This demo project deploys Azure resources and bootstraps Azure DevOps projects to illustrate end-to-end RBAC, including best practices and pitfalls. It follows principles from Microsoft's Cloud Adoption Framework (CAF).
Status | Description |
---|---|
Deployment Azure Resources and Azure DevOps | |
Detect Configuration Drift (scheduled nightly) |
When developing a governance model for your organization, it is important to remember that Azure Resource Management (ARM) is only one way to manage resources.
When introducing automation via CI/CD pipelines, be aware that the Role Based Access Control (RBAC) model must be applied at multiple layers. This code sample deploys many of these layers and show how they can be configured together in a unified governance model.
In a nutshell, you can achieve this by leveraging Azure Active Directory and connecting all role assignments (both Azure DevOps and ARM) to this single identity management plane.
This repository features the code to deploy the infrastructure and bootstrap Azure DevOps. For more about the concept of end to end governance, please see:
-
Azure Architecture Center - End-to-end governance in Azure when using CI/CD
More technical documentation with step by step walkthrough of diagram above and how to leverage Azure AD as single identity provider for unified RBAC. -
Cloud Adoption Framework - End-to-end governance from DevOps to Azure
Explains Role Assignments and the planning required for organizations in their cloud journey to create end to end governance.
The Terraform Infrastructure as Code in this repository will bootstrap various resources for you:
- Azure Resources (ARM)
- Azure AD Groups
- Service Principals
- Azure DevOps Projects incl. Service Connections, Security Group Assignments, etc.
When run Terraform will create the following resources. Note: random suffix used to ensure globally unique names, e.g. u6t7
but are omitted here for clarity.
The key to end to end governance is to have multiple role assignments (with different role definitions and different resource scopes to the same Azure AD groups) as illustrated below.
To understand the benefits, imagine if you had to remove a contractor after completion of a project. If you use the concept described in this project and in the accompanying official Microsoft documentation, you can remove their access from multiple environments and resources simply by removing their membership to AAD group(s).
Note: the -all
groups are currently not in use but was introduced to address a conceptual problem (see #12):
- Azure Resource Manager uses an additive permissions model
- Azure DevOps uses a least permissions model
Group Name | ARM Role | Azure DevOps Role |
---|---|---|
fruits-all |
- | - |
fruits-devs |
Contributor | Contributor |
fruits-admins |
Owner | Project Administrators |
veggies-all |
- | - |
veggies-devs |
Contributor | Contributor |
veggies-admins |
Owner | Project Administrators |
infra-all |
- | - |
infra-devs |
Contributor | Contributor |
infra-admins |
Owner | Project Administrators |
In the future when we bootstrap the supermarket
project, we will need the -all
groups as well.
The project structure illustrates different governance models and their trade-offs.
Screenshot of the Azure DevOps organization created by this code sample. Icons by Smashicons not included.
- "fruits" and "veggies" when isolated means less governance management - at the cost of less collaboration.
- "supermarket" model prioritizes collaboration via shared Azure Boards - but requires more governance management, especially for repositories and pipelines.
Project | Boards | Repos | Pipelines |
---|---|---|---|
project-fruits |
Yes | Yes | Yes |
project-veggies |
Yes | Yes | Yes |
collaboration |
Yes | No | No |
central-it |
No | Yes | Yes |
supermarket |
Yes | Yes | Yes |
- Service Connection using Contributor Service Principal
- Service Connection using Key Vault read-only Service Principal for Pipeline Secrets Integration
Note: At time of this writing there is no REST API (v6) for Key Vault Integration. Therefore it must be configured manually.
To reduce complexity for CI/CD automation of this open source repository, this project uses resource groups as a logical and security boundary for deployments.
fruits-dev-rg
fruits-prod-rg
veggies-dev-rg
veggies-prod-rg
infra-shared-rg
Be aware that in practice per Cloud Adoption Framework, these boundaries should be Azure Subscriptions, not Resource Groups.
This demo was created with ♥ by the FastTrack engineer Julie Ng and based on previous experience as an Enterprise Architct and current experieince with Azure customers new to CI/CD and DevOps. After regularly breaking and fixing the demo in onboarding sessions, it was automated.
Learn more about FastTrack for Azure →
If you want to contribute, please first read the Microsoft Code of Conduct →
The easiest way to contribute is to provide feedback.
-
Report Bugs
If you find issues, please open a GitHub issue → -
Feature Requests
Feel free to make suggestions by opening a GitHub issue → -
Ask a Question
Please also open a GitHub issue →
This project affects real Azure resources and leverages CI/CD to safeguard them. Therefore please read through all the sections below carefully for highest success of your contribution being accepted.
-
Please use Conventional Commits so we can automate the Change Log. Thank you.
-
To get started, fork this repository. Please make your changes in your fork in a feature branch, ideally beginning with
feat/*
orfix/*
Large Pull Requests can be a challenge to merge. Consider separating changes are you would into smaller bits like features and create separate pull requests for each.
-
Only Pull Requests with passing CI builds can be accepted for merging.
When you are ready and checked you have met all code requirements described above, you can open a pull request. When you do so, a CI build should be automatically started. If you're having difficulty, please feel free to reach out for help by opening an issue or via Twitter @jng5.
This project is published under the MIT license. See LICENSE.md for details.