/providers/Microsoft.Sql/servers/myServer/databases/myDatabase"
To check the permissions on the resource:
Get-AzRoleAssignment -Scope "/subscriptions/XXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXXX/resourceGroups/myResourceGroup/providers/Microsoft.Sql/servers/myServer/databases/myDatabase"
In the end, the user can see the database, including Metrics
But he cannot see the server:
To revoke the access, simply execute:
Remove-AzRoleAssignment -RoleDefinitionName "Reader" -SignInName my_user@microsoft.com -Scope "/subscriptions/XXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXXX/resourceGroups/myResourceGroup/providers/Microsoft.Sql/servers/myServer/databases/myDatabase"
Updated Nov 06, 2019
Version 1.0Ricardo_NS_Marques
Microsoft
Joined September 27, 2019
Azure Database Support Blog
Follow this blog board to get notified when there's new activity