![]() |
文雅的炒饭 · As a reader --> ...· 1 年前 · |
![]() |
豪情万千的汽水 · Mysql导出查询到的数据_mysql查询到 ...· 1 年前 · |
![]() |
八块腹肌的葡萄酒 · 最近邻插值和双线性插值的算法实现 - 简书· 2 年前 · |
![]() |
腹黑的墨镜 · 如何使用Node.js编辑XML文件-腾讯云 ...· 2 年前 · |
azure access rbac role |
https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles |
![]() |
傻傻的野马
2 年前 |
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Download Microsoft Edge More info about Internet Explorer and Microsoft EdgeAzure role-based access control (Azure RBAC) has several Azure built-in roles that you can assign to users, groups, service principals, and managed identities. Role assignments are the way you control access to Azure resources. If the built-in roles don't meet the specific needs of your organization, you can create your own Azure custom roles . For information about how to assign roles, see Steps to assign an Azure role .
This article lists the Azure built-in roles. If you are looking for administrator roles for Azure Active Directory (Azure AD), see Azure AD built-in roles .
The following table provides a brief description of each built-in role. Click the role name to see the list of
Actions
,
NotActions
,
DataActions
, and
NotDataActions
for each role. For information about what these actions mean and how they apply to the control and data planes, see
Understand Azure role definitions
.
Grants full access to manage all resources, including the ability to assign roles in Azure RBAC. Learn more
"description": "Grants full access to manage all resources, including the ability to assign roles in Azure RBAC.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635", "name": "8e3af657-a8ff-443c-a75c-2fe8c4bcb635", "permissions": [ "actions": [ "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"View all resources, but does not allow you to make any changes. Learn more
"description": "View all resources, but does not allow you to make any changes.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7", "name": "acdd72a7-3385-48ef-bd42-f606fba81ae7", "permissions": [ "actions": [ "*/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage user access to Azure resources. Learn more
"description": "Lets you manage user access to Azure resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/18d7d88d-d35e-4fb5-a5c3-7773c20a72d9", "name": "18d7d88d-d35e-4fb5-a5c3-7773c20a72d9", "permissions": [ "actions": [ "*/read", "Microsoft.Authorization/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "User Access Administrator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage classic virtual machines, but not access to them, and not the virtual network or storage account they're connected to.
Microsoft.ClassicStorage /storageAccounts/images/read Returns the storage account image. (Deprecated. Use 'Microsoft.ClassicStorage/storageAccounts/vmImages') Microsoft.ClassicStorage /storageAccounts/listKeys/action Lists the access keys for the storage accounts. Microsoft.ClassicStorage /storageAccounts/read Return the storage account with the given account. Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage classic virtual machines, but not access to them, and not the virtual network or storage account they're connected to.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/d73bb868-a0df-4d4d-bd69-98a00b01fccb", "name": "d73bb868-a0df-4d4d-bd69-98a00b01fccb", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.ClassicCompute/domainNames/*", "Microsoft.ClassicCompute/virtualMachines/*", "Microsoft.ClassicNetwork/networkSecurityGroups/join/action", "Microsoft.ClassicNetwork/reservedIps/link/action", "Microsoft.ClassicNetwork/reservedIps/read", "Microsoft.ClassicNetwork/virtualNetworks/join/action", "Microsoft.ClassicNetwork/virtualNetworks/read", "Microsoft.ClassicStorage/storageAccounts/disks/read", "Microsoft.ClassicStorage/storageAccounts/images/read", "Microsoft.ClassicStorage/storageAccounts/listKeys/action", "Microsoft.ClassicStorage/storageAccounts/read", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Classic Virtual Machine Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Provides permissions to upload data to empty managed disks, read, or export data of managed disks (not attached to running VMs) and snapshots using SAS URIs and Azure AD authentication.
Microsoft.Compute /snapshots/download/action Perform read data operations on Snapshot SAS Uri Microsoft.Compute /snapshots/upload/action Perform write data operations on Snapshot SAS Uri NotDataActions "description": "Provides permissions to upload data to empty managed disks, read, or export data of managed disks (not attached to running VMs) and snapshots using SAS URIs and Azure AD authentication.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/959f8984-c045-4866-89c7-12bf9737be2e", "name": "959f8984-c045-4866-89c7-12bf9737be2e", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Compute/disks/download/action", "Microsoft.Compute/disks/upload/action", "Microsoft.Compute/snapshots/download/action", "Microsoft.Compute/snapshots/upload/action" "notDataActions": [] "roleName": "Data Operator for Managed Disks", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Provides permission to backup vault to perform disk backup. Learn more
Microsoft.Compute /disks/beginGetAccess/action Get the SAS URI of the Disk for blob access NotActions DataActions NotDataActions "description": "Provides permission to backup vault to perform disk backup.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/3e5e47e6-65f7-47ef-90b5-e5dd4d455f24", "name": "3e5e47e6-65f7-47ef-90b5-e5dd4d455f24", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Compute/disks/read", "Microsoft.Compute/disks/beginGetAccess/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Disk Backup Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Provide permission to StoragePool Resource Provider to manage disks added to a disk pool.
"description": "Used by the StoragePool Resource Provider to manage Disks added to a Disk Pool.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/60fc6e62-5479-42d4-8bf4-67625fcc2840", "name": "60fc6e62-5479-42d4-8bf4-67625fcc2840", "permissions": [ "actions": [ "Microsoft.Compute/disks/write", "Microsoft.Compute/disks/read", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Disk Pool Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Provides permission to backup vault to perform disk restore. Learn more
"description": "Provides permission to backup vault to perform disk restore.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/b50d9833-a0cb-478e-945f-707fcc997c13", "name": "b50d9833-a0cb-478e-945f-707fcc997c13", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Compute/disks/write", "Microsoft.Compute/disks/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Disk Restore Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Provides permission to backup vault to manage disk snapshots. Learn more
Microsoft.Compute /snapshots/beginGetAccess/action Get the SAS URI of the Snapshot for blob access Microsoft.Compute /snapshots/endGetAccess/action Revoke the SAS URI of the Snapshot Microsoft.Compute /disks/beginGetAccess/action Get the SAS URI of the Disk for blob access Microsoft.Storage /storageAccounts/listkeys/action Returns the access keys for the specified storage account. Microsoft.Storage /storageAccounts/write Creates a storage account with the specified parameters or update the properties or tags or adds custom domain for the specified storage account. Microsoft.Storage /storageAccounts/read Returns the list of storage accounts or gets the properties for the specified storage account. Microsoft.Storage /storageAccounts/delete Deletes an existing storage account. NotActions DataActions NotDataActions "description": "Provides permission to backup vault to manage disk snapshots.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/7efff54f-a5b4-42b5-a1c5-5411624893ce", "name": "7efff54f-a5b4-42b5-a1c5-5411624893ce", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Compute/snapshots/delete", "Microsoft.Compute/snapshots/write", "Microsoft.Compute/snapshots/read", "Microsoft.Compute/snapshots/beginGetAccess/action", "Microsoft.Compute/snapshots/endGetAccess/action", "Microsoft.Compute/disks/beginGetAccess/action", "Microsoft.Storage/storageAccounts/listkeys/action", "Microsoft.Storage/storageAccounts/write", "Microsoft.Storage/storageAccounts/read", "Microsoft.Storage/storageAccounts/delete" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Disk Snapshot Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"View Virtual Machines in the portal and login as administrator Learn more
Microsoft.HybridConnectivity /endpoints/listCredentials/action List the endpoint access credentials to the resource. NotActions DataActions Microsoft.Compute /virtualMachines/login/action Log in to a virtual machine as a regular user Microsoft.Compute /virtualMachines/loginAsAdmin/action Log in to a virtual machine with Windows administrator or Linux root user privileges Microsoft.HybridCompute /machines/login/action Log in to a Azure Arc machine as a regular user Microsoft.HybridCompute /machines/loginAsAdmin/action Log in to a Azure Arc machine with Windows administrator or Linux root user privilege NotDataActions "description": "View Virtual Machines in the portal and login as administrator", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/1c0163c0-47e6-4577-8991-ea5c82e286e4", "name": "1c0163c0-47e6-4577-8991-ea5c82e286e4", "permissions": [ "actions": [ "Microsoft.Network/publicIPAddresses/read", "Microsoft.Network/virtualNetworks/read", "Microsoft.Network/loadBalancers/read", "Microsoft.Network/networkInterfaces/read", "Microsoft.Compute/virtualMachines/*/read", "Microsoft.HybridCompute/machines/*/read", "Microsoft.HybridConnectivity/endpoints/listCredentials/action" "notActions": [], "dataActions": [ "Microsoft.Compute/virtualMachines/login/action", "Microsoft.Compute/virtualMachines/loginAsAdmin/action", "Microsoft.HybridCompute/machines/login/action", "Microsoft.HybridCompute/machines/loginAsAdmin/action" "notDataActions": [] "roleName": "Virtual Machine Administrator Login", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Create and manage virtual machines, manage disks, install and run software, reset password of the root user of the virtual machine using VM extensions, and manage local user accounts using VM extensions. This role does not grant you management access to the virtual network or storage account the virtual machines are connected to. This role does not allow you to assign roles in Azure RBAC. Learn more
Microsoft.Compute /virtualMachines/* Perform all virtual machine actions including create, update, delete, start, restart, and power off virtual machines. Execute scripts on virtual machines. Microsoft.Compute /virtualMachineScaleSets/* Create and manage virtual machine scale sets Microsoft.Compute /cloudServices/* Microsoft.Compute /disks/write Creates a new Disk or updates an existing one Microsoft.Compute /disks/read Get the properties of a Disk Microsoft.Compute /disks/delete Deletes the Disk Microsoft.DevTestLab /schedules/* Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Network /applicationGateways/backendAddressPools/join/action Joins an application gateway backend address pool. Not Alertable. Microsoft.Network /loadBalancers/backendAddressPools/join/action Joins a load balancer backend address pool. Not Alertable. Microsoft.Network /loadBalancers/inboundNatPools/join/action Joins a load balancer inbound NAT pool. Not alertable. Microsoft.Network /loadBalancers/inboundNatRules/join/action Joins a load balancer inbound nat rule. Not Alertable. Microsoft.Network /loadBalancers/probes/join/action Allows using probes of a load balancer. For example, with this permission healthProbe property of VM scale set can reference the probe. Not alertable. Microsoft.Network /loadBalancers/read Gets a load balancer definition Microsoft.Network /locations/* Create and manage network locations Microsoft.Network /networkInterfaces/* Create and manage network interfaces Microsoft.Network /networkSecurityGroups/join/action Joins a network security group. Not Alertable. Microsoft.Network /networkSecurityGroups/read Gets a network security group definition Microsoft.Network /publicIPAddresses/join/action Joins a public ip address. Not Alertable. Microsoft.Network /publicIPAddresses/read Gets a public ip address definition. Microsoft.Network /virtualNetworks/read Get the virtual network definition Microsoft.Network /virtualNetworks/subnets/join/action Joins a virtual network. Not Alertable. Microsoft.RecoveryServices /locations/* Microsoft.RecoveryServices /Vaults/backupFabrics/backupProtectionIntent/write Create a backup Protection Intent Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/*/read Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/read Returns object details of the Protected Item Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/write Create a backup Protected Item Microsoft.RecoveryServices /Vaults/backupPolicies/read Returns all Protection Policies Microsoft.RecoveryServices /Vaults/backupPolicies/write Creates Protection Policy Microsoft.RecoveryServices /Vaults/read The Get Vault operation gets an object representing the Azure resource of type 'vault' Microsoft.RecoveryServices /Vaults/usages/read Returns usage details for a Recovery Services Vault. Microsoft.RecoveryServices /Vaults/write Create Vault operation creates an Azure resource of type 'vault' Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.SerialConsole/serialPorts/connect/action Connect to a serial port Microsoft.SqlVirtualMachine /* Microsoft.Storage /storageAccounts/listKeys/action Returns the access keys for the specified storage account. Microsoft.Storage /storageAccounts/read Returns the list of storage accounts or gets the properties for the specified storage account. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage virtual machines, but not access to them, and not the virtual network or storage account they're connected to.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c", "name": "9980e02c-c2be-4d73-94e8-173b1dc7cf3c", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Compute/availabilitySets/*", "Microsoft.Compute/locations/*", "Microsoft.Compute/virtualMachines/*", "Microsoft.Compute/virtualMachineScaleSets/*", "Microsoft.Compute/cloudServices/*", "Microsoft.Compute/disks/write", "Microsoft.Compute/disks/read", "Microsoft.Compute/disks/delete", "Microsoft.DevTestLab/schedules/*", "Microsoft.Insights/alertRules/*", "Microsoft.Network/applicationGateways/backendAddressPools/join/action", "Microsoft.Network/loadBalancers/backendAddressPools/join/action", "Microsoft.Network/loadBalancers/inboundNatPools/join/action", "Microsoft.Network/loadBalancers/inboundNatRules/join/action", "Microsoft.Network/loadBalancers/probes/join/action", "Microsoft.Network/loadBalancers/read", "Microsoft.Network/locations/*", "Microsoft.Network/networkInterfaces/*", "Microsoft.Network/networkSecurityGroups/join/action", "Microsoft.Network/networkSecurityGroups/read", "Microsoft.Network/publicIPAddresses/join/action", "Microsoft.Network/publicIPAddresses/read", "Microsoft.Network/virtualNetworks/read", "Microsoft.Network/virtualNetworks/subnets/join/action", "Microsoft.RecoveryServices/locations/*", "Microsoft.RecoveryServices/Vaults/backupFabrics/backupProtectionIntent/write", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/*/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/write", "Microsoft.RecoveryServices/Vaults/backupPolicies/read", "Microsoft.RecoveryServices/Vaults/backupPolicies/write", "Microsoft.RecoveryServices/Vaults/read", "Microsoft.RecoveryServices/Vaults/usages/read", "Microsoft.RecoveryServices/Vaults/write", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.SerialConsole/serialPorts/connect/action", "Microsoft.SqlVirtualMachine/*", "Microsoft.Storage/storageAccounts/listKeys/action", "Microsoft.Storage/storageAccounts/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Virtual Machine Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"View Virtual Machines in the portal and login as a regular user. Learn more
Microsoft.HybridConnectivity /endpoints/listCredentials/action List the endpoint access credentials to the resource. NotActions DataActions Microsoft.Compute /virtualMachines/login/action Log in to a virtual machine as a regular user Microsoft.HybridCompute /machines/login/action Log in to a Azure Arc machine as a regular user NotDataActions "description": "View Virtual Machines in the portal and login as a regular user.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/fb879df8-f326-4884-b1cf-06f3ad86be52", "name": "fb879df8-f326-4884-b1cf-06f3ad86be52", "permissions": [ "actions": [ "Microsoft.Network/publicIPAddresses/read", "Microsoft.Network/virtualNetworks/read", "Microsoft.Network/loadBalancers/read", "Microsoft.Network/networkInterfaces/read", "Microsoft.Compute/virtualMachines/*/read", "Microsoft.HybridCompute/machines/*/read", "Microsoft.HybridConnectivity/endpoints/listCredentials/action" "notActions": [], "dataActions": [ "Microsoft.Compute/virtualMachines/login/action", "Microsoft.HybridCompute/machines/login/action" "notDataActions": [] "roleName": "Virtual Machine User Login", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Let's you manage the OS of your resource via Windows Admin Center as an administrator. Learn more
Microsoft.HybridCompute /machines/upgradeExtensions/action Upgrades Extensions on Azure Arc machines Microsoft.HybridCompute /operations/read Read all Operations for Azure Arc for Servers Microsoft.Network /networkInterfaces/read Gets a network interface definition. Microsoft.Network /loadBalancers/read Gets a load balancer definition Microsoft.Network /publicIPAddresses/read Gets a public ip address definition. Microsoft.Network /virtualNetworks/read Get the virtual network definition Microsoft.Network /networkSecurityGroups/read Gets a network security group definition Microsoft.Network /networkSecurityGroups/defaultSecurityRules/read Gets a default security rule definition Microsoft.Network /networkWatchers/securityGroupView/action View the configured and effective network security group rules applied on a VM. Microsoft.Network /networkSecurityGroups/securityRules/read Gets a security rule definition Microsoft.Network /networkSecurityGroups/securityRules/write Creates a security rule or updates an existing security rule Microsoft.HybridConnectivity /endpoints/write Create or update the endpoint to the target resource. Microsoft.HybridConnectivity /endpoints/read Get or list of endpoints to the target resource. Microsoft.HybridConnectivity /endpoints/listManagedProxyDetails/action List the managed proxy details to the resource. Microsoft.Compute /virtualMachines/read Get the properties of a virtual machine Microsoft.Compute /virtualMachines/patchAssessmentResults/latest/read Retrieves the summary of the latest patch assessment operation Microsoft.Compute /virtualMachines/patchAssessmentResults/latest/softwarePatches/read Retrieves list of patches assessed during the last patch assessment operation Microsoft.Compute /virtualMachines/patchInstallationResults/read Retrieves the summary of the latest patch installation operation Microsoft.Compute /virtualMachines/patchInstallationResults/softwarePatches/read Retrieves list of patches attempted to be installed during the last patch installation operation Microsoft.Compute /virtualMachines/extensions/read Get the properties of a virtual machine extension Microsoft.Compute /virtualMachines/instanceView/read Gets the detailed runtime status of the virtual machine and its resources Microsoft.Compute /virtualMachines/runCommands/read Get the properties of a virtual machine run command Microsoft.Compute /virtualMachines/vmSizes/read Lists available sizes the virtual machine can be updated to Microsoft.Compute /locations/publishers/artifacttypes/types/read Get the properties of a VMExtension Type Microsoft.Compute /locations/publishers/artifacttypes/types/versions/read Get the properties of a VMExtension Version Microsoft.Compute /diskAccesses/read Get the properties of DiskAccess resource Microsoft.Compute /galleries/images/read Gets the properties of Gallery Image Microsoft.Compute /images/read Get the properties of the Image Microsoft.AzureStackHCI /Clusters/Read Gets clusters Microsoft.AzureStackHCI /Clusters/ArcSettings/Read Gets arc resource of HCI cluster Microsoft.AzureStackHCI /Clusters/ArcSettings/Extensions/Read Gets extension resource of HCI cluster Microsoft.AzureStackHCI /Clusters/ArcSettings/Extensions/Write Create or update extension resource of HCI cluster Microsoft.AzureStackHCI /Clusters/ArcSettings/Extensions/Delete Delete extension resources of HCI cluster Microsoft.AzureStackHCI /Operations/Read Gets operations Microsoft.ConnectedVMwarevSphere/VirtualMachines/Read Read virtualmachines Microsoft.ConnectedVMwarevSphere/VirtualMachines/Extensions/Write Write extension resource Microsoft.ConnectedVMwarevSphere/VirtualMachines/Extensions/Read Gets extension resource NotActions DataActions Microsoft.HybridCompute /machines/WACLoginAsAdmin/action Lets you manage the OS of your resource via Windows Admin Center as an administrator. Microsoft.Compute /virtualMachines/WACloginAsAdmin/action Lets you manage the OS of your resource via Windows Admin Center as an administrator Microsoft.AzureStackHCI /Clusters/WACloginAsAdmin/Action Manage OS of HCI resource via Windows Admin Center as an administrator Microsoft.ConnectedVMwarevSphere/virtualmachines/WACloginAsAdmin/action Lets you manage the OS of your resource via Windows Admin Center as an administrator. NotDataActions "description": "Let's you manage the OS of your resource via Windows Admin Center as an administrator.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/a6333a3e-0164-44c3-b281-7a577aff287f", "name": "a6333a3e-0164-44c3-b281-7a577aff287f", "permissions": [ "actions": [ "Microsoft.HybridCompute/machines/*/read", "Microsoft.HybridCompute/machines/extensions/*", "Microsoft.HybridCompute/machines/upgradeExtensions/action", "Microsoft.HybridCompute/operations/read", "Microsoft.Network/networkInterfaces/read", "Microsoft.Network/loadBalancers/read", "Microsoft.Network/publicIPAddresses/read", "Microsoft.Network/virtualNetworks/read", "Microsoft.Network/networkSecurityGroups/read", "Microsoft.Network/networkSecurityGroups/defaultSecurityRules/read", "Microsoft.Network/networkWatchers/securityGroupView/action", "Microsoft.Network/networkSecurityGroups/securityRules/read", "Microsoft.Network/networkSecurityGroups/securityRules/write", "Microsoft.HybridConnectivity/endpoints/write", "Microsoft.HybridConnectivity/endpoints/read", "Microsoft.HybridConnectivity/endpoints/listManagedProxyDetails/action", "Microsoft.Compute/virtualMachines/read", "Microsoft.Compute/virtualMachines/patchAssessmentResults/latest/read", "Microsoft.Compute/virtualMachines/patchAssessmentResults/latest/softwarePatches/read", "Microsoft.Compute/virtualMachines/patchInstallationResults/read", "Microsoft.Compute/virtualMachines/patchInstallationResults/softwarePatches/read", "Microsoft.Compute/virtualMachines/extensions/read", "Microsoft.Compute/virtualMachines/instanceView/read", "Microsoft.Compute/virtualMachines/runCommands/read", "Microsoft.Compute/virtualMachines/vmSizes/read", "Microsoft.Compute/locations/publishers/artifacttypes/types/read", "Microsoft.Compute/locations/publishers/artifacttypes/types/versions/read", "Microsoft.Compute/diskAccesses/read", "Microsoft.Compute/galleries/images/read", "Microsoft.Compute/images/read", "Microsoft.AzureStackHCI/Clusters/Read", "Microsoft.AzureStackHCI/Clusters/ArcSettings/Read", "Microsoft.AzureStackHCI/Clusters/ArcSettings/Extensions/Read", "Microsoft.AzureStackHCI/Clusters/ArcSettings/Extensions/Write", "Microsoft.AzureStackHCI/Clusters/ArcSettings/Extensions/Delete", "Microsoft.AzureStackHCI/Operations/Read", "Microsoft.ConnectedVMwarevSphere/VirtualMachines/Read", "Microsoft.ConnectedVMwarevSphere/VirtualMachines/Extensions/Write", "Microsoft.ConnectedVMwarevSphere/VirtualMachines/Extensions/Read" "notActions": [], "dataActions": [ "Microsoft.HybridCompute/machines/WACLoginAsAdmin/action", "Microsoft.Compute/virtualMachines/WACloginAsAdmin/action", "Microsoft.AzureStackHCI/Clusters/WACloginAsAdmin/Action", "Microsoft.ConnectedVMwarevSphere/virtualmachines/WACloginAsAdmin/action" "notDataActions": [] "roleName": "Windows Admin Center Administrator Login", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can manage CDN endpoints, but can't grant access to other users.
"description": "Can manage CDN endpoints, but can't grant access to other users.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/426e0c7f-0c7e-4658-b36f-ff54d6c29b45", "name": "426e0c7f-0c7e-4658-b36f-ff54d6c29b45", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Cdn/edgenodes/read", "Microsoft.Cdn/operationresults/*", "Microsoft.Cdn/profiles/endpoints/*", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "CDN Endpoint Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can view CDN endpoints, but can't make changes.
"description": "Can view CDN endpoints, but can't make changes.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/871e35f6-b5c1-49cc-a043-bde969a0f2cd", "name": "871e35f6-b5c1-49cc-a043-bde969a0f2cd", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Cdn/edgenodes/read", "Microsoft.Cdn/operationresults/*", "Microsoft.Cdn/profiles/endpoints/*/read", "Microsoft.Cdn/profiles/afdendpoints/validateCustomDomain/action", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "CDN Endpoint Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can manage CDN profiles and their endpoints, but can't grant access to other users. Learn more
"description": "Can manage CDN profiles and their endpoints, but can't grant access to other users.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/ec156ff8-a8d1-4d15-830c-5b80698ca432", "name": "ec156ff8-a8d1-4d15-830c-5b80698ca432", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Cdn/edgenodes/read", "Microsoft.Cdn/operationresults/*", "Microsoft.Cdn/profiles/*", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "CDN Profile Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can view CDN profiles and their endpoints, but can't make changes.
"description": "Can view CDN profiles and their endpoints, but can't make changes.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/8f96442b-4075-438f-813d-ad51ab4019af", "name": "8f96442b-4075-438f-813d-ad51ab4019af", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Cdn/edgenodes/read", "Microsoft.Cdn/operationresults/*", "Microsoft.Cdn/profiles/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "CDN Profile Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage classic networks, but not access to them. Learn more
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage classic networks, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/b34d265f-36f7-4a0d-a4d4-e158ca92e90f", "name": "b34d265f-36f7-4a0d-a4d4-e158ca92e90f", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.ClassicNetwork/*", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Classic Network Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage DNS zones and record sets in Azure DNS, but does not let you control who has access to them. Learn more
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage DNS zones and record sets in Azure DNS, but does not let you control who has access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/befefa01-2a29-4197-83a8-272ff33ce314", "name": "befefa01-2a29-4197-83a8-272ff33ce314", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Network/dnsZones/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "DNS Zone Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage networks, but not access to them.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage networks, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7", "name": "4d97b98b-1d4f-4787-a291-c67834d212e7", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Network/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Network Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage private DNS zone resources, but not the virtual networks they are linked to. Learn more
"description": "Lets you manage private DNS zone resources, but not the virtual networks they are linked to.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/b12aa53e-6015-4669-85d0-8515ebb3ae7f", "name": "b12aa53e-6015-4669-85d0-8515ebb3ae7f", "permissions": [ "actions": [ "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Network/privateDnsZones/*", "Microsoft.Network/privateDnsOperationResults/*", "Microsoft.Network/privateDnsOperationStatuses/*", "Microsoft.Network/virtualNetworks/read", "Microsoft.Network/virtualNetworks/join/action", "Microsoft.Authorization/*/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Private DNS Zone Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage Traffic Manager profiles, but does not let you control who has access to them.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage Traffic Manager profiles, but does not let you control who has access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/a4b10055-b0c7-44c2-b00f-c7b5b3550cf7", "name": "a4b10055-b0c7-44c2-b00f-c7b5b3550cf7", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Network/trafficManagerProfiles/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Traffic Manager Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can create and manage an Avere vFXT cluster. Learn more
Microsoft.Network /virtualNetworks/subnets/join/action Joins a virtual network. Not Alertable. Microsoft.Network /virtualNetworks/subnets/joinViaServiceEndpoint/action Joins resource such as storage account or SQL database to a subnet. Not alertable. Microsoft.Network /networkSecurityGroups/join/action Joins a network security group. Not Alertable. Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Storage /*/read Microsoft.Storage /storageAccounts/* Create and manage storage accounts Microsoft.Support /* Create and update a support ticket Microsoft.Resources /subscriptions/resourceGroups/resources/read Gets the resources for the resource group. NotActions DataActions Microsoft.Storage /storageAccounts/blobServices/containers/blobs/delete Returns the result of deleting a blob Microsoft.Storage /storageAccounts/blobServices/containers/blobs/read Returns a blob or a list of blobs Microsoft.Storage /storageAccounts/blobServices/containers/blobs/write Returns the result of writing a blob NotDataActions "description": "Can create and manage an Avere vFXT cluster.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/4f8fab4f-1852-4a58-a46a-8eaf358af14a", "name": "4f8fab4f-1852-4a58-a46a-8eaf358af14a", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Compute/*/read", "Microsoft.Compute/availabilitySets/*", "Microsoft.Compute/proximityPlacementGroups/*", "Microsoft.Compute/virtualMachines/*", "Microsoft.Compute/disks/*", "Microsoft.Network/*/read", "Microsoft.Network/networkInterfaces/*", "Microsoft.Network/virtualNetworks/read", "Microsoft.Network/virtualNetworks/subnets/read", "Microsoft.Network/virtualNetworks/subnets/join/action", "Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action", "Microsoft.Network/networkSecurityGroups/join/action", "Microsoft.Resources/deployments/*", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Storage/*/read", "Microsoft.Storage/storageAccounts/*", "Microsoft.Support/*", "Microsoft.Resources/subscriptions/resourceGroups/resources/read" "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete", "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read", "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write" "notDataActions": [] "roleName": "Avere Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Used by the Avere vFXT cluster to manage the cluster Learn more
Microsoft.Network /networkInterfaces/write Creates a network interface or updates an existing network interface. Microsoft.Network /virtualNetworks/read Get the virtual network definition Microsoft.Network /virtualNetworks/subnets/read Gets a virtual network subnet definition Microsoft.Network /virtualNetworks/subnets/join/action Joins a virtual network. Not Alertable. Microsoft.Network /networkSecurityGroups/join/action Joins a network security group. Not Alertable. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Storage /storageAccounts/blobServices/containers/delete Returns the result of deleting a container Microsoft.Storage /storageAccounts/blobServices/containers/read Returns list of containers Microsoft.Storage /storageAccounts/blobServices/containers/write Returns the result of put blob container NotActions DataActions Microsoft.Storage /storageAccounts/blobServices/containers/blobs/delete Returns the result of deleting a blob Microsoft.Storage /storageAccounts/blobServices/containers/blobs/read Returns a blob or a list of blobs Microsoft.Storage /storageAccounts/blobServices/containers/blobs/write Returns the result of writing a blob NotDataActions "description": "Used by the Avere vFXT cluster to manage the cluster", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/c025889f-8102-4ebf-b32c-fc0c6f0c6bd9", "name": "c025889f-8102-4ebf-b32c-fc0c6f0c6bd9", "permissions": [ "actions": [ "Microsoft.Compute/virtualMachines/read", "Microsoft.Network/networkInterfaces/read", "Microsoft.Network/networkInterfaces/write", "Microsoft.Network/virtualNetworks/read", "Microsoft.Network/virtualNetworks/subnets/read", "Microsoft.Network/virtualNetworks/subnets/join/action", "Microsoft.Network/networkSecurityGroups/join/action", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Storage/storageAccounts/blobServices/containers/delete", "Microsoft.Storage/storageAccounts/blobServices/containers/read", "Microsoft.Storage/storageAccounts/blobServices/containers/write" "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete", "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read", "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write" "notDataActions": [] "roleName": "Avere Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage backup service, but can't create vaults and give access to others Learn more
Microsoft.RecoveryServices /Vaults/backupFabrics/operationResults/* Manage results of operation on backup management Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/* Create and manage backup containers inside backup fabrics of Recovery Services vault Microsoft.RecoveryServices /Vaults/backupFabrics/refreshContainers/action Refreshes the container list Microsoft.RecoveryServices /Vaults/backupJobs/* Create and manage backup jobs Microsoft.RecoveryServices /Vaults/backupJobsExport/action Export Jobs Microsoft.RecoveryServices /Vaults/backupOperationResults/* Create and manage Results of backup management operations Microsoft.RecoveryServices /Vaults/backupPolicies/* Create and manage backup policies Microsoft.RecoveryServices /Vaults/backupProtectableItems/* Create and manage items which can be backed up Microsoft.RecoveryServices /Vaults/backupProtectedItems/* Create and manage backed up items Microsoft.RecoveryServices /Vaults/backupProtectionContainers/* Create and manage containers holding backup items Microsoft.RecoveryServices /Vaults/backupSecurityPIN/* Microsoft.RecoveryServices /Vaults/backupUsageSummaries/read Returns summaries for Protected Items and Protected Servers for a Recovery Services . Microsoft.RecoveryServices /Vaults/certificates/* Create and manage certificates related to backup in Recovery Services vault Microsoft.RecoveryServices /Vaults/extendedInformation/* Create and manage extended info related to vault Microsoft.RecoveryServices /Vaults/monitoringAlerts/read Gets the alerts for the Recovery services vault. Microsoft.RecoveryServices /Vaults/monitoringConfigurations/* Microsoft.RecoveryServices /Vaults/read The Get Vault operation gets an object representing the Azure resource of type 'vault' Microsoft.RecoveryServices /Vaults/registeredIdentities/* Create and manage registered identities Microsoft.RecoveryServices /Vaults/usages/* Create and manage usage of Recovery Services vault Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Storage /storageAccounts/read Returns the list of storage accounts or gets the properties for the specified storage account. Microsoft.RecoveryServices /Vaults/backupstorageconfig/* Microsoft.RecoveryServices /Vaults/backupconfig/* Microsoft.RecoveryServices /Vaults/backupValidateOperation/action Validate Operation on Protected Item Microsoft.RecoveryServices /Vaults/write Create Vault operation creates an Azure resource of type 'vault' Microsoft.RecoveryServices /Vaults/backupOperations/read Returns Backup Operation Status for Recovery Services Vault. Microsoft.RecoveryServices /Vaults/backupEngines/read Returns all the backup management servers registered with vault. Microsoft.RecoveryServices /Vaults/backupFabrics/backupProtectionIntent/* Microsoft.RecoveryServices /Vaults/backupFabrics/protectableContainers/read Get all protectable containers Microsoft.RecoveryServices /vaults/operationStatus/read Gets Operation Status for a given Operation Microsoft.RecoveryServices /vaults/operationResults/read The Get Operation Results operation can be used get the operation status and result for the asynchronously submitted operation Microsoft.RecoveryServices /locations/backupStatus/action Check Backup Status for Recovery Services Vaults Microsoft.RecoveryServices /locations/backupPreValidateProtection/action Microsoft.RecoveryServices /locations/backupValidateFeatures/action Validate Features Microsoft.RecoveryServices /Vaults/monitoringAlerts/write Resolves the alert. Microsoft.RecoveryServices /operations/read Operation returns the list of Operations for a Resource Provider Microsoft.RecoveryServices /locations/operationStatus/read Gets Operation Status for a given Operation Microsoft.RecoveryServices /Vaults/backupProtectionIntents/read List all backup Protection Intents Microsoft.Support /* Create and update a support ticket Microsoft.DataProtection /locations/getBackupStatus/action Check Backup Status for Recovery Services Vaults Microsoft.DataProtection /backupVaults/backupInstances/write Creates a Backup Instance Microsoft.DataProtection /backupVaults/backupInstances/delete Deletes the Backup Instance Microsoft.DataProtection /backupVaults/backupInstances/read Returns all Backup Instances Microsoft.DataProtection /backupVaults/backupInstances/read Returns all Backup Instances Microsoft.DataProtection /backupVaults/deletedBackupInstances/read List soft-deleted Backup Instances in a Backup Vault. Microsoft.DataProtection /backupVaults/deletedBackupInstances/undelete/action Perform undelete of soft-deleted Backup Instance. Backup Instance moves from SoftDeleted to ProtectionStopped state. Microsoft.DataProtection /backupVaults/backupInstances/backup/action Performs Backup on the Backup Instance Microsoft.DataProtection /backupVaults/backupInstances/validateRestore/action Validates for Restore of the Backup Instance Microsoft.DataProtection /backupVaults/backupInstances/restore/action Triggers restore on the Backup Instance Microsoft.DataProtection /backupVaults/backupPolicies/write Creates Backup Policy Microsoft.DataProtection /backupVaults/backupPolicies/delete Deletes the Backup Policy Microsoft.DataProtection /backupVaults/backupPolicies/read Returns all Backup Policies Microsoft.DataProtection /backupVaults/backupPolicies/read Returns all Backup Policies Microsoft.DataProtection /backupVaults/backupInstances/recoveryPoints/read Returns all Recovery Points Microsoft.DataProtection /backupVaults/backupInstances/recoveryPoints/read Returns all Recovery Points Microsoft.DataProtection /backupVaults/backupInstances/findRestorableTimeRanges/action Finds Restorable Time Ranges Microsoft.DataProtection /backupVaults/write Update BackupVault operation updates an Azure resource of type 'Backup Vault' Microsoft.DataProtection /backupVaults/read Gets list of Backup Vaults in a Resource Group Microsoft.DataProtection /backupVaults/operationResults/read Gets Operation Result of a Patch Operation for a Backup Vault Microsoft.DataProtection /backupVaults/operationStatus/read Returns Backup Operation Status for Backup Vault. Microsoft.DataProtection /locations/checkNameAvailability/action Checks if the requested BackupVault Name is Available Microsoft.DataProtection /locations/checkFeatureSupport/action Validates if a feature is supported Microsoft.DataProtection /backupVaults/read Gets list of Backup Vaults in a Resource Group Microsoft.DataProtection /backupVaults/read Gets list of Backup Vaults in a Resource Group Microsoft.DataProtection /locations/operationStatus/read Returns Backup Operation Status for Backup Vault. Microsoft.DataProtection /locations/operationResults/read Returns Backup Operation Result for Backup Vault. Microsoft.DataProtection /backupVaults/validateForBackup/action Validates for backup of Backup Instance Microsoft.DataProtection /operations/read Operation returns the list of Operations for a Resource Provider NotActions DataActions NotDataActions "description": "Lets you manage backup service,but can't create vaults and give access to others", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5e467623-bb1f-42f4-a55d-6e525e11384b", "name": "5e467623-bb1f-42f4-a55d-6e525e11384b", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Network/virtualNetworks/read", "Microsoft.RecoveryServices/locations/*", "Microsoft.RecoveryServices/Vaults/backupFabrics/operationResults/*", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/*", "Microsoft.RecoveryServices/Vaults/backupFabrics/refreshContainers/action", "Microsoft.RecoveryServices/Vaults/backupJobs/*", "Microsoft.RecoveryServices/Vaults/backupJobsExport/action", "Microsoft.RecoveryServices/Vaults/backupOperationResults/*", "Microsoft.RecoveryServices/Vaults/backupPolicies/*", "Microsoft.RecoveryServices/Vaults/backupProtectableItems/*", "Microsoft.RecoveryServices/Vaults/backupProtectedItems/*", "Microsoft.RecoveryServices/Vaults/backupProtectionContainers/*", "Microsoft.RecoveryServices/Vaults/backupSecurityPIN/*", "Microsoft.RecoveryServices/Vaults/backupUsageSummaries/read", "Microsoft.RecoveryServices/Vaults/certificates/*", "Microsoft.RecoveryServices/Vaults/extendedInformation/*", "Microsoft.RecoveryServices/Vaults/monitoringAlerts/read", "Microsoft.RecoveryServices/Vaults/monitoringConfigurations/*", "Microsoft.RecoveryServices/Vaults/read", "Microsoft.RecoveryServices/Vaults/registeredIdentities/*", "Microsoft.RecoveryServices/Vaults/usages/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Storage/storageAccounts/read", "Microsoft.RecoveryServices/Vaults/backupstorageconfig/*", "Microsoft.RecoveryServices/Vaults/backupconfig/*", "Microsoft.RecoveryServices/Vaults/backupValidateOperation/action", "Microsoft.RecoveryServices/Vaults/write", "Microsoft.RecoveryServices/Vaults/backupOperations/read", "Microsoft.RecoveryServices/Vaults/backupEngines/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/backupProtectionIntent/*", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectableContainers/read", "Microsoft.RecoveryServices/vaults/operationStatus/read", "Microsoft.RecoveryServices/vaults/operationResults/read", "Microsoft.RecoveryServices/locations/backupStatus/action", "Microsoft.RecoveryServices/locations/backupPreValidateProtection/action", "Microsoft.RecoveryServices/locations/backupValidateFeatures/action", "Microsoft.RecoveryServices/Vaults/monitoringAlerts/write", "Microsoft.RecoveryServices/operations/read", "Microsoft.RecoveryServices/locations/operationStatus/read", "Microsoft.RecoveryServices/Vaults/backupProtectionIntents/read", "Microsoft.Support/*", "Microsoft.DataProtection/locations/getBackupStatus/action", "Microsoft.DataProtection/backupVaults/backupInstances/write", "Microsoft.DataProtection/backupVaults/backupInstances/delete", "Microsoft.DataProtection/backupVaults/backupInstances/read", "Microsoft.DataProtection/backupVaults/backupInstances/read", "Microsoft.DataProtection/backupVaults/deletedBackupInstances/read", "Microsoft.DataProtection/backupVaults/deletedBackupInstances/undelete/action", "Microsoft.DataProtection/backupVaults/backupInstances/backup/action", "Microsoft.DataProtection/backupVaults/backupInstances/validateRestore/action", "Microsoft.DataProtection/backupVaults/backupInstances/restore/action", "Microsoft.DataProtection/backupVaults/backupPolicies/write", "Microsoft.DataProtection/backupVaults/backupPolicies/delete", "Microsoft.DataProtection/backupVaults/backupPolicies/read", "Microsoft.DataProtection/backupVaults/backupPolicies/read", "Microsoft.DataProtection/backupVaults/backupInstances/recoveryPoints/read", "Microsoft.DataProtection/backupVaults/backupInstances/recoveryPoints/read", "Microsoft.DataProtection/backupVaults/backupInstances/findRestorableTimeRanges/action", "Microsoft.DataProtection/backupVaults/write", "Microsoft.DataProtection/backupVaults/read", "Microsoft.DataProtection/backupVaults/operationResults/read", "Microsoft.DataProtection/backupVaults/operationStatus/read", "Microsoft.DataProtection/locations/checkNameAvailability/action", "Microsoft.DataProtection/locations/checkFeatureSupport/action", "Microsoft.DataProtection/backupVaults/read", "Microsoft.DataProtection/backupVaults/read", "Microsoft.DataProtection/locations/operationStatus/read", "Microsoft.DataProtection/locations/operationResults/read", "Microsoft.DataProtection/backupVaults/validateForBackup/action", "Microsoft.DataProtection/operations/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Backup Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage backup services, except removal of backup, vault creation and giving access to others Learn more
Microsoft.RecoveryServices /Vaults/backupFabrics/operationResults/read Returns status of the operation Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/operationResults/read Gets result of Operation performed on Protection Container. Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/backup/action Performs Backup for Protected Item. Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/operationResults/read Gets Result of Operation Performed on Protected Items. Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/operationsStatus/read Returns the status of Operation performed on Protected Items. Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/read Returns object details of the Protected Item Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/recoveryPoints/provisionInstantItemRecovery/action Provision Instant Item Recovery for Protected Item Microsoft.RecoveryServices /vaults/backupFabrics/protectionContainers/protectedItems/recoveryPoints/accessToken/action Get AccessToken for Cross Region Restore. Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/recoveryPoints/read Get Recovery Points for Protected Items. Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/recoveryPoints/restore/action Restore Recovery Points for Protected Items. Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/recoveryPoints/revokeInstantItemRecovery/action Revoke Instant Item Recovery for Protected Item Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/write Create a backup Protected Item Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/read Returns all registered containers Microsoft.RecoveryServices /Vaults/backupFabrics/refreshContainers/action Refreshes the container list Microsoft.RecoveryServices /Vaults/backupJobs/* Create and manage backup jobs Microsoft.RecoveryServices /Vaults/backupJobsExport/action Export Jobs Microsoft.RecoveryServices /Vaults/backupOperationResults/* Create and manage Results of backup management operations Microsoft.RecoveryServices /Vaults/backupPolicies/operationResults/read Get Results of Policy Operation. Microsoft.RecoveryServices /Vaults/backupPolicies/read Returns all Protection Policies Microsoft.RecoveryServices /Vaults/backupProtectableItems/* Create and manage items which can be backed up Microsoft.RecoveryServices /Vaults/backupProtectedItems/read Returns the list of all Protected Items. Microsoft.RecoveryServices /Vaults/backupProtectionContainers/read Returns all containers belonging to the subscription Microsoft.RecoveryServices /Vaults/backupUsageSummaries/read Returns summaries for Protected Items and Protected Servers for a Recovery Services . Microsoft.RecoveryServices /Vaults/certificates/write The Update Resource Certificate operation updates the resource/vault credential certificate. Microsoft.RecoveryServices /Vaults/extendedInformation/read The Get Extended Info operation gets an object's Extended Info representing the Azure resource of type ?vault? Microsoft.RecoveryServices /Vaults/extendedInformation/write The Get Extended Info operation gets an object's Extended Info representing the Azure resource of type ?vault? Microsoft.RecoveryServices /Vaults/monitoringAlerts/read Gets the alerts for the Recovery services vault. Microsoft.RecoveryServices /Vaults/monitoringConfigurations/* Microsoft.RecoveryServices /Vaults/read The Get Vault operation gets an object representing the Azure resource of type 'vault' Microsoft.RecoveryServices /Vaults/registeredIdentities/operationResults/read The Get Operation Results operation can be used get the operation status and result for the asynchronously submitted operation Microsoft.RecoveryServices /Vaults/registeredIdentities/read The Get Containers operation can be used get the containers registered for a resource. Microsoft.RecoveryServices /Vaults/registeredIdentities/write The Register Service Container operation can be used to register a container with Recovery Service. Microsoft.RecoveryServices /Vaults/usages/read Returns usage details for a Recovery Services Vault. Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Storage /storageAccounts/read Returns the list of storage accounts or gets the properties for the specified storage account. Microsoft.RecoveryServices /Vaults/backupstorageconfig/* Microsoft.RecoveryServices /Vaults/backupValidateOperation/action Validate Operation on Protected Item Microsoft.RecoveryServices /Vaults/backupTriggerValidateOperation/action Validate Operation on Protected Item Microsoft.RecoveryServices /Vaults/backupValidateOperationResults/read Validate Operation on Protected Item Microsoft.RecoveryServices /Vaults/backupValidateOperationsStatuses/read Validate Operation on Protected Item Microsoft.RecoveryServices /Vaults/backupOperations/read Returns Backup Operation Status for Recovery Services Vault. Microsoft.RecoveryServices /Vaults/backupPolicies/operations/read Get Status of Policy Operation. Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/write Creates a registered container Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/inquire/action Do inquiry for workloads within a container Microsoft.RecoveryServices /Vaults/backupEngines/read Returns all the backup management servers registered with vault. Microsoft.RecoveryServices /Vaults/backupFabrics/backupProtectionIntent/write Create a backup Protection Intent Microsoft.RecoveryServices /Vaults/backupFabrics/backupProtectionIntent/read Get a backup Protection Intent Microsoft.RecoveryServices /Vaults/backupFabrics/protectableContainers/read Get all protectable containers Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/items/read Get all items in a container Microsoft.RecoveryServices /locations/backupStatus/action Check Backup Status for Recovery Services Vaults Microsoft.RecoveryServices /locations/backupPreValidateProtection/action Microsoft.RecoveryServices /locations/backupValidateFeatures/action Validate Features Microsoft.RecoveryServices /locations/backupAadProperties/read Get AAD Properties for authentication in the third region for Cross Region Restore. Microsoft.RecoveryServices /locations/backupCrrJobs/action List Cross Region Restore Jobs in the secondary region for Recovery Services Vault. Microsoft.RecoveryServices /locations/backupCrrJob/action Get Cross Region Restore Job Details in the secondary region for Recovery Services Vault. Microsoft.RecoveryServices /locations/backupCrossRegionRestore/action Trigger Cross region restore. Microsoft.RecoveryServices /locations/backupCrrOperationResults/read Returns CRR Operation Result for Recovery Services Vault. Microsoft.RecoveryServices /locations/backupCrrOperationsStatus/read Returns CRR Operation Status for Recovery Services Vault. Microsoft.RecoveryServices /Vaults/monitoringAlerts/write Resolves the alert. Microsoft.RecoveryServices /operations/read Operation returns the list of Operations for a Resource Provider Microsoft.RecoveryServices /locations/operationStatus/read Gets Operation Status for a given Operation Microsoft.RecoveryServices /Vaults/backupProtectionIntents/read List all backup Protection Intents Microsoft.Support /* Create and update a support ticket Microsoft.DataProtection /backupVaults/backupInstances/read Returns all Backup Instances Microsoft.DataProtection /backupVaults/backupInstances/read Returns all Backup Instances Microsoft.DataProtection /backupVaults/deletedBackupInstances/read List soft-deleted Backup Instances in a Backup Vault. Microsoft.DataProtection /backupVaults/backupPolicies/read Returns all Backup Policies Microsoft.DataProtection /backupVaults/backupPolicies/read Returns all Backup Policies Microsoft.DataProtection /backupVaults/backupInstances/recoveryPoints/read Returns all Recovery Points Microsoft.DataProtection /backupVaults/backupInstances/recoveryPoints/read Returns all Recovery Points Microsoft.DataProtection /backupVaults/backupInstances/findRestorableTimeRanges/action Finds Restorable Time Ranges Microsoft.DataProtection /backupVaults/read Gets list of Backup Vaults in a Resource Group Microsoft.DataProtection /backupVaults/operationResults/read Gets Operation Result of a Patch Operation for a Backup Vault Microsoft.DataProtection /backupVaults/operationStatus/read Returns Backup Operation Status for Backup Vault. Microsoft.DataProtection /backupVaults/read Gets list of Backup Vaults in a Resource Group Microsoft.DataProtection /backupVaults/read Gets list of Backup Vaults in a Resource Group Microsoft.DataProtection /locations/operationStatus/read Returns Backup Operation Status for Backup Vault. Microsoft.DataProtection /locations/operationResults/read Returns Backup Operation Result for Backup Vault. Microsoft.DataProtection /operations/read Operation returns the list of Operations for a Resource Provider Microsoft.DataProtection /backupVaults/validateForBackup/action Validates for backup of Backup Instance Microsoft.DataProtection /backupVaults/backupInstances/backup/action Performs Backup on the Backup Instance Microsoft.DataProtection /backupVaults/backupInstances/validateRestore/action Validates for Restore of the Backup Instance Microsoft.DataProtection /backupVaults/backupInstances/restore/action Triggers restore on the Backup Instance NotActions DataActions NotDataActions "description": "Lets you manage backup services, except removal of backup, vault creation and giving access to others", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/00c29273-979b-4161-815c-10b084fb9324", "name": "00c29273-979b-4161-815c-10b084fb9324", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Network/virtualNetworks/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/operationResults/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/operationResults/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/backup/action", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/operationResults/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/operationsStatus/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/recoveryPoints/provisionInstantItemRecovery/action", "Microsoft.RecoveryServices/vaults/backupFabrics/protectionContainers/protectedItems/recoveryPoints/accessToken/action", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/recoveryPoints/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/recoveryPoints/restore/action", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/recoveryPoints/revokeInstantItemRecovery/action", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/write", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/refreshContainers/action", "Microsoft.RecoveryServices/Vaults/backupJobs/*", "Microsoft.RecoveryServices/Vaults/backupJobsExport/action", "Microsoft.RecoveryServices/Vaults/backupOperationResults/*", "Microsoft.RecoveryServices/Vaults/backupPolicies/operationResults/read", "Microsoft.RecoveryServices/Vaults/backupPolicies/read", "Microsoft.RecoveryServices/Vaults/backupProtectableItems/*", "Microsoft.RecoveryServices/Vaults/backupProtectedItems/read", "Microsoft.RecoveryServices/Vaults/backupProtectionContainers/read", "Microsoft.RecoveryServices/Vaults/backupUsageSummaries/read", "Microsoft.RecoveryServices/Vaults/certificates/write", "Microsoft.RecoveryServices/Vaults/extendedInformation/read", "Microsoft.RecoveryServices/Vaults/extendedInformation/write", "Microsoft.RecoveryServices/Vaults/monitoringAlerts/read", "Microsoft.RecoveryServices/Vaults/monitoringConfigurations/*", "Microsoft.RecoveryServices/Vaults/read", "Microsoft.RecoveryServices/Vaults/registeredIdentities/operationResults/read", "Microsoft.RecoveryServices/Vaults/registeredIdentities/read", "Microsoft.RecoveryServices/Vaults/registeredIdentities/write", "Microsoft.RecoveryServices/Vaults/usages/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Storage/storageAccounts/read", "Microsoft.RecoveryServices/Vaults/backupstorageconfig/*", "Microsoft.RecoveryServices/Vaults/backupValidateOperation/action", "Microsoft.RecoveryServices/Vaults/backupTriggerValidateOperation/action", "Microsoft.RecoveryServices/Vaults/backupValidateOperationResults/read", "Microsoft.RecoveryServices/Vaults/backupValidateOperationsStatuses/read", "Microsoft.RecoveryServices/Vaults/backupOperations/read", "Microsoft.RecoveryServices/Vaults/backupPolicies/operations/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/write", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/inquire/action", "Microsoft.RecoveryServices/Vaults/backupEngines/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/backupProtectionIntent/write", "Microsoft.RecoveryServices/Vaults/backupFabrics/backupProtectionIntent/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectableContainers/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/items/read", "Microsoft.RecoveryServices/locations/backupStatus/action", "Microsoft.RecoveryServices/locations/backupPreValidateProtection/action", "Microsoft.RecoveryServices/locations/backupValidateFeatures/action", "Microsoft.RecoveryServices/locations/backupAadProperties/read", "Microsoft.RecoveryServices/locations/backupCrrJobs/action", "Microsoft.RecoveryServices/locations/backupCrrJob/action", "Microsoft.RecoveryServices/locations/backupCrossRegionRestore/action", "Microsoft.RecoveryServices/locations/backupCrrOperationResults/read", "Microsoft.RecoveryServices/locations/backupCrrOperationsStatus/read", "Microsoft.RecoveryServices/Vaults/monitoringAlerts/write", "Microsoft.RecoveryServices/operations/read", "Microsoft.RecoveryServices/locations/operationStatus/read", "Microsoft.RecoveryServices/Vaults/backupProtectionIntents/read", "Microsoft.Support/*", "Microsoft.DataProtection/backupVaults/backupInstances/read", "Microsoft.DataProtection/backupVaults/backupInstances/read", "Microsoft.DataProtection/backupVaults/deletedBackupInstances/read", "Microsoft.DataProtection/backupVaults/backupPolicies/read", "Microsoft.DataProtection/backupVaults/backupPolicies/read", "Microsoft.DataProtection/backupVaults/backupInstances/recoveryPoints/read", "Microsoft.DataProtection/backupVaults/backupInstances/recoveryPoints/read", "Microsoft.DataProtection/backupVaults/backupInstances/findRestorableTimeRanges/action", "Microsoft.DataProtection/backupVaults/read", "Microsoft.DataProtection/backupVaults/operationResults/read", "Microsoft.DataProtection/backupVaults/operationStatus/read", "Microsoft.DataProtection/backupVaults/read", "Microsoft.DataProtection/backupVaults/read", "Microsoft.DataProtection/locations/operationStatus/read", "Microsoft.DataProtection/locations/operationResults/read", "Microsoft.DataProtection/operations/read", "Microsoft.DataProtection/backupVaults/validateForBackup/action", "Microsoft.DataProtection/backupVaults/backupInstances/backup/action", "Microsoft.DataProtection/backupVaults/backupInstances/validateRestore/action", "Microsoft.DataProtection/backupVaults/backupInstances/restore/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Backup Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can view backup services, but can't make changes Learn more
Microsoft.RecoveryServices /locations/allocatedStamp/read GetAllocatedStamp is internal operation used by service Microsoft.RecoveryServices /Vaults/backupFabrics/operationResults/read Returns status of the operation Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/operationResults/read Gets result of Operation performed on Protection Container. Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/operationResults/read Gets Result of Operation Performed on Protected Items. Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/operationsStatus/read Returns the status of Operation performed on Protected Items. Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/read Returns object details of the Protected Item Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/protectedItems/recoveryPoints/read Get Recovery Points for Protected Items. Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/read Returns all registered containers Microsoft.RecoveryServices /Vaults/backupJobs/operationResults/read Returns the Result of Job Operation. Microsoft.RecoveryServices /Vaults/backupJobs/read Returns all Job Objects Microsoft.RecoveryServices /Vaults/backupJobsExport/action Export Jobs Microsoft.RecoveryServices /Vaults/backupOperationResults/read Returns Backup Operation Result for Recovery Services Vault. Microsoft.RecoveryServices /Vaults/backupPolicies/operationResults/read Get Results of Policy Operation. Microsoft.RecoveryServices /Vaults/backupPolicies/read Returns all Protection Policies Microsoft.RecoveryServices /Vaults/backupProtectedItems/read Returns the list of all Protected Items. Microsoft.RecoveryServices /Vaults/backupProtectionContainers/read Returns all containers belonging to the subscription Microsoft.RecoveryServices /Vaults/backupUsageSummaries/read Returns summaries for Protected Items and Protected Servers for a Recovery Services . Microsoft.RecoveryServices /Vaults/extendedInformation/read The Get Extended Info operation gets an object's Extended Info representing the Azure resource of type ?vault? Microsoft.RecoveryServices /Vaults/monitoringAlerts/read Gets the alerts for the Recovery services vault. Microsoft.RecoveryServices /Vaults/read The Get Vault operation gets an object representing the Azure resource of type 'vault' Microsoft.RecoveryServices /Vaults/registeredIdentities/operationResults/read The Get Operation Results operation can be used get the operation status and result for the asynchronously submitted operation Microsoft.RecoveryServices /Vaults/registeredIdentities/read The Get Containers operation can be used get the containers registered for a resource. Microsoft.RecoveryServices /Vaults/backupstorageconfig/read Returns Storage Configuration for Recovery Services Vault. Microsoft.RecoveryServices /Vaults/backupconfig/read Returns Configuration for Recovery Services Vault. Microsoft.RecoveryServices /Vaults/backupOperations/read Returns Backup Operation Status for Recovery Services Vault. Microsoft.RecoveryServices /Vaults/backupPolicies/operations/read Get Status of Policy Operation. Microsoft.RecoveryServices /Vaults/backupEngines/read Returns all the backup management servers registered with vault. Microsoft.RecoveryServices /Vaults/backupFabrics/backupProtectionIntent/read Get a backup Protection Intent Microsoft.RecoveryServices /Vaults/backupFabrics/protectionContainers/items/read Get all items in a container Microsoft.RecoveryServices /locations/backupStatus/action Check Backup Status for Recovery Services Vaults Microsoft.RecoveryServices /Vaults/monitoringConfigurations/* Microsoft.RecoveryServices /Vaults/monitoringAlerts/write Resolves the alert. Microsoft.RecoveryServices /operations/read Operation returns the list of Operations for a Resource Provider Microsoft.RecoveryServices /locations/operationStatus/read Gets Operation Status for a given Operation Microsoft.RecoveryServices /Vaults/backupProtectionIntents/read List all backup Protection Intents Microsoft.RecoveryServices /Vaults/usages/read Returns usage details for a Recovery Services Vault. Microsoft.RecoveryServices /locations/backupValidateFeatures/action Validate Features Microsoft.RecoveryServices /locations/backupCrrJobs/action List Cross Region Restore Jobs in the secondary region for Recovery Services Vault. Microsoft.RecoveryServices /locations/backupCrrJob/action Get Cross Region Restore Job Details in the secondary region for Recovery Services Vault. Microsoft.RecoveryServices /locations/backupCrrOperationResults/read Returns CRR Operation Result for Recovery Services Vault. Microsoft.RecoveryServices /locations/backupCrrOperationsStatus/read Returns CRR Operation Status for Recovery Services Vault. Microsoft.DataProtection /locations/getBackupStatus/action Check Backup Status for Recovery Services Vaults Microsoft.DataProtection /backupVaults/backupInstances/write Creates a Backup Instance Microsoft.DataProtection /backupVaults/backupInstances/read Returns all Backup Instances Microsoft.DataProtection /backupVaults/deletedBackupInstances/read List soft-deleted Backup Instances in a Backup Vault. Microsoft.DataProtection /backupVaults/backupInstances/backup/action Performs Backup on the Backup Instance Microsoft.DataProtection /backupVaults/backupInstances/validateRestore/action Validates for Restore of the Backup Instance Microsoft.DataProtection /backupVaults/backupInstances/restore/action Triggers restore on the Backup Instance Microsoft.DataProtection /backupVaults/backupPolicies/read Returns all Backup Policies Microsoft.DataProtection /backupVaults/backupPolicies/read Returns all Backup Policies Microsoft.DataProtection /backupVaults/backupInstances/recoveryPoints/read Returns all Recovery Points Microsoft.DataProtection /backupVaults/backupInstances/recoveryPoints/read Returns all Recovery Points Microsoft.DataProtection /backupVaults/backupInstances/findRestorableTimeRanges/action Finds Restorable Time Ranges Microsoft.DataProtection /backupVaults/read Gets list of Backup Vaults in a Resource Group Microsoft.DataProtection /backupVaults/operationResults/read Gets Operation Result of a Patch Operation for a Backup Vault Microsoft.DataProtection /backupVaults/operationStatus/read Returns Backup Operation Status for Backup Vault. Microsoft.DataProtection /backupVaults/read Gets list of Backup Vaults in a Resource Group Microsoft.DataProtection /backupVaults/read Gets list of Backup Vaults in a Resource Group Microsoft.DataProtection /locations/operationStatus/read Returns Backup Operation Status for Backup Vault. Microsoft.DataProtection /locations/operationResults/read Returns Backup Operation Result for Backup Vault. Microsoft.DataProtection /backupVaults/validateForBackup/action Validates for backup of Backup Instance Microsoft.DataProtection /operations/read Operation returns the list of Operations for a Resource Provider NotActions DataActions NotDataActions "description": "Can view backup services, but can't make changes", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/a795c7a0-d4a2-40c1-ae25-d81f01202912", "name": "a795c7a0-d4a2-40c1-ae25-d81f01202912", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.RecoveryServices/locations/allocatedStamp/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/operationResults/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/operationResults/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/operationResults/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/operationsStatus/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/recoveryPoints/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/read", "Microsoft.RecoveryServices/Vaults/backupJobs/operationResults/read", "Microsoft.RecoveryServices/Vaults/backupJobs/read", "Microsoft.RecoveryServices/Vaults/backupJobsExport/action", "Microsoft.RecoveryServices/Vaults/backupOperationResults/read", "Microsoft.RecoveryServices/Vaults/backupPolicies/operationResults/read", "Microsoft.RecoveryServices/Vaults/backupPolicies/read", "Microsoft.RecoveryServices/Vaults/backupProtectedItems/read", "Microsoft.RecoveryServices/Vaults/backupProtectionContainers/read", "Microsoft.RecoveryServices/Vaults/backupUsageSummaries/read", "Microsoft.RecoveryServices/Vaults/extendedInformation/read", "Microsoft.RecoveryServices/Vaults/monitoringAlerts/read", "Microsoft.RecoveryServices/Vaults/read", "Microsoft.RecoveryServices/Vaults/registeredIdentities/operationResults/read", "Microsoft.RecoveryServices/Vaults/registeredIdentities/read", "Microsoft.RecoveryServices/Vaults/backupstorageconfig/read", "Microsoft.RecoveryServices/Vaults/backupconfig/read", "Microsoft.RecoveryServices/Vaults/backupOperations/read", "Microsoft.RecoveryServices/Vaults/backupPolicies/operations/read", "Microsoft.RecoveryServices/Vaults/backupEngines/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/backupProtectionIntent/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/items/read", "Microsoft.RecoveryServices/locations/backupStatus/action", "Microsoft.RecoveryServices/Vaults/monitoringConfigurations/*", "Microsoft.RecoveryServices/Vaults/monitoringAlerts/write", "Microsoft.RecoveryServices/operations/read", "Microsoft.RecoveryServices/locations/operationStatus/read", "Microsoft.RecoveryServices/Vaults/backupProtectionIntents/read", "Microsoft.RecoveryServices/Vaults/usages/read", "Microsoft.RecoveryServices/locations/backupValidateFeatures/action", "Microsoft.RecoveryServices/locations/backupCrrJobs/action", "Microsoft.RecoveryServices/locations/backupCrrJob/action", "Microsoft.RecoveryServices/locations/backupCrrOperationResults/read", "Microsoft.RecoveryServices/locations/backupCrrOperationsStatus/read", "Microsoft.DataProtection/locations/getBackupStatus/action", "Microsoft.DataProtection/backupVaults/backupInstances/write", "Microsoft.DataProtection/backupVaults/backupInstances/read", "Microsoft.DataProtection/backupVaults/deletedBackupInstances/read", "Microsoft.DataProtection/backupVaults/backupInstances/backup/action", "Microsoft.DataProtection/backupVaults/backupInstances/validateRestore/action", "Microsoft.DataProtection/backupVaults/backupInstances/restore/action", "Microsoft.DataProtection/backupVaults/backupPolicies/read", "Microsoft.DataProtection/backupVaults/backupPolicies/read", "Microsoft.DataProtection/backupVaults/backupInstances/recoveryPoints/read", "Microsoft.DataProtection/backupVaults/backupInstances/recoveryPoints/read", "Microsoft.DataProtection/backupVaults/backupInstances/findRestorableTimeRanges/action", "Microsoft.DataProtection/backupVaults/read", "Microsoft.DataProtection/backupVaults/operationResults/read", "Microsoft.DataProtection/backupVaults/operationStatus/read", "Microsoft.DataProtection/backupVaults/read", "Microsoft.DataProtection/backupVaults/read", "Microsoft.DataProtection/locations/operationStatus/read", "Microsoft.DataProtection/locations/operationResults/read", "Microsoft.DataProtection/backupVaults/validateForBackup/action", "Microsoft.DataProtection/operations/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Backup Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage classic storage accounts, but not access to them.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage classic storage accounts, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/86e8f5dc-a6e9-4c67-9d15-de283e8eac25", "name": "86e8f5dc-a6e9-4c67-9d15-de283e8eac25", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.ClassicStorage/storageAccounts/*", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Classic Storage Account Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Classic Storage Account Key Operators are allowed to list and regenerate keys on Classic Storage Accounts Learn more
Microsoft.ClassicStorage /storageAccounts/listkeys/action Lists the access keys for the storage accounts. Microsoft.ClassicStorage /storageAccounts/regeneratekey/action Regenerates the existing access keys for the storage account. NotActions DataActions NotDataActions "description": "Classic Storage Account Key Operators are allowed to list and regenerate keys on Classic Storage Accounts", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/985d6b00-f706-48f5-a6fe-d0ca12fb668d", "name": "985d6b00-f706-48f5-a6fe-d0ca12fb668d", "permissions": [ "actions": [ "Microsoft.ClassicStorage/storageAccounts/listkeys/action", "Microsoft.ClassicStorage/storageAccounts/regeneratekey/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Classic Storage Account Key Operator Service Role", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage everything under Data Box Service except giving access to others. Learn more
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket Microsoft.Databox /* NotActions DataActions NotDataActions "description": "Lets you manage everything under Data Box Service except giving access to others.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/add466c9-e687-43fc-8d98-dfcf8d720be5", "name": "add466c9-e687-43fc-8d98-dfcf8d720be5", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Databox/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Data Box Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage Data Box Service except creating order or editing order details and giving access to others. Learn more
Microsoft.Databox /jobs/listcredentials/action Lists the unencrypted credentials related to the order. Microsoft.Databox /locations/availableSkus/action This method returns the list of available skus. Microsoft.Databox /locations/validateInputs/action This method does all type of validations. Microsoft.Databox /locations/regionConfiguration/action This method returns the configurations for the region. Microsoft.Databox /locations/validateAddress/action Validates the shipping address and provides alternate addresses if any. Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage Data Box Service except creating order or editing order details and giving access to others.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/028f4ed7-e2a9-465e-a8f4-9c0ffdfdc027", "name": "028f4ed7-e2a9-465e-a8f4-9c0ffdfdc027", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Databox/*/read", "Microsoft.Databox/jobs/listsecrets/action", "Microsoft.Databox/jobs/listcredentials/action", "Microsoft.Databox/locations/availableSkus/action", "Microsoft.Databox/locations/validateInputs/action", "Microsoft.Databox/locations/regionConfiguration/action", "Microsoft.Databox/locations/validateAddress/action", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Data Box Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you submit, monitor, and manage your own jobs but not create or delete Data Lake Analytics accounts. Learn more
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions Microsoft.BigAnalytics/accounts/Delete Microsoft.BigAnalytics/accounts/TakeOwnership/action Microsoft.BigAnalytics/accounts/Write Microsoft.DataLakeAnalytics /accounts/Delete Delete a DataLakeAnalytics account. Microsoft.DataLakeAnalytics /accounts/TakeOwnership/action Grant permissions to cancel jobs submitted by other users. Microsoft.DataLakeAnalytics /accounts/Write Create or update a DataLakeAnalytics account. Microsoft.DataLakeAnalytics /accounts/dataLakeStoreAccounts/Write Create or update a linked DataLakeStore account of a DataLakeAnalytics account. Microsoft.DataLakeAnalytics /accounts/dataLakeStoreAccounts/Delete Unlink a DataLakeStore account from a DataLakeAnalytics account. Microsoft.DataLakeAnalytics /accounts/storageAccounts/Write Create or update a linked Storage account of a DataLakeAnalytics account. Microsoft.DataLakeAnalytics /accounts/storageAccounts/Delete Unlink a Storage account from a DataLakeAnalytics account. Microsoft.DataLakeAnalytics /accounts/firewallRules/Write Create or update a firewall rule. Microsoft.DataLakeAnalytics /accounts/firewallRules/Delete Delete a firewall rule. Microsoft.DataLakeAnalytics /accounts/computePolicies/Write Create or update a compute policy. Microsoft.DataLakeAnalytics /accounts/computePolicies/Delete Delete a compute policy. DataActions NotDataActions "description": "Lets you submit, monitor, and manage your own jobs but not create or delete Data Lake Analytics accounts.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/47b7735b-770e-4598-a7da-8b91488b4c88", "name": "47b7735b-770e-4598-a7da-8b91488b4c88", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.BigAnalytics/accounts/*", "Microsoft.DataLakeAnalytics/accounts/*", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [ "Microsoft.BigAnalytics/accounts/Delete", "Microsoft.BigAnalytics/accounts/TakeOwnership/action", "Microsoft.BigAnalytics/accounts/Write", "Microsoft.DataLakeAnalytics/accounts/Delete", "Microsoft.DataLakeAnalytics/accounts/TakeOwnership/action", "Microsoft.DataLakeAnalytics/accounts/Write", "Microsoft.DataLakeAnalytics/accounts/dataLakeStoreAccounts/Write", "Microsoft.DataLakeAnalytics/accounts/dataLakeStoreAccounts/Delete", "Microsoft.DataLakeAnalytics/accounts/storageAccounts/Write", "Microsoft.DataLakeAnalytics/accounts/storageAccounts/Delete", "Microsoft.DataLakeAnalytics/accounts/firewallRules/Write", "Microsoft.DataLakeAnalytics/accounts/firewallRules/Delete", "Microsoft.DataLakeAnalytics/accounts/computePolicies/Write", "Microsoft.DataLakeAnalytics/accounts/computePolicies/Delete" "dataActions": [], "notDataActions": [] "roleName": "Data Lake Analytics Developer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for full access to all resources under Azure Elastic SAN including changing network security policies to unblock data path access
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.ElasticSan /elasticSans/* Microsoft.ElasticSan /locations/* NotActions DataActions NotDataActions "description": "Allows for full access to all resources under Azure Elastic SAN including changing network security policies to unblock data path access", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/80dcbedb-47ef-405d-95bd-188a1b4ac406", "name": "80dcbedb-47ef-405d-95bd-188a1b4ac406", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.ElasticSan/elasticSans/*", "Microsoft.ElasticSan/locations/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Elastic SAN Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for control path read access to Azure Elastic SAN
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.ElasticSan /elasticSans/*/read NotActions DataActions NotDataActions "description": "Allows for control path read access to Azure Elastic SAN", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/af6a70f8-3c9f-4105-acf1-d719e9fca4ca", "name": "af6a70f8-3c9f-4105-acf1-d719e9fca4ca", "permissions": [ "actions": [ "Microsoft.Authorization/roleAssignments/read", "Microsoft.Authorization/roleDefinitions/read", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.ElasticSan/elasticSans/*/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Elastic SAN Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for full access to a volume group in Azure Elastic SAN including changing network security policies to unblock data path access
Microsoft.ElasticSan /locations/asyncoperations/read Polls the status of an asynchronous operation. NotActions DataActions NotDataActions "description": "Allows for full access to a volume group in Azure Elastic SAN including changing network security policies to unblock data path access", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/a8281131-f312-4f34-8d98-ae12be9f0d23", "name": "a8281131-f312-4f34-8d98-ae12be9f0d23", "permissions": [ "actions": [ "Microsoft.Authorization/roleAssignments/read", "Microsoft.Authorization/roleDefinitions/read", "Microsoft.ElasticSan/elasticSans/volumeGroups/*", "Microsoft.ElasticSan/locations/asyncoperations/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Elastic SAN Volume Group Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you view everything but will not let you delete or create a storage account or contained resource. It will also allow read/write access to all data contained in a storage account via access to storage account keys.
Microsoft.Storage /storageAccounts/listKeys/action Returns the access keys for the specified storage account. Microsoft.Storage /storageAccounts/ListAccountSas/action Returns the Account SAS token for the specified storage account. Microsoft.Storage /storageAccounts/read Returns the list of storage accounts or gets the properties for the specified storage account. NotActions DataActions NotDataActions "description": "Lets you view everything but will not let you delete or create a storage account or contained resource. It will also allow read/write access to all data contained in a storage account via access to storage account keys.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/c12c1c16-33a1-487b-954d-41c89c60f349", "name": "c12c1c16-33a1-487b-954d-41c89c60f349", "permissions": [ "actions": [ "Microsoft.Storage/storageAccounts/listKeys/action", "Microsoft.Storage/storageAccounts/ListAccountSas/action", "Microsoft.Storage/storageAccounts/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Reader and Data Access", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you perform backup and restore operations using Azure Backup on the storage account. Learn more
Microsoft.Features /providers/features/read Gets the feature of a subscription in a given resource provider. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Storage /operations/read Polls the status of an asynchronous operation. Microsoft.Storage /storageAccounts/objectReplicationPolicies/delete Delete object replication policy Microsoft.Storage /storageAccounts/objectReplicationPolicies/read List object replication policies Microsoft.Storage /storageAccounts/objectReplicationPolicies/write Create or update object replication policy Microsoft.Storage /storageAccounts/objectReplicationPolicies/restorePointMarkers/write Create object replication restore point marker Microsoft.Storage /storageAccounts/blobServices/containers/read Returns list of containers Microsoft.Storage /storageAccounts/blobServices/containers/write Returns the result of put blob container Microsoft.Storage /storageAccounts/blobServices/read Returns blob service properties or statistics Microsoft.Storage /storageAccounts/blobServices/write Returns the result of put blob service properties Microsoft.Storage /storageAccounts/read Returns the list of storage accounts or gets the properties for the specified storage account. Microsoft.Storage /storageAccounts/restoreBlobRanges/action Restore blob ranges to the state of the specified time NotActions DataActions NotDataActions "description": "Lets you perform backup and restore operations using Azure Backup on the storage account.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/e5e2a7ff-d759-4cd2-bb51-3152d37e2eb1", "name": "e5e2a7ff-d759-4cd2-bb51-3152d37e2eb1", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Authorization/locks/read", "Microsoft.Authorization/locks/write", "Microsoft.Authorization/locks/delete", "Microsoft.Features/features/read", "Microsoft.Features/providers/features/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Storage/operations/read", "Microsoft.Storage/storageAccounts/objectReplicationPolicies/delete", "Microsoft.Storage/storageAccounts/objectReplicationPolicies/read", "Microsoft.Storage/storageAccounts/objectReplicationPolicies/write", "Microsoft.Storage/storageAccounts/objectReplicationPolicies/restorePointMarkers/write", "Microsoft.Storage/storageAccounts/blobServices/containers/read", "Microsoft.Storage/storageAccounts/blobServices/containers/write", "Microsoft.Storage/storageAccounts/blobServices/read", "Microsoft.Storage/storageAccounts/blobServices/write", "Microsoft.Storage/storageAccounts/read", "Microsoft.Storage/storageAccounts/restoreBlobRanges/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Storage Account Backup Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Permits management of storage accounts. Provides access to the account key, which can be used to access data via Shared Key authorization. Learn more
Microsoft.Insights /diagnosticSettings/* Creates, updates, or reads the diagnostic setting for Analysis Server Microsoft.Network /virtualNetworks/subnets/joinViaServiceEndpoint/action Joins resource such as storage account or SQL database to a subnet. Not alertable. Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Storage /storageAccounts/* Create and manage storage accounts Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage storage accounts, including accessing storage account keys which provide full access to storage account data.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/17d1049b-9a84-46fb-8f53-869881c3d3ab", "name": "17d1049b-9a84-46fb-8f53-869881c3d3ab", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Insights/diagnosticSettings/*", "Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Storage/storageAccounts/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Storage Account Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Permits listing and regenerating storage account access keys. Learn more
Microsoft.Storage /storageAccounts/listkeys/action Returns the access keys for the specified storage account. Microsoft.Storage /storageAccounts/regeneratekey/action Regenerates the access keys for the specified storage account. NotActions DataActions NotDataActions "description": "Storage Account Key Operators are allowed to list and regenerate keys on Storage Accounts", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/81a9662b-bebf-436f-a333-f67b29880f12", "name": "81a9662b-bebf-436f-a333-f67b29880f12", "permissions": [ "actions": [ "Microsoft.Storage/storageAccounts/listkeys/action", "Microsoft.Storage/storageAccounts/regeneratekey/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Storage Account Key Operator Service Role", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read, write, and delete Azure Storage containers and blobs. To learn which actions are required for a given data operation, see Permissions for calling blob and queue data operations . Learn more
Microsoft.Storage /storageAccounts/blobServices/containers/read Return a container or a list of containers. Microsoft.Storage /storageAccounts/blobServices/containers/write Modify a container's metadata or properties. Microsoft.Storage /storageAccounts/blobServices/generateUserDelegationKey/action Returns a user delegation key for the Blob service. NotActions DataActions Microsoft.Storage /storageAccounts/blobServices/containers/blobs/delete Delete a blob. Microsoft.Storage /storageAccounts/blobServices/containers/blobs/read Return a blob or a list of blobs. Microsoft.Storage /storageAccounts/blobServices/containers/blobs/write Write to a blob. Microsoft.Storage /storageAccounts/blobServices/containers/blobs/move/action Moves the blob from one path to another Microsoft.Storage /storageAccounts/blobServices/containers/blobs/add/action Returns the result of adding blob content NotDataActions "description": "Allows for read, write and delete access to Azure Storage blob containers and data", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/ba92f5b4-2d11-453d-a403-e96b0029c9fe", "name": "ba92f5b4-2d11-453d-a403-e96b0029c9fe", "permissions": [ "actions": [ "Microsoft.Storage/storageAccounts/blobServices/containers/delete", "Microsoft.Storage/storageAccounts/blobServices/containers/read", "Microsoft.Storage/storageAccounts/blobServices/containers/write", "Microsoft.Storage/storageAccounts/blobServices/generateUserDelegationKey/action" "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete", "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read", "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write", "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/move/action", "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action" "notDataActions": [] "roleName": "Storage Blob Data Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Provides full access to Azure Storage blob containers and data, including assigning POSIX access control. To learn which actions are required for a given data operation, see Permissions for calling blob and queue data operations . Learn more
Microsoft.Storage /storageAccounts/blobServices/containers/* Full permissions on containers. Microsoft.Storage /storageAccounts/blobServices/generateUserDelegationKey/action Returns a user delegation key for the Blob service. NotActions DataActions Microsoft.Storage /storageAccounts/blobServices/containers/blobs/* Full permissions on blobs. NotDataActions "description": "Allows for full access to Azure Storage blob containers and data, including assigning POSIX access control.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b", "name": "b7e6dc6d-f1e8-4753-8033-0f276bb0955b", "permissions": [ "actions": [ "Microsoft.Storage/storageAccounts/blobServices/containers/*", "Microsoft.Storage/storageAccounts/blobServices/generateUserDelegationKey/action" "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/*" "notDataActions": [] "roleName": "Storage Blob Data Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read and list Azure Storage containers and blobs. To learn which actions are required for a given data operation, see Permissions for calling blob and queue data operations . Learn more
Microsoft.Storage /storageAccounts/blobServices/containers/read Return a container or a list of containers. Microsoft.Storage /storageAccounts/blobServices/generateUserDelegationKey/action Returns a user delegation key for the Blob service. NotActions DataActions Microsoft.Storage /storageAccounts/blobServices/containers/blobs/read Return a blob or a list of blobs. NotDataActions "description": "Allows for read access to Azure Storage blob containers and data", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1", "name": "2a2b9908-6ea1-4ae2-8e65-a410df84e7d1", "permissions": [ "actions": [ "Microsoft.Storage/storageAccounts/blobServices/containers/read", "Microsoft.Storage/storageAccounts/blobServices/generateUserDelegationKey/action" "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read" "notDataActions": [] "roleName": "Storage Blob Data Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Get a user delegation key, which can then be used to create a shared access signature for a container or blob that is signed with Azure AD credentials. For more information, see Create a user delegation SAS . Learn more
Microsoft.Storage /storageAccounts/blobServices/generateUserDelegationKey/action Returns a user delegation key for the Blob service. NotActions DataActions NotDataActions "description": "Allows for generation of a user delegation key which can be used to sign SAS tokens", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/db58b8e5-c6ad-4a2a-8342-4190687cbf4a", "name": "db58b8e5-c6ad-4a2a-8342-4190687cbf4a", "permissions": [ "actions": [ "Microsoft.Storage/storageAccounts/blobServices/generateUserDelegationKey/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Storage Blob Delegator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for read, write, and delete access on files/directories in Azure file shares. This role has no built-in equivalent on Windows file servers. Learn more
Microsoft.Storage /storageAccounts/fileServices/fileshares/files/read Returns a file/folder or a list of files/folders. Microsoft.Storage /storageAccounts/fileServices/fileshares/files/write Returns the result of writing a file or creating a folder. Microsoft.Storage /storageAccounts/fileServices/fileshares/files/delete Returns the result of deleting a file/folder. NotDataActions "description": "Allows for read, write, and delete access in Azure Storage file shares over SMB", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/0c867c2a-1d8c-454a-a3db-ab2ea1bdc8bb", "name": "0c867c2a-1d8c-454a-a3db-ab2ea1bdc8bb", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/fileServices/fileshares/files/read", "Microsoft.Storage/storageAccounts/fileServices/fileshares/files/write", "Microsoft.Storage/storageAccounts/fileServices/fileshares/files/delete" "notDataActions": [] "roleName": "Storage File Data SMB Share Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for read, write, delete, and modify ACLs on files/directories in Azure file shares. This role is equivalent to a file share ACL of change on Windows file servers. Learn more
Microsoft.Storage /storageAccounts/fileServices/fileshares/files/read Returns a file/folder or a list of files/folders. Microsoft.Storage /storageAccounts/fileServices/fileshares/files/write Returns the result of writing a file or creating a folder. Microsoft.Storage /storageAccounts/fileServices/fileshares/files/delete Returns the result of deleting a file/folder. Microsoft.Storage /storageAccounts/fileServices/fileshares/files/modifypermissions/action Returns the result of modifying permission on a file/folder. NotDataActions "description": "Allows for read, write, delete and modify NTFS permission access in Azure Storage file shares over SMB", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/a7264617-510b-434b-a828-9731dc254ea7", "name": "a7264617-510b-434b-a828-9731dc254ea7", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/fileServices/fileshares/files/read", "Microsoft.Storage/storageAccounts/fileServices/fileshares/files/write", "Microsoft.Storage/storageAccounts/fileServices/fileshares/files/delete", "Microsoft.Storage/storageAccounts/fileServices/fileshares/files/modifypermissions/action" "notDataActions": [] "roleName": "Storage File Data SMB Share Elevated Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for read access on files/directories in Azure file shares. This role is equivalent to a file share ACL of read on Windows file servers. Learn more
Microsoft.Storage /storageAccounts/fileServices/fileshares/files/read Returns a file/folder or a list of files/folders. NotDataActions "description": "Allows for read access to Azure File Share over SMB", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/aba4ae5f-2193-4029-9191-0cb91df5e314", "name": "aba4ae5f-2193-4029-9191-0cb91df5e314", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/fileServices/fileshares/files/read" "notDataActions": [] "roleName": "Storage File Data SMB Share Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read, write, and delete Azure Storage queues and queue messages. To learn which actions are required for a given data operation, see Permissions for calling blob and queue data operations . Learn more
Microsoft.Storage /storageAccounts/queueServices/queues/read Return a queue or a list of queues. Microsoft.Storage /storageAccounts/queueServices/queues/write Modify queue metadata or properties. NotActions DataActions Microsoft.Storage /storageAccounts/queueServices/queues/messages/delete Delete one or more messages from a queue. Microsoft.Storage /storageAccounts/queueServices/queues/messages/read Peek or retrieve one or more messages from a queue. Microsoft.Storage /storageAccounts/queueServices/queues/messages/write Add a message to a queue. Microsoft.Storage /storageAccounts/queueServices/queues/messages/process/action Returns the result of processing a message NotDataActions "description": "Allows for read, write, and delete access to Azure Storage queues and queue messages", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/974c5e8b-45b9-4653-ba55-5f855dd0fb88", "name": "974c5e8b-45b9-4653-ba55-5f855dd0fb88", "permissions": [ "actions": [ "Microsoft.Storage/storageAccounts/queueServices/queues/delete", "Microsoft.Storage/storageAccounts/queueServices/queues/read", "Microsoft.Storage/storageAccounts/queueServices/queues/write" "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/queueServices/queues/messages/delete", "Microsoft.Storage/storageAccounts/queueServices/queues/messages/read", "Microsoft.Storage/storageAccounts/queueServices/queues/messages/write", "Microsoft.Storage/storageAccounts/queueServices/queues/messages/process/action" "notDataActions": [] "roleName": "Storage Queue Data Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Peek, retrieve, and delete a message from an Azure Storage queue. To learn which actions are required for a given data operation, see Permissions for calling blob and queue data operations . Learn more
Microsoft.Storage /storageAccounts/queueServices/queues/messages/process/action Retrieve and delete a message. NotDataActions "description": "Allows for peek, receive, and delete access to Azure Storage queue messages", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/8a0f0c08-91a1-4084-bc3d-661d67233fed", "name": "8a0f0c08-91a1-4084-bc3d-661d67233fed", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/queueServices/queues/messages/read", "Microsoft.Storage/storageAccounts/queueServices/queues/messages/process/action" "notDataActions": [] "roleName": "Storage Queue Data Message Processor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Add messages to an Azure Storage queue. To learn which actions are required for a given data operation, see Permissions for calling blob and queue data operations . Learn more
Microsoft.Storage /storageAccounts/queueServices/queues/messages/add/action Add a message to a queue. NotDataActions "description": "Allows for sending of Azure Storage queue messages", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/c6a89b2d-59bc-44d0-9896-0f6e12d7b80a", "name": "c6a89b2d-59bc-44d0-9896-0f6e12d7b80a", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/queueServices/queues/messages/add/action" "notDataActions": [] "roleName": "Storage Queue Data Message Sender", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read and list Azure Storage queues and queue messages. To learn which actions are required for a given data operation, see Permissions for calling blob and queue data operations . Learn more
Microsoft.Storage /storageAccounts/queueServices/queues/read Returns a queue or a list of queues. NotActions DataActions Microsoft.Storage /storageAccounts/queueServices/queues/messages/read Peek or retrieve one or more messages from a queue. NotDataActions "description": "Allows for read access to Azure Storage queues and queue messages", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/19e7f393-937e-4f77-808e-94535e297925", "name": "19e7f393-937e-4f77-808e-94535e297925", "permissions": [ "actions": [ "Microsoft.Storage/storageAccounts/queueServices/queues/read" "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/queueServices/queues/messages/read" "notDataActions": [] "roleName": "Storage Queue Data Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for read, write and delete access to Azure Storage tables and entities
Microsoft.Storage /storageAccounts/tableServices/tables/entities/read Query table entities Microsoft.Storage /storageAccounts/tableServices/tables/entities/write Insert, merge, or replace table entities Microsoft.Storage /storageAccounts/tableServices/tables/entities/delete Delete table entities Microsoft.Storage /storageAccounts/tableServices/tables/entities/add/action Insert table entities Microsoft.Storage /storageAccounts/tableServices/tables/entities/update/action Merge or update table entities NotDataActions "description": "Allows for read, write and delete access to Azure Storage tables and entities", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/0a9a7e1f-b9d0-4cc4-a60d-0319b160aaa3", "name": "0a9a7e1f-b9d0-4cc4-a60d-0319b160aaa3", "permissions": [ "actions": [ "Microsoft.Storage/storageAccounts/tableServices/tables/read", "Microsoft.Storage/storageAccounts/tableServices/tables/write", "Microsoft.Storage/storageAccounts/tableServices/tables/delete" "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/tableServices/tables/entities/read", "Microsoft.Storage/storageAccounts/tableServices/tables/entities/write", "Microsoft.Storage/storageAccounts/tableServices/tables/entities/delete", "Microsoft.Storage/storageAccounts/tableServices/tables/entities/add/action", "Microsoft.Storage/storageAccounts/tableServices/tables/entities/update/action" "notDataActions": [] "roleName": "Storage Table Data Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for read access to Azure Storage tables and entities
Microsoft.Storage /storageAccounts/tableServices/tables/entities/read Query table entities NotDataActions "description": "Allows for read access to Azure Storage tables and entities", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/76199698-9eea-4c19-bc75-cec21354c6b6", "name": "76199698-9eea-4c19-bc75-cec21354c6b6", "permissions": [ "actions": [ "Microsoft.Storage/storageAccounts/tableServices/tables/read" "notActions": [], "dataActions": [ "Microsoft.Storage/storageAccounts/tableServices/tables/entities/read" "notDataActions": [] "roleName": "Storage Table Data Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Grants access to read, write, and delete access to map related data from an Azure maps account. Learn more
"description": "Grants access to read, write, and delete access to map related data from an Azure maps account.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/8f5e0ce6-4f7b-4dcf-bddf-e6f48634a204", "name": "8f5e0ce6-4f7b-4dcf-bddf-e6f48634a204", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Maps/accounts/*/read", "Microsoft.Maps/accounts/*/write", "Microsoft.Maps/accounts/*/delete", "Microsoft.Maps/accounts/*/action" "notDataActions": [] "roleName": "Azure Maps Data Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Grants access to read map related data from an Azure maps account. Learn more
"description": "Grants access to read map related data from an Azure maps account.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/423170ca-a8f6-4b0f-8487-9e4eb8f49bfa", "name": "423170ca-a8f6-4b0f-8487-9e4eb8f49bfa", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Maps/accounts/*/read" "notDataActions": [] "roleName": "Azure Maps Data Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allow read, write and delete access to Azure Spring Cloud Config Server Learn more
Microsoft.AppPlatform /Spring/configService/read Read the configuration content(for example, application.yaml) for a specific Azure Spring Apps service instance Microsoft.AppPlatform /Spring/configService/write Write config server content for a specific Azure Spring Apps service instance Microsoft.AppPlatform /Spring/configService/delete Delete config server content for a specific Azure Spring Apps service instance NotDataActions "description": "Allow read, write and delete access to Azure Spring Cloud Config Server", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/a06f5c24-21a7-4e1a-aa2b-f19eb6684f5b", "name": "a06f5c24-21a7-4e1a-aa2b-f19eb6684f5b", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.AppPlatform/Spring/configService/read", "Microsoft.AppPlatform/Spring/configService/write", "Microsoft.AppPlatform/Spring/configService/delete" "notDataActions": [] "roleName": "Azure Spring Cloud Config Server Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allow read access to Azure Spring Cloud Config Server Learn more
Microsoft.AppPlatform /Spring/configService/read Read the configuration content(for example, application.yaml) for a specific Azure Spring Apps service instance NotDataActions "description": "Allow read access to Azure Spring Cloud Config Server", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/d04c6db6-4947-4782-9e91-30a88feb7be7", "name": "d04c6db6-4947-4782-9e91-30a88feb7be7", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.AppPlatform/Spring/configService/read" "notDataActions": [] "roleName": "Azure Spring Cloud Config Server Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allow read access to Azure Spring Cloud Data
"description": "Allow read access to Azure Spring Cloud Data", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/b5537268-8956-4941-a8f0-646150406f0c", "name": "b5537268-8956-4941-a8f0-646150406f0c", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.AppPlatform/Spring/*/read" "notDataActions": [] "roleName": "Azure Spring Cloud Data Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allow read, write and delete access to Azure Spring Cloud Service Registry Learn more
Microsoft.AppPlatform /Spring/eurekaService/read Read the user app(s) registration information for a specific Azure Spring Apps service instance Microsoft.AppPlatform /Spring/eurekaService/write Write the user app(s) registration information for a specific Azure Spring Apps service instance Microsoft.AppPlatform /Spring/eurekaService/delete Delete the user app registration information for a specific Azure Spring Apps service instance NotDataActions "description": "Allow read, write and delete access to Azure Spring Cloud Service Registry", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/f5880b48-c26d-48be-b172-7927bfa1c8f1", "name": "f5880b48-c26d-48be-b172-7927bfa1c8f1", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.AppPlatform/Spring/eurekaService/read", "Microsoft.AppPlatform/Spring/eurekaService/write", "Microsoft.AppPlatform/Spring/eurekaService/delete" "notDataActions": [] "roleName": "Azure Spring Cloud Service Registry Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allow read access to Azure Spring Cloud Service Registry Learn more
Microsoft.AppPlatform /Spring/eurekaService/read Read the user app(s) registration information for a specific Azure Spring Apps service instance NotDataActions "description": "Allow read access to Azure Spring Cloud Service Registry", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/cff1b556-2399-4e7e-856d-a8f754be7b65", "name": "cff1b556-2399-4e7e-856d-a8f754be7b65", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.AppPlatform/Spring/eurekaService/read" "notDataActions": [] "roleName": "Azure Spring Cloud Service Registry Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Create, read, modify, and delete Media Services accounts; read-only access to other Media Services resources.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Media /mediaservices/*/read Microsoft.Media /mediaservices/assets/listStreamingLocators/action List Streaming Locators for Asset Microsoft.Media /mediaservices/streamingLocators/listPaths/action List Paths Microsoft.Media /mediaservices/write Create or Update any Media Services Account Microsoft.Media /mediaservices/delete Delete any Media Services Account Microsoft.Media /mediaservices/privateEndpointConnectionsApproval/action Approve Private Endpoint Connections Microsoft.Media /mediaservices/privateEndpointConnections/* NotActions DataActions NotDataActions "description": "Create, read, modify, and delete Media Services accounts; read-only access to other Media Services resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/054126f8-9a2b-4f1c-a9ad-eca461f08466", "name": "054126f8-9a2b-4f1c-a9ad-eca461f08466", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Insights/metrics/read", "Microsoft.Insights/metricDefinitions/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Media/mediaservices/*/read", "Microsoft.Media/mediaservices/assets/listStreamingLocators/action", "Microsoft.Media/mediaservices/streamingLocators/listPaths/action", "Microsoft.Media/mediaservices/write", "Microsoft.Media/mediaservices/delete", "Microsoft.Media/mediaservices/privateEndpointConnectionsApproval/action", "Microsoft.Media/mediaservices/privateEndpointConnections/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Media Services Account Administrator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Create, read, modify, and delete Live Events, Assets, Asset Filters, and Streaming Locators; read-only access to other Media Services resources.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Media /mediaservices/*/read Microsoft.Media /mediaservices/assets/* Microsoft.Media /mediaservices/assets/assetfilters/* Microsoft.Media /mediaservices/streamingLocators/* Microsoft.Media /mediaservices/liveEvents/* NotActions Microsoft.Media /mediaservices/assets/getEncryptionKey/action Get Asset Encryption Key Microsoft.Media /mediaservices/streamingLocators/listContentKeys/action List Content Keys DataActions NotDataActions "description": "Create, read, modify, and delete Live Events, Assets, Asset Filters, and Streaming Locators; read-only access to other Media Services resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/532bc159-b25e-42c0-969e-a1d439f60d77", "name": "532bc159-b25e-42c0-969e-a1d439f60d77", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Insights/metrics/read", "Microsoft.Insights/metricDefinitions/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Media/mediaservices/*/read", "Microsoft.Media/mediaservices/assets/*", "Microsoft.Media/mediaservices/assets/assetfilters/*", "Microsoft.Media/mediaservices/streamingLocators/*", "Microsoft.Media/mediaservices/liveEvents/*" "notActions": [ "Microsoft.Media/mediaservices/assets/getEncryptionKey/action", "Microsoft.Media/mediaservices/streamingLocators/listContentKeys/action" "dataActions": [], "notDataActions": [] "roleName": "Media Services Live Events Administrator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Create, read, modify, and delete Assets, Asset Filters, Streaming Locators, and Jobs; read-only access to other Media Services resources.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Media /mediaservices/*/read Microsoft.Media /mediaservices/assets/* Microsoft.Media /mediaservices/assets/assetfilters/* Microsoft.Media /mediaservices/streamingLocators/* Microsoft.Media /mediaservices/transforms/jobs/* NotActions Microsoft.Media /mediaservices/assets/getEncryptionKey/action Get Asset Encryption Key Microsoft.Media /mediaservices/streamingLocators/listContentKeys/action List Content Keys DataActions NotDataActions "description": "Create, read, modify, and delete Assets, Asset Filters, Streaming Locators, and Jobs; read-only access to other Media Services resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/e4395492-1534-4db2-bedf-88c14621589c", "name": "e4395492-1534-4db2-bedf-88c14621589c", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Insights/metrics/read", "Microsoft.Insights/metricDefinitions/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Media/mediaservices/*/read", "Microsoft.Media/mediaservices/assets/*", "Microsoft.Media/mediaservices/assets/assetfilters/*", "Microsoft.Media/mediaservices/streamingLocators/*", "Microsoft.Media/mediaservices/transforms/jobs/*" "notActions": [ "Microsoft.Media/mediaservices/assets/getEncryptionKey/action", "Microsoft.Media/mediaservices/streamingLocators/listContentKeys/action" "dataActions": [], "notDataActions": [] "roleName": "Media Services Media Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Create, read, modify, and delete Account Filters, Streaming Policies, Content Key Policies, and Transforms; read-only access to other Media Services resources. Cannot create Jobs, Assets or Streaming resources.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Media /mediaservices/*/read Microsoft.Media /mediaservices/assets/listStreamingLocators/action List Streaming Locators for Asset Microsoft.Media /mediaservices/streamingLocators/listPaths/action List Paths Microsoft.Media /mediaservices/accountFilters/* Microsoft.Media /mediaservices/streamingPolicies/* Microsoft.Media /mediaservices/contentKeyPolicies/* Microsoft.Media /mediaservices/transforms/* NotActions Microsoft.Media /mediaservices/contentKeyPolicies/getPolicyPropertiesWithSecrets/action Get Policy Properties With Secrets DataActions NotDataActions "description": "Create, read, modify, and delete Account Filters, Streaming Policies, Content Key Policies, and Transforms; read-only access to other Media Services resources. Cannot create Jobs, Assets or Streaming resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/c4bba371-dacd-4a26-b320-7250bca963ae", "name": "c4bba371-dacd-4a26-b320-7250bca963ae", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Insights/metrics/read", "Microsoft.Insights/metricDefinitions/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Media/mediaservices/*/read", "Microsoft.Media/mediaservices/assets/listStreamingLocators/action", "Microsoft.Media/mediaservices/streamingLocators/listPaths/action", "Microsoft.Media/mediaservices/accountFilters/*", "Microsoft.Media/mediaservices/streamingPolicies/*", "Microsoft.Media/mediaservices/contentKeyPolicies/*", "Microsoft.Media/mediaservices/transforms/*" "notActions": [ "Microsoft.Media/mediaservices/contentKeyPolicies/getPolicyPropertiesWithSecrets/action" "dataActions": [], "notDataActions": [] "roleName": "Media Services Policy Administrator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Create, read, modify, and delete Streaming Endpoints; read-only access to other Media Services resources.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Media /mediaservices/*/read Microsoft.Media /mediaservices/assets/listStreamingLocators/action List Streaming Locators for Asset Microsoft.Media /mediaservices/streamingLocators/listPaths/action List Paths Microsoft.Media /mediaservices/streamingEndpoints/* NotActions DataActions NotDataActions "description": "Create, read, modify, and delete Streaming Endpoints; read-only access to other Media Services resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/99dba123-b5fe-44d5-874c-ced7199a5804", "name": "99dba123-b5fe-44d5-874c-ced7199a5804", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Insights/metrics/read", "Microsoft.Insights/metricDefinitions/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Media/mediaservices/*/read", "Microsoft.Media/mediaservices/assets/listStreamingLocators/action", "Microsoft.Media/mediaservices/streamingLocators/listPaths/action", "Microsoft.Media/mediaservices/streamingEndpoints/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Media Services Streaming Endpoints Administrator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Grants full access to Azure Cognitive Search index data.
"description": "Grants full access to Azure Cognitive Search index data.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/8ebe5a00-799e-43f5-93ac-243d3dce84a7", "name": "8ebe5a00-799e-43f5-93ac-243d3dce84a7", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Search/searchServices/indexes/documents/*" "notDataActions": [] "roleName": "Search Index Data Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Grants read access to Azure Cognitive Search index data.
Microsoft.Search /searchServices/indexes/documents/read Read documents or suggested query terms from an index. NotDataActions "description": "Grants read access to Azure Cognitive Search index data.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/1407120a-92aa-4202-b7e9-c0e197c71c8f", "name": "1407120a-92aa-4202-b7e9-c0e197c71c8f", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Search/searchServices/indexes/documents/read" "notDataActions": [] "roleName": "Search Index Data Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage Search services, but not access to them. Learn more
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Search /searchServices/* Create and manage search services Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage Search services, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/7ca78c08-252a-4471-8644-bb5ff32d4ba0", "name": "7ca78c08-252a-4471-8644-bb5ff32d4ba0", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Search/searchServices/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Search Service Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read SignalR Service Access Keys
Microsoft.SignalRService /SignalR/listkeys/action View the value of SignalR access keys in the management portal or through API Microsoft.Authorization /*/read Read roles and role assignments Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Read SignalR Service Access Keys", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/04165923-9d83-45d5-8227-78b77b0a687e", "name": "04165923-9d83-45d5-8227-78b77b0a687e", "permissions": [ "actions": [ "Microsoft.SignalRService/*/read", "Microsoft.SignalRService/SignalR/listkeys/action", "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "SignalR AccessKey Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets your app server access SignalR Service with AAD auth options.
Microsoft.SignalRService /SignalR/auth/accessKey/action Generate an AccessKey for signing AccessTokens, the key will expire in 90 minutes by default. Microsoft.SignalRService /SignalR/serverConnection/write Start a server connection. Microsoft.SignalRService /SignalR/clientConnection/write Close client connection. NotDataActions "description": "Lets your app server access SignalR Service with AAD auth options.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/420fcaa2-552c-430f-98ca-3264be4806c7", "name": "420fcaa2-552c-430f-98ca-3264be4806c7", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.SignalRService/SignalR/auth/accessKey/action", "Microsoft.SignalRService/SignalR/serverConnection/write", "Microsoft.SignalRService/SignalR/clientConnection/write" "notDataActions": [] "roleName": "SignalR App Server", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Full access to Azure SignalR Service REST APIs
Microsoft.SignalRService /SignalR/auth/clientToken/action Generate an AccessToken for client to connect to ASRS, the token will expire in 5 minutes by default. Microsoft.SignalRService /SignalR/hub/send/action Broadcast messages to all client connections in hub. Microsoft.SignalRService /SignalR/group/send/action Broadcast message to group. Microsoft.SignalRService /SignalR/group/read Check group existence or user existence in group. Microsoft.SignalRService /SignalR/group/write Join / Leave group. Microsoft.SignalRService /SignalR/clientConnection/send/action Send messages directly to a client connection. Microsoft.SignalRService /SignalR/clientConnection/read Check client connection existence. Microsoft.SignalRService /SignalR/clientConnection/write Close client connection. Microsoft.SignalRService /SignalR/user/send/action Send messages to user, who may consist of multiple client connections. Microsoft.SignalRService /SignalR/user/read Check user existence. Microsoft.SignalRService /SignalR/user/write Modify a user. NotDataActions "description": "Full access to Azure SignalR Service REST APIs", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/fd53cd77-2268-407a-8f46-7e7863d0f521", "name": "fd53cd77-2268-407a-8f46-7e7863d0f521", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.SignalRService/SignalR/auth/clientToken/action", "Microsoft.SignalRService/SignalR/hub/send/action", "Microsoft.SignalRService/SignalR/group/send/action", "Microsoft.SignalRService/SignalR/group/read", "Microsoft.SignalRService/SignalR/group/write", "Microsoft.SignalRService/SignalR/clientConnection/send/action", "Microsoft.SignalRService/SignalR/clientConnection/read", "Microsoft.SignalRService/SignalR/clientConnection/write", "Microsoft.SignalRService/SignalR/user/send/action", "Microsoft.SignalRService/SignalR/user/read", "Microsoft.SignalRService/SignalR/user/write" "notDataActions": [] "roleName": "SignalR REST API Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read-only access to Azure SignalR Service REST APIs
Microsoft.SignalRService /SignalR/group/read Check group existence or user existence in group. Microsoft.SignalRService /SignalR/clientConnection/read Check client connection existence. Microsoft.SignalRService /SignalR/user/read Check user existence. NotDataActions "description": "Read-only access to Azure SignalR Service REST APIs", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/ddde6b66-c0df-4114-a159-3618637b3035", "name": "ddde6b66-c0df-4114-a159-3618637b3035", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.SignalRService/SignalR/group/read", "Microsoft.SignalRService/SignalR/clientConnection/read", "Microsoft.SignalRService/SignalR/user/read" "notDataActions": [] "roleName": "SignalR REST API Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Full access to Azure SignalR Service REST APIs
Microsoft.SignalRService /SignalR/auth/accessKey/action Generate an AccessKey for signing AccessTokens, the key will expire in 90 minutes by default. Microsoft.SignalRService /SignalR/auth/clientToken/action Generate an AccessToken for client to connect to ASRS, the token will expire in 5 minutes by default. Microsoft.SignalRService /SignalR/hub/send/action Broadcast messages to all client connections in hub. Microsoft.SignalRService /SignalR/group/send/action Broadcast message to group. Microsoft.SignalRService /SignalR/group/read Check group existence or user existence in group. Microsoft.SignalRService /SignalR/group/write Join / Leave group. Microsoft.SignalRService /SignalR/clientConnection/send/action Send messages directly to a client connection. Microsoft.SignalRService /SignalR/clientConnection/read Check client connection existence. Microsoft.SignalRService /SignalR/clientConnection/write Close client connection. Microsoft.SignalRService /SignalR/serverConnection/write Start a server connection. Microsoft.SignalRService /SignalR/user/send/action Send messages to user, who may consist of multiple client connections. Microsoft.SignalRService /SignalR/user/read Check user existence. Microsoft.SignalRService /SignalR/user/write Modify a user. Microsoft.SignalRService /SignalR/livetrace/* NotDataActions "description": "Full access to Azure SignalR Service REST APIs", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/7e4f1700-ea5a-4f59-8f37-079cfe29dce3", "name": "7e4f1700-ea5a-4f59-8f37-079cfe29dce3", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.SignalRService/SignalR/auth/accessKey/action", "Microsoft.SignalRService/SignalR/auth/clientToken/action", "Microsoft.SignalRService/SignalR/hub/send/action", "Microsoft.SignalRService/SignalR/group/send/action", "Microsoft.SignalRService/SignalR/group/read", "Microsoft.SignalRService/SignalR/group/write", "Microsoft.SignalRService/SignalR/clientConnection/send/action", "Microsoft.SignalRService/SignalR/clientConnection/read", "Microsoft.SignalRService/SignalR/clientConnection/write", "Microsoft.SignalRService/SignalR/serverConnection/write", "Microsoft.SignalRService/SignalR/user/send/action", "Microsoft.SignalRService/SignalR/user/read", "Microsoft.SignalRService/SignalR/user/write", "Microsoft.SignalRService/SignalR/livetrace/*" "notDataActions": [] "roleName": "SignalR Service Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Create, Read, Update, and Delete SignalR service resources
"description": "Create, Read, Update, and Delete SignalR service resources", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/8cf5e20a-e4b2-4e9d-b3a1-5ceb692c2761", "name": "8cf5e20a-e4b2-4e9d-b3a1-5ceb692c2761", "permissions": [ "actions": [ "Microsoft.SignalRService/*", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "SignalR/Web PubSub Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Manage the web plans for websites. Does not allow you to assign roles in Azure RBAC.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket Microsoft.Web /serverFarms/* Create and manage server farms Microsoft.Web /hostingEnvironments/Join/Action Joins an App Service Environment Microsoft.Insights /autoscalesettings/* NotActions DataActions NotDataActions "description": "Lets you manage the web plans for websites, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/2cc479cb-7b4d-49a8-b449-8c00fd0f0a4b", "name": "2cc479cb-7b4d-49a8-b449-8c00fd0f0a4b", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Web/serverFarms/*", "Microsoft.Web/hostingEnvironments/Join/Action", "Microsoft.Insights/autoscalesettings/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Web Plan Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Manage websites, but not web plans. Does not allow you to assign roles in Azure RBAC.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket Microsoft.Web /certificates/* Create and manage website certificates Microsoft.Web /listSitesAssignedToHostName/read Get names of sites assigned to hostname. Microsoft.Web /serverFarms/join/action Joins an App Service Plan Microsoft.Web /serverFarms/read Get the properties on an App Service Plan Microsoft.Web /sites/* Create and manage websites (site creation also requires write permissions to the associated App Service Plan) NotActions DataActions NotDataActions "description": "Lets you manage websites (not web plans), but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/de139f84-1756-47ae-9be6-808fbbe84772", "name": "de139f84-1756-47ae-9be6-808fbbe84772", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Insights/components/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Web/certificates/*", "Microsoft.Web/listSitesAssignedToHostName/read", "Microsoft.Web/serverFarms/join/action", "Microsoft.Web/serverFarms/read", "Microsoft.Web/sites/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Website Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Delete repositories, tags, or manifests from a container registry. Learn more
Microsoft.ContainerRegistry /registries/artifacts/delete Delete artifact in a container registry. NotActions DataActions NotDataActions "description": "acr delete", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/c2f4ef07-c644-48eb-af81-4b1b4947fb11", "name": "c2f4ef07-c644-48eb-af81-4b1b4947fb11", "permissions": [ "actions": [ "Microsoft.ContainerRegistry/registries/artifacts/delete" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "AcrDelete", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Push trusted images to or pull trusted images from a container registry enabled for content trust. Learn more
Microsoft.ContainerRegistry /registries/sign/write Push/Pull content trust metadata for a container registry. NotActions DataActions Microsoft.ContainerRegistry /registries/trustedCollections/write Allows push or publish of trusted collections of container registry content. This is similar to Microsoft.ContainerRegistry/registries/sign/write action except that this is a data action NotDataActions "description": "acr image signer", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/6cef56e8-d556-48e5-a04f-b8e64114680f", "name": "6cef56e8-d556-48e5-a04f-b8e64114680f", "permissions": [ "actions": [ "Microsoft.ContainerRegistry/registries/sign/write" "notActions": [], "dataActions": [ "Microsoft.ContainerRegistry/registries/trustedCollections/write" "notDataActions": [] "roleName": "AcrImageSigner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Pull artifacts from a container registry. Learn more
Microsoft.ContainerRegistry /registries/pull/read Pull or Get images from a container registry. NotActions DataActions NotDataActions "description": "acr pull", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/7f951dda-4ed3-4680-a7ca-43fe172d538d", "name": "7f951dda-4ed3-4680-a7ca-43fe172d538d", "permissions": [ "actions": [ "Microsoft.ContainerRegistry/registries/pull/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "AcrPull", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Push artifacts to or pull artifacts from a container registry. Learn more
Microsoft.ContainerRegistry /registries/pull/read Pull or Get images from a container registry. Microsoft.ContainerRegistry /registries/push/write Push or Write images to a container registry. NotActions DataActions NotDataActions "description": "acr push", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/8311e382-0749-4cb8-b61a-304f252e45ec", "name": "8311e382-0749-4cb8-b61a-304f252e45ec", "permissions": [ "actions": [ "Microsoft.ContainerRegistry/registries/pull/read", "Microsoft.ContainerRegistry/registries/push/write" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "AcrPush", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Pull quarantined images from a container registry. Learn more
Microsoft.ContainerRegistry /registries/quarantine/read Pull or Get quarantined images from container registry NotActions DataActions Microsoft.ContainerRegistry /registries/quarantinedArtifacts/read Allows pull or get of the quarantined artifacts from container registry. This is similar to Microsoft.ContainerRegistry/registries/quarantine/read except that it is a data action NotDataActions "description": "acr quarantine data reader", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/cdda3590-29a3-44f6-95f2-9f980659eb04", "name": "cdda3590-29a3-44f6-95f2-9f980659eb04", "permissions": [ "actions": [ "Microsoft.ContainerRegistry/registries/quarantine/read" "notActions": [], "dataActions": [ "Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read" "notDataActions": [] "roleName": "AcrQuarantineReader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Push quarantined images to or pull quarantined images from a container registry. Learn more
Microsoft.ContainerRegistry /registries/quarantine/read Pull or Get quarantined images from container registry Microsoft.ContainerRegistry /registries/quarantine/write Write/Modify quarantine state of quarantined images NotActions DataActions Microsoft.ContainerRegistry /registries/quarantinedArtifacts/read Allows pull or get of the quarantined artifacts from container registry. This is similar to Microsoft.ContainerRegistry/registries/quarantine/read except that it is a data action Microsoft.ContainerRegistry /registries/quarantinedArtifacts/write Allows write or update of the quarantine state of quarantined artifacts. This is similar to Microsoft.ContainerRegistry/registries/quarantine/write action except that it is a data action NotDataActions "description": "acr quarantine data writer", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/c8d4ff99-41c3-41a8-9f60-21dfdad59608", "name": "c8d4ff99-41c3-41a8-9f60-21dfdad59608", "permissions": [ "actions": [ "Microsoft.ContainerRegistry/registries/quarantine/read", "Microsoft.ContainerRegistry/registries/quarantine/write" "notActions": [], "dataActions": [ "Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read", "Microsoft.ContainerRegistry/registries/quarantinedArtifacts/write" "notDataActions": [] "roleName": "AcrQuarantineWriter", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"This role grants admin access - provides write permissions on most objects within a namespace, with the exception of ResourceQuota object and the namespace object itself. Applying this role at cluster scope will give access across all namespaces.
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.ContainerService /fleets/read Get fleet Microsoft.ContainerService /fleets/listCredentials/action List fleet credentials NotActions DataActions Microsoft.ContainerService /fleets/apps/controllerrevisions/read Reads controllerrevisions Microsoft.ContainerService /fleets/apps/daemonsets/* Microsoft.ContainerService /fleets/apps/deployments/* Microsoft.ContainerService /fleets/apps/statefulsets/* Microsoft.ContainerService /fleets/authorization.k8s.io/localsubjectaccessreviews/write Writes localsubjectaccessreviews Microsoft.ContainerService /fleets/autoscaling/horizontalpodautoscalers/* Microsoft.ContainerService /fleets/batch/cronjobs/* Microsoft.ContainerService /fleets/batch/jobs/* Microsoft.ContainerService /fleets/configmaps/* Microsoft.ContainerService /fleets/endpoints/* Microsoft.ContainerService /fleets/events.k8s.io/events/read Reads events Microsoft.ContainerService /fleets/events/read Reads events Microsoft.ContainerService /fleets/extensions/daemonsets/* Microsoft.ContainerService /fleets/extensions/deployments/* Microsoft.ContainerService /fleets/extensions/ingresses/* Microsoft.ContainerService /fleets/extensions/networkpolicies/* Microsoft.ContainerService /fleets/limitranges/read Reads limitranges Microsoft.ContainerService /fleets/namespaces/read Reads namespaces Microsoft.ContainerService /fleets/networking.k8s.io/ingresses/* Microsoft.ContainerService /fleets/networking.k8s.io/networkpolicies/* Microsoft.ContainerService /fleets/persistentvolumeclaims/* Microsoft.ContainerService /fleets/policy/poddisruptionbudgets/* Microsoft.ContainerService /fleets/rbac.authorization.k8s.io/rolebindings/* Microsoft.ContainerService /fleets/rbac.authorization.k8s.io/roles/* Microsoft.ContainerService /fleets/replicationcontrollers/* Microsoft.ContainerService /fleets/replicationcontrollers/* Microsoft.ContainerService /fleets/resourcequotas/read Reads resourcequotas Microsoft.ContainerService /fleets/secrets/* Microsoft.ContainerService /fleets/serviceaccounts/* Microsoft.ContainerService /fleets/services/* NotDataActions "description": "This role grants admin access - provides write permissions on most objects within a a namespace, with the exception of ResourceQuota object and the namespace object itself. Applying this role at cluster scope will give access across all namespaces.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/434fb43a-c01c-447e-9f67-c3ad923cfaba", "name": "434fb43a-c01c-447e-9f67-c3ad923cfaba", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.ContainerService/fleets/read", "Microsoft.ContainerService/fleets/listCredentials/action" "notActions": [], "dataActions": [ "Microsoft.ContainerService/fleets/apps/controllerrevisions/read", "Microsoft.ContainerService/fleets/apps/daemonsets/*", "Microsoft.ContainerService/fleets/apps/deployments/*", "Microsoft.ContainerService/fleets/apps/statefulsets/*", "Microsoft.ContainerService/fleets/authorization.k8s.io/localsubjectaccessreviews/write", "Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/*", "Microsoft.ContainerService/fleets/batch/cronjobs/*", "Microsoft.ContainerService/fleets/batch/jobs/*", "Microsoft.ContainerService/fleets/configmaps/*", "Microsoft.ContainerService/fleets/endpoints/*", "Microsoft.ContainerService/fleets/events.k8s.io/events/read", "Microsoft.ContainerService/fleets/events/read", "Microsoft.ContainerService/fleets/extensions/daemonsets/*", "Microsoft.ContainerService/fleets/extensions/deployments/*", "Microsoft.ContainerService/fleets/extensions/ingresses/*", "Microsoft.ContainerService/fleets/extensions/networkpolicies/*", "Microsoft.ContainerService/fleets/limitranges/read", "Microsoft.ContainerService/fleets/namespaces/read", "Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/*", "Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/*", "Microsoft.ContainerService/fleets/persistentvolumeclaims/*", "Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/*", "Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/rolebindings/*", "Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/roles/*", "Microsoft.ContainerService/fleets/replicationcontrollers/*", "Microsoft.ContainerService/fleets/replicationcontrollers/*", "Microsoft.ContainerService/fleets/resourcequotas/read", "Microsoft.ContainerService/fleets/secrets/*", "Microsoft.ContainerService/fleets/serviceaccounts/*", "Microsoft.ContainerService/fleets/services/*" "notDataActions": [] "roleName": "Azure Kubernetes Fleet Manager RBAC Admin", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage all resources in the fleet manager cluster.
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.ContainerService /fleets/read Get fleet Microsoft.ContainerService /fleets/listCredentials/action List fleet credentials NotActions DataActions Microsoft.ContainerService /fleets/* NotDataActions "description": "Lets you manage all resources in the fleet manager cluster.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/18ab4d3d-a1bf-4477-8ad9-8359bc988f69", "name": "18ab4d3d-a1bf-4477-8ad9-8359bc988f69", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.ContainerService/fleets/read", "Microsoft.ContainerService/fleets/listCredentials/action" "notActions": [], "dataActions": [ "Microsoft.ContainerService/fleets/*" "notDataActions": [] "roleName": "Azure Kubernetes Fleet Manager RBAC Cluster Admin", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows read-only access to see most objects in a namespace. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces.
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.ContainerService /fleets/read Get fleet Microsoft.ContainerService /fleets/listCredentials/action List fleet credentials NotActions DataActions Microsoft.ContainerService /fleets/apps/controllerrevisions/read Reads controllerrevisions Microsoft.ContainerService /fleets/apps/daemonsets/read Reads daemonsets Microsoft.ContainerService /fleets/apps/deployments/read Reads deployments Microsoft.ContainerService /fleets/apps/statefulsets/read Reads statefulsets Microsoft.ContainerService /fleets/autoscaling/horizontalpodautoscalers/read Reads horizontalpodautoscalers Microsoft.ContainerService /fleets/batch/cronjobs/read Reads cronjobs Microsoft.ContainerService /fleets/batch/jobs/read Reads jobs Microsoft.ContainerService /fleets/configmaps/read Reads configmaps Microsoft.ContainerService /fleets/endpoints/read Reads endpoints Microsoft.ContainerService /fleets/events.k8s.io/events/read Reads events Microsoft.ContainerService /fleets/events/read Reads events Microsoft.ContainerService /fleets/extensions/daemonsets/read Reads daemonsets Microsoft.ContainerService /fleets/extensions/deployments/read Reads deployments Microsoft.ContainerService /fleets/extensions/ingresses/read Reads ingresses Microsoft.ContainerService /fleets/extensions/networkpolicies/read Reads networkpolicies Microsoft.ContainerService /fleets/limitranges/read Reads limitranges Microsoft.ContainerService /fleets/namespaces/read Reads namespaces Microsoft.ContainerService /fleets/networking.k8s.io/ingresses/read Reads ingresses Microsoft.ContainerService /fleets/networking.k8s.io/networkpolicies/read Reads networkpolicies Microsoft.ContainerService /fleets/persistentvolumeclaims/read Reads persistentvolumeclaims Microsoft.ContainerService /fleets/policy/poddisruptionbudgets/read Reads poddisruptionbudgets Microsoft.ContainerService /fleets/replicationcontrollers/read Reads replicationcontrollers Microsoft.ContainerService /fleets/replicationcontrollers/read Reads replicationcontrollers Microsoft.ContainerService /fleets/resourcequotas/read Reads resourcequotas Microsoft.ContainerService /fleets/serviceaccounts/read Reads serviceaccounts Microsoft.ContainerService /fleets/services/read Reads services NotDataActions "description": "Allows read-only access to see most objects in a namespace. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/30b27cfc-9c84-438e-b0ce-70e35255df80", "name": "30b27cfc-9c84-438e-b0ce-70e35255df80", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.ContainerService/fleets/read", "Microsoft.ContainerService/fleets/listCredentials/action" "notActions": [], "dataActions": [ "Microsoft.ContainerService/fleets/apps/controllerrevisions/read", "Microsoft.ContainerService/fleets/apps/daemonsets/read", "Microsoft.ContainerService/fleets/apps/deployments/read", "Microsoft.ContainerService/fleets/apps/statefulsets/read", "Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/read", "Microsoft.ContainerService/fleets/batch/cronjobs/read", "Microsoft.ContainerService/fleets/batch/jobs/read", "Microsoft.ContainerService/fleets/configmaps/read", "Microsoft.ContainerService/fleets/endpoints/read", "Microsoft.ContainerService/fleets/events.k8s.io/events/read", "Microsoft.ContainerService/fleets/events/read", "Microsoft.ContainerService/fleets/extensions/daemonsets/read", "Microsoft.ContainerService/fleets/extensions/deployments/read", "Microsoft.ContainerService/fleets/extensions/ingresses/read", "Microsoft.ContainerService/fleets/extensions/networkpolicies/read", "Microsoft.ContainerService/fleets/limitranges/read", "Microsoft.ContainerService/fleets/namespaces/read", "Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/read", "Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/read", "Microsoft.ContainerService/fleets/persistentvolumeclaims/read", "Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/read", "Microsoft.ContainerService/fleets/replicationcontrollers/read", "Microsoft.ContainerService/fleets/replicationcontrollers/read", "Microsoft.ContainerService/fleets/resourcequotas/read", "Microsoft.ContainerService/fleets/serviceaccounts/read", "Microsoft.ContainerService/fleets/services/read" "notDataActions": [] "roleName": "Azure Kubernetes Fleet Manager RBAC Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows read/write access to most objects in a namespace. This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces.
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.ContainerService /fleets/read Get fleet Microsoft.ContainerService /fleets/listCredentials/action List fleet credentials NotActions DataActions Microsoft.ContainerService /fleets/apps/controllerrevisions/read Reads controllerrevisions Microsoft.ContainerService /fleets/apps/daemonsets/* Microsoft.ContainerService /fleets/apps/deployments/* Microsoft.ContainerService /fleets/apps/statefulsets/* Microsoft.ContainerService /fleets/autoscaling/horizontalpodautoscalers/* Microsoft.ContainerService /fleets/batch/cronjobs/* Microsoft.ContainerService /fleets/batch/jobs/* Microsoft.ContainerService /fleets/configmaps/* Microsoft.ContainerService /fleets/endpoints/* Microsoft.ContainerService /fleets/events.k8s.io/events/read Reads events Microsoft.ContainerService /fleets/events/read Reads events Microsoft.ContainerService /fleets/extensions/daemonsets/* Microsoft.ContainerService /fleets/extensions/deployments/* Microsoft.ContainerService /fleets/extensions/ingresses/* Microsoft.ContainerService /fleets/extensions/networkpolicies/* Microsoft.ContainerService /fleets/limitranges/read Reads limitranges Microsoft.ContainerService /fleets/namespaces/read Reads namespaces Microsoft.ContainerService /fleets/networking.k8s.io/ingresses/* Microsoft.ContainerService /fleets/networking.k8s.io/networkpolicies/* Microsoft.ContainerService /fleets/persistentvolumeclaims/* Microsoft.ContainerService /fleets/policy/poddisruptionbudgets/* Microsoft.ContainerService /fleets/replicationcontrollers/* Microsoft.ContainerService /fleets/replicationcontrollers/* Microsoft.ContainerService /fleets/resourcequotas/read Reads resourcequotas Microsoft.ContainerService /fleets/secrets/* Microsoft.ContainerService /fleets/serviceaccounts/* Microsoft.ContainerService /fleets/services/* NotDataActions "description": "Allows read/write access to most objects in a namespace.This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5af6afb3-c06c-4fa4-8848-71a8aee05683", "name": "5af6afb3-c06c-4fa4-8848-71a8aee05683", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.ContainerService/fleets/read", "Microsoft.ContainerService/fleets/listCredentials/action" "notActions": [], "dataActions": [ "Microsoft.ContainerService/fleets/apps/controllerrevisions/read", "Microsoft.ContainerService/fleets/apps/daemonsets/*", "Microsoft.ContainerService/fleets/apps/deployments/*", "Microsoft.ContainerService/fleets/apps/statefulsets/*", "Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/*", "Microsoft.ContainerService/fleets/batch/cronjobs/*", "Microsoft.ContainerService/fleets/batch/jobs/*", "Microsoft.ContainerService/fleets/configmaps/*", "Microsoft.ContainerService/fleets/endpoints/*", "Microsoft.ContainerService/fleets/events.k8s.io/events/read", "Microsoft.ContainerService/fleets/events/read", "Microsoft.ContainerService/fleets/extensions/daemonsets/*", "Microsoft.ContainerService/fleets/extensions/deployments/*", "Microsoft.ContainerService/fleets/extensions/ingresses/*", "Microsoft.ContainerService/fleets/extensions/networkpolicies/*", "Microsoft.ContainerService/fleets/limitranges/read", "Microsoft.ContainerService/fleets/namespaces/read", "Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/*", "Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/*", "Microsoft.ContainerService/fleets/persistentvolumeclaims/*", "Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/*", "Microsoft.ContainerService/fleets/replicationcontrollers/*", "Microsoft.ContainerService/fleets/replicationcontrollers/*", "Microsoft.ContainerService/fleets/resourcequotas/read", "Microsoft.ContainerService/fleets/secrets/*", "Microsoft.ContainerService/fleets/serviceaccounts/*", "Microsoft.ContainerService/fleets/services/*" "notDataActions": [] "roleName": "Azure Kubernetes Fleet Manager RBAC Writer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"List cluster admin credential action. Learn more
Microsoft.ContainerService /managedClusters/listClusterAdminCredential/action List the clusterAdmin credential of a managed cluster Microsoft.ContainerService /managedClusters/accessProfiles/listCredential/action Get a managed cluster access profile by role name using list credential Microsoft.ContainerService /managedClusters/read Get a managed cluster Microsoft.ContainerService /managedClusters/runcommand/action Run user issued command against managed kubernetes server. NotActions DataActions NotDataActions "description": "List cluster admin credential action.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/0ab0b1a8-8aac-4efd-b8c2-3ee1fb270be8", "name": "0ab0b1a8-8aac-4efd-b8c2-3ee1fb270be8", "permissions": [ "actions": [ "Microsoft.ContainerService/managedClusters/listClusterAdminCredential/action", "Microsoft.ContainerService/managedClusters/accessProfiles/listCredential/action", "Microsoft.ContainerService/managedClusters/read", "Microsoft.ContainerService/managedClusters/runcommand/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Azure Kubernetes Service Cluster Admin Role", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"List cluster user credential action. Learn more
Microsoft.ContainerService /managedClusters/listClusterUserCredential/action List the clusterUser credential of a managed cluster Microsoft.ContainerService /managedClusters/read Get a managed cluster NotActions DataActions NotDataActions "description": "List cluster user credential action.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/4abbcc35-e782-43d8-92c5-2d3f1bd2253f", "name": "4abbcc35-e782-43d8-92c5-2d3f1bd2253f", "permissions": [ "actions": [ "Microsoft.ContainerService/managedClusters/listClusterUserCredential/action", "Microsoft.ContainerService/managedClusters/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Azure Kubernetes Service Cluster User Role", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Grants access to read and write Azure Kubernetes Service clusters Learn more
Microsoft.ContainerService /managedClusters/write Creates a new managed cluster or updates an existing one Microsoft.Resources /deployments/* Create and manage a deployment NotActions DataActions NotDataActions "description": "Grants access to read and write Azure Kubernetes Service clusters", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/ed7f3fbd-7b88-4dd4-9017-9adb7ce333f8", "name": "ed7f3fbd-7b88-4dd4-9017-9adb7ce333f8", "permissions": [ "actions": [ "Microsoft.ContainerService/managedClusters/read", "Microsoft.ContainerService/managedClusters/write", "Microsoft.Resources/deployments/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Azure Kubernetes Service Contributor Role", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces. Learn more
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.ContainerService /managedClusters/listClusterUserCredential/action List the clusterUser credential of a managed cluster NotActions DataActions Microsoft.ContainerService /managedClusters/* NotDataActions Microsoft.ContainerService /managedClusters/resourcequotas/write Writes resourcequotas Microsoft.ContainerService /managedClusters/resourcequotas/delete Deletes resourcequotas Microsoft.ContainerService /managedClusters/namespaces/write Writes namespaces Microsoft.ContainerService /managedClusters/namespaces/delete Deletes namespaces "description": "Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/3498e952-d568-435e-9b2c-8d77e338d7f7", "name": "3498e952-d568-435e-9b2c-8d77e338d7f7", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.ContainerService/managedClusters/listClusterUserCredential/action" "notActions": [], "dataActions": [ "Microsoft.ContainerService/managedClusters/*" "notDataActions": [ "Microsoft.ContainerService/managedClusters/resourcequotas/write", "Microsoft.ContainerService/managedClusters/resourcequotas/delete", "Microsoft.ContainerService/managedClusters/namespaces/write", "Microsoft.ContainerService/managedClusters/namespaces/delete" "roleName": "Azure Kubernetes Service RBAC Admin", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage all resources in the cluster. Learn more
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.ContainerService /managedClusters/listClusterUserCredential/action List the clusterUser credential of a managed cluster NotActions DataActions Microsoft.ContainerService /managedClusters/* NotDataActions "description": "Lets you manage all resources in the cluster.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/b1ff04bb-8a4e-4dc4-8eb5-8693973ce19b", "name": "b1ff04bb-8a4e-4dc4-8eb5-8693973ce19b", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.ContainerService/managedClusters/listClusterUserCredential/action" "notActions": [], "dataActions": [ "Microsoft.ContainerService/managedClusters/*" "notDataActions": [] "roleName": "Azure Kubernetes Service RBAC Cluster Admin", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows read-only access to see most objects in a namespace. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces. Learn more
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. NotActions DataActions Microsoft.ContainerService /managedClusters/apps/controllerrevisions/read Reads controllerrevisions Microsoft.ContainerService /managedClusters/apps/daemonsets/read Reads daemonsets Microsoft.ContainerService /managedClusters/apps/deployments/read Reads deployments Microsoft.ContainerService /managedClusters/apps/replicasets/read Reads replicasets Microsoft.ContainerService /managedClusters/apps/statefulsets/read Reads statefulsets Microsoft.ContainerService /managedClusters/autoscaling/horizontalpodautoscalers/read Reads horizontalpodautoscalers Microsoft.ContainerService /managedClusters/batch/cronjobs/read Reads cronjobs Microsoft.ContainerService /managedClusters/batch/jobs/read Reads jobs Microsoft.ContainerService /managedClusters/configmaps/read Reads configmaps Microsoft.ContainerService /managedClusters/endpoints/read Reads endpoints Microsoft.ContainerService /managedClusters/events.k8s.io/events/read Reads events Microsoft.ContainerService /managedClusters/events/read Reads events Microsoft.ContainerService /managedClusters/extensions/daemonsets/read Reads daemonsets Microsoft.ContainerService /managedClusters/extensions/deployments/read Reads deployments Microsoft.ContainerService /managedClusters/extensions/ingresses/read Reads ingresses Microsoft.ContainerService /managedClusters/extensions/networkpolicies/read Reads networkpolicies Microsoft.ContainerService /managedClusters/extensions/replicasets/read Reads replicasets Microsoft.ContainerService /managedClusters/limitranges/read Reads limitranges Microsoft.ContainerService /managedClusters/namespaces/read Reads namespaces Microsoft.ContainerService /managedClusters/networking.k8s.io/ingresses/read Reads ingresses Microsoft.ContainerService /managedClusters/networking.k8s.io/networkpolicies/read Reads networkpolicies Microsoft.ContainerService /managedClusters/persistentvolumeclaims/read Reads persistentvolumeclaims Microsoft.ContainerService /managedClusters/pods/read Reads pods Microsoft.ContainerService /managedClusters/policy/poddisruptionbudgets/read Reads poddisruptionbudgets Microsoft.ContainerService /managedClusters/replicationcontrollers/read Reads replicationcontrollers Microsoft.ContainerService /managedClusters/replicationcontrollers/read Reads replicationcontrollers Microsoft.ContainerService /managedClusters/resourcequotas/read Reads resourcequotas Microsoft.ContainerService /managedClusters/serviceaccounts/read Reads serviceaccounts Microsoft.ContainerService /managedClusters/services/read Reads services NotDataActions "description": "Allows read-only access to see most objects in a namespace. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/7f6c6a51-bcf8-42ba-9220-52d62157d7db", "name": "7f6c6a51-bcf8-42ba-9220-52d62157d7db", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read" "notActions": [], "dataActions": [ "Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read", "Microsoft.ContainerService/managedClusters/apps/daemonsets/read", "Microsoft.ContainerService/managedClusters/apps/deployments/read", "Microsoft.ContainerService/managedClusters/apps/replicasets/read", "Microsoft.ContainerService/managedClusters/apps/statefulsets/read", "Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/read", "Microsoft.ContainerService/managedClusters/batch/cronjobs/read", "Microsoft.ContainerService/managedClusters/batch/jobs/read", "Microsoft.ContainerService/managedClusters/configmaps/read", "Microsoft.ContainerService/managedClusters/endpoints/read", "Microsoft.ContainerService/managedClusters/events.k8s.io/events/read", "Microsoft.ContainerService/managedClusters/events/read", "Microsoft.ContainerService/managedClusters/extensions/daemonsets/read", "Microsoft.ContainerService/managedClusters/extensions/deployments/read", "Microsoft.ContainerService/managedClusters/extensions/ingresses/read", "Microsoft.ContainerService/managedClusters/extensions/networkpolicies/read", "Microsoft.ContainerService/managedClusters/extensions/replicasets/read", "Microsoft.ContainerService/managedClusters/limitranges/read", "Microsoft.ContainerService/managedClusters/namespaces/read", "Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/read", "Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/read", "Microsoft.ContainerService/managedClusters/persistentvolumeclaims/read", "Microsoft.ContainerService/managedClusters/pods/read", "Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/read", "Microsoft.ContainerService/managedClusters/replicationcontrollers/read", "Microsoft.ContainerService/managedClusters/replicationcontrollers/read", "Microsoft.ContainerService/managedClusters/resourcequotas/read", "Microsoft.ContainerService/managedClusters/serviceaccounts/read", "Microsoft.ContainerService/managedClusters/services/read" "notDataActions": [] "roleName": "Azure Kubernetes Service RBAC Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows read/write access to most objects in a namespace. This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets and running Pods as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces. Learn more
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. NotActions DataActions Microsoft.ContainerService /managedClusters/apps/controllerrevisions/read Reads controllerrevisions Microsoft.ContainerService /managedClusters/apps/daemonsets/* Microsoft.ContainerService /managedClusters/apps/deployments/* Microsoft.ContainerService /managedClusters/apps/replicasets/* Microsoft.ContainerService /managedClusters/apps/statefulsets/* Microsoft.ContainerService /managedClusters/autoscaling/horizontalpodautoscalers/* Microsoft.ContainerService /managedClusters/batch/cronjobs/* Microsoft.ContainerService /managedClusters/batch/jobs/* Microsoft.ContainerService /managedClusters/configmaps/* Microsoft.ContainerService /managedClusters/endpoints/* Microsoft.ContainerService /managedClusters/events.k8s.io/events/read Reads events Microsoft.ContainerService /managedClusters/events/read Reads events Microsoft.ContainerService /managedClusters/extensions/daemonsets/* Microsoft.ContainerService /managedClusters/extensions/deployments/* Microsoft.ContainerService /managedClusters/extensions/ingresses/* Microsoft.ContainerService /managedClusters/extensions/networkpolicies/* Microsoft.ContainerService /managedClusters/extensions/replicasets/* Microsoft.ContainerService /managedClusters/limitranges/read Reads limitranges Microsoft.ContainerService /managedClusters/namespaces/read Reads namespaces Microsoft.ContainerService /managedClusters/networking.k8s.io/ingresses/* Microsoft.ContainerService /managedClusters/networking.k8s.io/networkpolicies/* Microsoft.ContainerService /managedClusters/persistentvolumeclaims/* Microsoft.ContainerService /managedClusters/pods/* Microsoft.ContainerService /managedClusters/policy/poddisruptionbudgets/* Microsoft.ContainerService /managedClusters/replicationcontrollers/* Microsoft.ContainerService /managedClusters/replicationcontrollers/* Microsoft.ContainerService /managedClusters/resourcequotas/read Reads resourcequotas Microsoft.ContainerService /managedClusters/secrets/* Microsoft.ContainerService /managedClusters/serviceaccounts/* Microsoft.ContainerService /managedClusters/services/* NotDataActions "description": "Allows read/write access to most objects in a namespace.This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets and running Pods as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/a7ffa36f-339b-4b5c-8bdf-e2c188b2c0eb", "name": "a7ffa36f-339b-4b5c-8bdf-e2c188b2c0eb", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read" "notActions": [], "dataActions": [ "Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read", "Microsoft.ContainerService/managedClusters/apps/daemonsets/*", "Microsoft.ContainerService/managedClusters/apps/deployments/*", "Microsoft.ContainerService/managedClusters/apps/replicasets/*", "Microsoft.ContainerService/managedClusters/apps/statefulsets/*", "Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/*", "Microsoft.ContainerService/managedClusters/batch/cronjobs/*", "Microsoft.ContainerService/managedClusters/batch/jobs/*", "Microsoft.ContainerService/managedClusters/configmaps/*", "Microsoft.ContainerService/managedClusters/endpoints/*", "Microsoft.ContainerService/managedClusters/events.k8s.io/events/read", "Microsoft.ContainerService/managedClusters/events/read", "Microsoft.ContainerService/managedClusters/extensions/daemonsets/*", "Microsoft.ContainerService/managedClusters/extensions/deployments/*", "Microsoft.ContainerService/managedClusters/extensions/ingresses/*", "Microsoft.ContainerService/managedClusters/extensions/networkpolicies/*", "Microsoft.ContainerService/managedClusters/extensions/replicasets/*", "Microsoft.ContainerService/managedClusters/limitranges/read", "Microsoft.ContainerService/managedClusters/namespaces/read", "Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/*", "Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/*", "Microsoft.ContainerService/managedClusters/persistentvolumeclaims/*", "Microsoft.ContainerService/managedClusters/pods/*", "Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/*", "Microsoft.ContainerService/managedClusters/replicationcontrollers/*", "Microsoft.ContainerService/managedClusters/replicationcontrollers/*", "Microsoft.ContainerService/managedClusters/resourcequotas/read", "Microsoft.ContainerService/managedClusters/secrets/*", "Microsoft.ContainerService/managedClusters/serviceaccounts/*", "Microsoft.ContainerService/managedClusters/services/*" "notDataActions": [] "roleName": "Azure Kubernetes Service RBAC Writer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for read and write access to Azure resources for SQL Server on Arc-enabled servers. Learn more
"description": "Microsoft.AzureArcData service role to access the resources of Microsoft.AzureArcData stored with RPSAAS.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/e8113dce-c529-4d33-91fa-e9b972617508", "name": "e8113dce-c529-4d33-91fa-e9b972617508", "permissions": [ "actions": [ "Microsoft.AzureArcData/sqlServerInstances/read", "Microsoft.AzureArcData/sqlServerInstances/write" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Azure Connected SQL Server Onboarding", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can read Azure Cosmos DB account data. See DocumentDB Account Contributor for managing Azure Cosmos DB accounts. Learn more
Microsoft.DocumentDB /databaseAccounts/readonlykeys/action Reads the database account readonly keys. Microsoft.Insights /MetricDefinitions/read Read metric definitions Microsoft.Insights /Metrics/read Read metrics Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Can read Azure Cosmos DB Accounts data", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/fbdf93bf-df7d-467e-a4d2-9458aa1360c8", "name": "fbdf93bf-df7d-467e-a4d2-9458aa1360c8", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.DocumentDB/*/read", "Microsoft.DocumentDB/databaseAccounts/readonlykeys/action", "Microsoft.Insights/MetricDefinitions/read", "Microsoft.Insights/Metrics/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Cosmos DB Account Reader Role", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage Azure Cosmos DB accounts, but not access data in them. Prevents access to account keys and connection strings. Learn more
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket Microsoft.Network /virtualNetworks/subnets/joinViaServiceEndpoint/action Joins resource such as storage account or SQL database to a subnet. Not alertable. NotActions Microsoft.DocumentDB /databaseAccounts/readonlyKeys/* Microsoft.DocumentDB /databaseAccounts/regenerateKey/* Microsoft.DocumentDB /databaseAccounts/listKeys/* Microsoft.DocumentDB /databaseAccounts/listConnectionStrings/* Microsoft.DocumentDB /databaseAccounts/sqlRoleDefinitions/write Create or update a SQL Role Definition Microsoft.DocumentDB /databaseAccounts/sqlRoleDefinitions/delete Delete a SQL Role Definition Microsoft.DocumentDB /databaseAccounts/sqlRoleAssignments/write Create or update a SQL Role Assignment Microsoft.DocumentDB /databaseAccounts/sqlRoleAssignments/delete Delete a SQL Role Assignment Microsoft.DocumentDB /databaseAccounts/mongodbRoleDefinitions/write Create or update a Mongo Role Definition Microsoft.DocumentDB /databaseAccounts/mongodbRoleDefinitions/delete Delete a MongoDB Role Definition Microsoft.DocumentDB /databaseAccounts/mongodbUserDefinitions/write Create or update a MongoDB User Definition Microsoft.DocumentDB /databaseAccounts/mongodbUserDefinitions/delete Delete a MongoDB User Definition DataActions NotDataActions "description": "Lets you manage Azure Cosmos DB accounts, but not access data in them. Prevents access to account keys and connection strings.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/230815da-be43-4aae-9cb4-875f7bd000aa", "name": "230815da-be43-4aae-9cb4-875f7bd000aa", "permissions": [ "actions": [ "Microsoft.DocumentDb/databaseAccounts/*", "Microsoft.Insights/alertRules/*", "Microsoft.Authorization/*/read", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action" "notActions": [ "Microsoft.DocumentDB/databaseAccounts/readonlyKeys/*", "Microsoft.DocumentDB/databaseAccounts/regenerateKey/*", "Microsoft.DocumentDB/databaseAccounts/listKeys/*", "Microsoft.DocumentDB/databaseAccounts/listConnectionStrings/*", "Microsoft.DocumentDB/databaseAccounts/sqlRoleDefinitions/write", "Microsoft.DocumentDB/databaseAccounts/sqlRoleDefinitions/delete", "Microsoft.DocumentDB/databaseAccounts/sqlRoleAssignments/write", "Microsoft.DocumentDB/databaseAccounts/sqlRoleAssignments/delete", "Microsoft.DocumentDB/databaseAccounts/mongodbRoleDefinitions/write", "Microsoft.DocumentDB/databaseAccounts/mongodbRoleDefinitions/delete", "Microsoft.DocumentDB/databaseAccounts/mongodbUserDefinitions/write", "Microsoft.DocumentDB/databaseAccounts/mongodbUserDefinitions/delete" "dataActions": [], "notDataActions": [] "roleName": "Cosmos DB Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can submit restore request for a Cosmos DB database or a container for an account Learn more
"description": "Can submit restore request for a Cosmos DB database or a container for an account", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/db7b14f2-5adf-42da-9f96-f2ee17bab5cb", "name": "db7b14f2-5adf-42da-9f96-f2ee17bab5cb", "permissions": [ "actions": [ "Microsoft.DocumentDB/databaseAccounts/backup/action", "Microsoft.DocumentDB/databaseAccounts/restore/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "CosmosBackupOperator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can perform restore action for Cosmos DB database account with continuous backup mode
Microsoft.DocumentDB /locations/restorableDatabaseAccounts/restore/action Submit a restore request Microsoft.DocumentDB /locations/restorableDatabaseAccounts/*/read Microsoft.DocumentDB /locations/restorableDatabaseAccounts/read Read a restorable database account or List all the restorable database accounts NotActions DataActions NotDataActions "description": "Can perform restore action for Cosmos DB database account with continuous backup mode", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5432c526-bc82-444a-b7ba-57c5b0b5b34f", "name": "5432c526-bc82-444a-b7ba-57c5b0b5b34f", "permissions": [ "actions": [ "Microsoft.DocumentDB/locations/restorableDatabaseAccounts/restore/action", "Microsoft.DocumentDB/locations/restorableDatabaseAccounts/*/read", "Microsoft.DocumentDB/locations/restorableDatabaseAccounts/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "CosmosRestoreOperator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can manage Azure Cosmos DB accounts. Azure Cosmos DB is formerly known as DocumentDB. Learn more
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket Microsoft.Network /virtualNetworks/subnets/joinViaServiceEndpoint/action Joins resource such as storage account or SQL database to a subnet. Not alertable. NotActions DataActions NotDataActions "description": "Lets you manage DocumentDB accounts, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5bd9cd88-fe45-4216-938b-f97437e15450", "name": "5bd9cd88-fe45-4216-938b-f97437e15450", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.DocumentDb/databaseAccounts/*", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "DocumentDB Account Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage Redis caches, but not access to them.
Microsoft.Cache /register/action Registers the 'Microsoft.Cache' resource provider with a subscription Microsoft.Cache /redis/* Create and manage Redis caches Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage Redis caches, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/e0f68234-74aa-48ed-b826-c38b57376e17", "name": "e0f68234-74aa-48ed-b826-c38b57376e17", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Cache/register/action", "Microsoft.Cache/redis/*", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Redis Cache Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage SQL databases, but not access to them. Also, you can't manage their security-related policies or their parent SQL servers. Learn more
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Sql /locations/*/read Microsoft.Sql /servers/databases/* Create and manage SQL databases Microsoft.Sql /servers/read Return the list of servers or gets the properties for the specified server. Microsoft.Support /* Create and update a support ticket Microsoft.Insights /metrics/read Read metrics Microsoft.Insights /metricDefinitions/read Read metric definitions NotActions Microsoft.Sql /servers/databases/ledgerDigestUploads/write Enable uploading ledger digests Microsoft.Sql /servers/databases/ledgerDigestUploads/disable/action Disable uploading ledger digests Microsoft.Sql /managedInstances/databases/currentSensitivityLabels/* Microsoft.Sql /managedInstances/databases/recommendedSensitivityLabels/* Microsoft.Sql /managedInstances/databases/schemas/tables/columns/sensitivityLabels/* Microsoft.Sql /managedInstances/databases/securityAlertPolicies/* Microsoft.Sql /managedInstances/databases/sensitivityLabels/* Microsoft.Sql /managedInstances/databases/vulnerabilityAssessments/* Microsoft.Sql /managedInstances/securityAlertPolicies/* Microsoft.Sql /managedInstances/vulnerabilityAssessments/* Microsoft.Sql /servers/databases/auditingSettings/* Edit audit settings Microsoft.Sql /servers/databases/auditRecords/read Retrieve the database blob audit records Microsoft.Sql /servers/databases/currentSensitivityLabels/* Microsoft.Sql /servers/databases/dataMaskingPolicies/* Edit data masking policies Microsoft.Sql /servers/databases/extendedAuditingSettings/* Microsoft.Sql /servers/databases/recommendedSensitivityLabels/* Microsoft.Sql /servers/databases/schemas/tables/columns/sensitivityLabels/* Microsoft.Sql /servers/databases/securityAlertPolicies/* Edit security alert policies Microsoft.Sql /servers/databases/securityMetrics/* Edit security metrics Microsoft.Sql /servers/databases/sensitivityLabels/* Microsoft.Sql /servers/databases/vulnerabilityAssessments/* Microsoft.Sql /servers/databases/vulnerabilityAssessmentScans/* Microsoft.Sql /servers/databases/vulnerabilityAssessmentSettings/* Microsoft.Sql /servers/vulnerabilityAssessments/* DataActions NotDataActions "description": "Lets you manage SQL databases, but not access to them. Also, you can't manage their security-related policies or their parent SQL servers.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/9b7fa17d-e63e-47b0-bb0a-15c516ac86ec", "name": "9b7fa17d-e63e-47b0-bb0a-15c516ac86ec", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Sql/locations/*/read", "Microsoft.Sql/servers/databases/*", "Microsoft.Sql/servers/read", "Microsoft.Support/*", "Microsoft.Insights/metrics/read", "Microsoft.Insights/metricDefinitions/read" "notActions": [ "Microsoft.Sql/servers/databases/ledgerDigestUploads/write", "Microsoft.Sql/servers/databases/ledgerDigestUploads/disable/action", "Microsoft.Sql/managedInstances/databases/currentSensitivityLabels/*", "Microsoft.Sql/managedInstances/databases/recommendedSensitivityLabels/*", "Microsoft.Sql/managedInstances/databases/schemas/tables/columns/sensitivityLabels/*", "Microsoft.Sql/managedInstances/databases/securityAlertPolicies/*", "Microsoft.Sql/managedInstances/databases/sensitivityLabels/*", "Microsoft.Sql/managedInstances/databases/vulnerabilityAssessments/*", "Microsoft.Sql/managedInstances/securityAlertPolicies/*", "Microsoft.Sql/managedInstances/vulnerabilityAssessments/*", "Microsoft.Sql/servers/databases/auditingSettings/*", "Microsoft.Sql/servers/databases/auditRecords/read", "Microsoft.Sql/servers/databases/currentSensitivityLabels/*", "Microsoft.Sql/servers/databases/dataMaskingPolicies/*", "Microsoft.Sql/servers/databases/extendedAuditingSettings/*", "Microsoft.Sql/servers/databases/recommendedSensitivityLabels/*", "Microsoft.Sql/servers/databases/schemas/tables/columns/sensitivityLabels/*", "Microsoft.Sql/servers/databases/securityAlertPolicies/*", "Microsoft.Sql/servers/databases/securityMetrics/*", "Microsoft.Sql/servers/databases/sensitivityLabels/*", "Microsoft.Sql/servers/databases/vulnerabilityAssessments/*", "Microsoft.Sql/servers/databases/vulnerabilityAssessmentScans/*", "Microsoft.Sql/servers/databases/vulnerabilityAssessmentSettings/*", "Microsoft.Sql/servers/vulnerabilityAssessments/*" "dataActions": [], "notDataActions": [] "roleName": "SQL DB Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage SQL Managed Instances and required network configuration, but can't give access to others.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Network /networkSecurityGroups/* Microsoft.Network /routeTables/* Microsoft.Sql /locations/*/read Microsoft.Sql /locations/instanceFailoverGroups/* Microsoft.Sql /managedInstances/* Microsoft.Support /* Create and update a support ticket Microsoft.Network /virtualNetworks/subnets/* Microsoft.Network /virtualNetworks/* Microsoft.Authorization /*/read Read roles and role assignments Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Insights /metrics/read Read metrics Microsoft.Insights /metricDefinitions/read Read metric definitions NotActions Microsoft.Sql /managedInstances/azureADOnlyAuthentications/delete Deletes a specific managed server Azure Active Directory only authentication object Microsoft.Sql /managedInstances/azureADOnlyAuthentications/write Adds or updates a specific managed server Azure Active Directory only authentication object DataActions NotDataActions "description": "Lets you manage SQL Managed Instances and required network configuration, but can't give access to others.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/4939a1f6-9ae0-4e48-a1e0-f2cbe897382d", "name": "4939a1f6-9ae0-4e48-a1e0-f2cbe897382d", "permissions": [ "actions": [ "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Network/networkSecurityGroups/*", "Microsoft.Network/routeTables/*", "Microsoft.Sql/locations/*/read", "Microsoft.Sql/locations/instanceFailoverGroups/*", "Microsoft.Sql/managedInstances/*", "Microsoft.Support/*", "Microsoft.Network/virtualNetworks/subnets/*", "Microsoft.Network/virtualNetworks/*", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Insights/metrics/read", "Microsoft.Insights/metricDefinitions/read" "notActions": [ "Microsoft.Sql/managedInstances/azureADOnlyAuthentications/delete", "Microsoft.Sql/managedInstances/azureADOnlyAuthentications/write" "dataActions": [], "notDataActions": [] "roleName": "SQL Managed Instance Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage the security-related policies of SQL servers and databases, but not access to them. Learn more
Microsoft.Network /virtualNetworks/subnets/joinViaServiceEndpoint/action Joins resource such as storage account or SQL database to a subnet. Not alertable. Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Sql /locations/administratorAzureAsyncOperation/read Gets the Managed instance azure async administrator operations result. Microsoft.Sql /managedInstances/advancedThreatProtectionSettings/read Retrieve a list of managed instance Advanced Threat Protection settings configured for a given instance Microsoft.Sql /managedInstances/advancedThreatProtectionSettings/write Change the managed instance Advanced Threat Protection settings for a given managed instance Microsoft.Sql /managedInstances/databases/advancedThreatProtectionSettings/read Retrieve a list of the managed database Advanced Threat Protection settings configured for a given managed database Microsoft.Sql /managedInstances/databases/advancedThreatProtectionSettings/write Change the database Advanced Threat Protection settings for a given managed database Microsoft.Sql /managedInstances/advancedThreatProtectionSettings/read Retrieve a list of managed instance Advanced Threat Protection settings configured for a given instance Microsoft.Sql /managedInstances/advancedThreatProtectionSettings/write Change the managed instance Advanced Threat Protection settings for a given managed instance Microsoft.Sql /managedInstances/databases/advancedThreatProtectionSettings/read Retrieve a list of the managed database Advanced Threat Protection settings configured for a given managed database Microsoft.Sql /managedInstances/databases/advancedThreatProtectionSettings/write Change the database Advanced Threat Protection settings for a given managed database Microsoft.Sql /managedInstances/databases/currentSensitivityLabels/* Microsoft.Sql /managedInstances/databases/recommendedSensitivityLabels/* Microsoft.Sql /managedInstances/databases/schemas/tables/columns/sensitivityLabels/* Microsoft.Sql /managedInstances/databases/securityAlertPolicies/* Microsoft.Sql /managedInstances/databases/sensitivityLabels/* Microsoft.Sql /managedInstances/databases/vulnerabilityAssessments/* Microsoft.Sql /servers/advancedThreatProtectionSettings/read Retrieve a list of server Advanced Threat Protection settings configured for a given server Microsoft.Sql /servers/advancedThreatProtectionSettings/write Change the server Advanced Threat Protection settings for a given server Microsoft.Sql /managedInstances/securityAlertPolicies/* Microsoft.Sql /managedInstances/databases/transparentDataEncryption/* Microsoft.Sql /managedInstances/vulnerabilityAssessments/* Microsoft.Sql /managedInstances/serverConfigurationOptions/read Gets properties for the specified Azure SQL Managed Instance Server Configuration Option. Microsoft.Sql /managedInstances/serverConfigurationOptions/write Updates Azure SQL Managed Instance's Server Configuration Option properties for the specified instance. Microsoft.Sql /locations/serverConfigurationOptionAzureAsyncOperation/read Gets the status of Azure SQL Managed Instance Server Configuration Option Azure async operation. Microsoft.Sql /servers/advancedThreatProtectionSettings/read Retrieve a list of server Advanced Threat Protection settings configured for a given server Microsoft.Sql /servers/advancedThreatProtectionSettings/write Change the server Advanced Threat Protection settings for a given server Microsoft.Sql /servers/auditingSettings/* Create and manage SQL server auditing setting Microsoft.Sql /servers/extendedAuditingSettings/read Retrieve details of the extended server blob auditing policy configured on a given server Microsoft.Sql /servers/databases/advancedThreatProtectionSettings/read Retrieve a list of database Advanced Threat Protection settings configured for a given database Microsoft.Sql /servers/databases/advancedThreatProtectionSettings/write Change the database Advanced Threat Protection settings for a given database Microsoft.Sql /servers/databases/advancedThreatProtectionSettings/read Retrieve a list of database Advanced Threat Protection settings configured for a given database Microsoft.Sql /servers/databases/advancedThreatProtectionSettings/write Change the database Advanced Threat Protection settings for a given database Microsoft.Sql /servers/databases/auditingSettings/* Create and manage SQL server database auditing settings Microsoft.Sql /servers/databases/auditRecords/read Retrieve the database blob audit records Microsoft.Sql /servers/databases/currentSensitivityLabels/* Microsoft.Sql /servers/databases/dataMaskingPolicies/* Create and manage SQL server database data masking policies Microsoft.Sql /servers/databases/extendedAuditingSettings/read Retrieve details of the extended blob auditing policy configured on a given database Microsoft.Sql /servers/databases/read Return the list of databases or gets the properties for the specified database. Microsoft.Sql /servers/databases/recommendedSensitivityLabels/* Microsoft.Sql /servers/databases/schemas/read Get a database schema. Microsoft.Sql /servers/databases/schemas/tables/columns/read Get a database column. Microsoft.Sql /servers/databases/schemas/tables/columns/sensitivityLabels/* Microsoft.Sql /servers/databases/schemas/tables/read Get a database table. Microsoft.Sql /servers/databases/securityAlertPolicies/* Create and manage SQL server database security alert policies Microsoft.Sql /servers/databases/securityMetrics/* Create and manage SQL server database security metrics Microsoft.Sql /servers/databases/sensitivityLabels/* Microsoft.Sql /servers/databases/transparentDataEncryption/* Microsoft.Sql /servers/databases/sqlvulnerabilityAssessments/* Microsoft.Sql /servers/databases/vulnerabilityAssessments/* Microsoft.Sql /servers/databases/vulnerabilityAssessmentScans/* Microsoft.Sql /servers/databases/vulnerabilityAssessmentSettings/* Microsoft.Sql /servers/devOpsAuditingSettings/* Microsoft.Sql /servers/firewallRules/* Microsoft.Sql /servers/read Return the list of servers or gets the properties for the specified server. Microsoft.Sql /servers/securityAlertPolicies/* Create and manage SQL server security alert policies Microsoft.Sql /servers/sqlvulnerabilityAssessments/* Microsoft.Sql /servers/vulnerabilityAssessments/* Microsoft.Support /* Create and update a support ticket Microsoft.Sql /servers/azureADOnlyAuthentications/* Microsoft.Sql /managedInstances/read Return the list of managed instances or gets the properties for the specified managed instance. Microsoft.Sql /managedInstances/azureADOnlyAuthentications/* Microsoft.Security /sqlVulnerabilityAssessments/* Microsoft.Sql /managedInstances/administrators/read Gets a list of managed instance administrators. Microsoft.Sql /servers/administrators/read Gets a specific Azure Active Directory administrator object Microsoft.Sql /servers/databases/ledgerDigestUploads/* Microsoft.Sql /locations/ledgerDigestUploadsAzureAsyncOperation/read Gets in-progress operations of ledger digest upload settings Microsoft.Sql /locations/ledgerDigestUploadsOperationResults/read Gets in-progress operations of ledger digest upload settings Microsoft.Sql /servers/externalPolicyBasedAuthorizations/* NotActions DataActions NotDataActions "description": "Lets you manage the security-related policies of SQL servers and databases, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/056cd41c-7e88-42e1-933e-88ba6a50c9c3", "name": "056cd41c-7e88-42e1-933e-88ba6a50c9c3", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Sql/locations/administratorAzureAsyncOperation/read", "Microsoft.Sql/managedInstances/advancedThreatProtectionSettings/read", "Microsoft.Sql/managedInstances/advancedThreatProtectionSettings/write", "Microsoft.Sql/managedInstances/databases/advancedThreatProtectionSettings/read", "Microsoft.Sql/managedInstances/databases/advancedThreatProtectionSettings/write", "Microsoft.Sql/managedInstances/advancedThreatProtectionSettings/read", "Microsoft.Sql/managedInstances/advancedThreatProtectionSettings/write", "Microsoft.Sql/managedInstances/databases/advancedThreatProtectionSettings/read", "Microsoft.Sql/managedInstances/databases/advancedThreatProtectionSettings/write", "Microsoft.Sql/managedInstances/databases/currentSensitivityLabels/*", "Microsoft.Sql/managedInstances/databases/recommendedSensitivityLabels/*", "Microsoft.Sql/managedInstances/databases/schemas/tables/columns/sensitivityLabels/*", "Microsoft.Sql/managedInstances/databases/securityAlertPolicies/*", "Microsoft.Sql/managedInstances/databases/sensitivityLabels/*", "Microsoft.Sql/managedInstances/databases/vulnerabilityAssessments/*", "Microsoft.Sql/servers/advancedThreatProtectionSettings/read", "Microsoft.Sql/servers/advancedThreatProtectionSettings/write", "Microsoft.Sql/managedInstances/securityAlertPolicies/*", "Microsoft.Sql/managedInstances/databases/transparentDataEncryption/*", "Microsoft.Sql/managedInstances/vulnerabilityAssessments/*", "Microsoft.Sql/managedInstances/serverConfigurationOptions/read", "Microsoft.Sql/managedInstances/serverConfigurationOptions/write", "Microsoft.Sql/locations/serverConfigurationOptionAzureAsyncOperation/read", "Microsoft.Sql/servers/advancedThreatProtectionSettings/read", "Microsoft.Sql/servers/advancedThreatProtectionSettings/write", "Microsoft.Sql/servers/auditingSettings/*", "Microsoft.Sql/servers/extendedAuditingSettings/read", "Microsoft.Sql/servers/databases/advancedThreatProtectionSettings/read", "Microsoft.Sql/servers/databases/advancedThreatProtectionSettings/write", "Microsoft.Sql/servers/databases/advancedThreatProtectionSettings/read", "Microsoft.Sql/servers/databases/advancedThreatProtectionSettings/write", "Microsoft.Sql/servers/databases/auditingSettings/*", "Microsoft.Sql/servers/databases/auditRecords/read", "Microsoft.Sql/servers/databases/currentSensitivityLabels/*", "Microsoft.Sql/servers/databases/dataMaskingPolicies/*", "Microsoft.Sql/servers/databases/extendedAuditingSettings/read", "Microsoft.Sql/servers/databases/read", "Microsoft.Sql/servers/databases/recommendedSensitivityLabels/*", "Microsoft.Sql/servers/databases/schemas/read", "Microsoft.Sql/servers/databases/schemas/tables/columns/read", "Microsoft.Sql/servers/databases/schemas/tables/columns/sensitivityLabels/*", "Microsoft.Sql/servers/databases/schemas/tables/read", "Microsoft.Sql/servers/databases/securityAlertPolicies/*", "Microsoft.Sql/servers/databases/securityMetrics/*", "Microsoft.Sql/servers/databases/sensitivityLabels/*", "Microsoft.Sql/servers/databases/transparentDataEncryption/*", "Microsoft.Sql/servers/databases/sqlvulnerabilityAssessments/*", "Microsoft.Sql/servers/databases/vulnerabilityAssessments/*", "Microsoft.Sql/servers/databases/vulnerabilityAssessmentScans/*", "Microsoft.Sql/servers/databases/vulnerabilityAssessmentSettings/*", "Microsoft.Sql/servers/devOpsAuditingSettings/*", "Microsoft.Sql/servers/firewallRules/*", "Microsoft.Sql/servers/read", "Microsoft.Sql/servers/securityAlertPolicies/*", "Microsoft.Sql/servers/sqlvulnerabilityAssessments/*", "Microsoft.Sql/servers/vulnerabilityAssessments/*", "Microsoft.Support/*", "Microsoft.Sql/servers/azureADOnlyAuthentications/*", "Microsoft.Sql/managedInstances/read", "Microsoft.Sql/managedInstances/azureADOnlyAuthentications/*", "Microsoft.Security/sqlVulnerabilityAssessments/*", "Microsoft.Sql/managedInstances/administrators/read", "Microsoft.Sql/servers/administrators/read", "Microsoft.Sql/servers/databases/ledgerDigestUploads/*", "Microsoft.Sql/locations/ledgerDigestUploadsAzureAsyncOperation/read", "Microsoft.Sql/locations/ledgerDigestUploadsOperationResults/read", "Microsoft.Sql/servers/externalPolicyBasedAuthorizations/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "SQL Security Manager", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage SQL servers and databases, but not access to them, and not their security-related policies. Learn more
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Sql /locations/*/read Microsoft.Sql /servers/* Create and manage SQL servers Microsoft.Support /* Create and update a support ticket Microsoft.Insights /metrics/read Read metrics Microsoft.Insights /metricDefinitions/read Read metric definitions NotActions Microsoft.Sql /managedInstances/databases/currentSensitivityLabels/* Microsoft.Sql /managedInstances/databases/recommendedSensitivityLabels/* Microsoft.Sql /managedInstances/databases/schemas/tables/columns/sensitivityLabels/* Microsoft.Sql /managedInstances/databases/securityAlertPolicies/* Microsoft.Sql /managedInstances/databases/sensitivityLabels/* Microsoft.Sql /managedInstances/databases/vulnerabilityAssessments/* Microsoft.Sql /managedInstances/securityAlertPolicies/* Microsoft.Sql /managedInstances/vulnerabilityAssessments/* Microsoft.Sql /servers/auditingSettings/* Edit SQL server auditing settings Microsoft.Sql /servers/databases/auditingSettings/* Edit SQL server database auditing settings Microsoft.Sql /servers/databases/auditRecords/read Retrieve the database blob audit records Microsoft.Sql /servers/databases/currentSensitivityLabels/* Microsoft.Sql /servers/databases/dataMaskingPolicies/* Edit SQL server database data masking policies Microsoft.Sql /servers/databases/extendedAuditingSettings/* Microsoft.Sql /servers/databases/recommendedSensitivityLabels/* Microsoft.Sql /servers/databases/schemas/tables/columns/sensitivityLabels/* Microsoft.Sql /servers/databases/securityAlertPolicies/* Edit SQL server database security alert policies Microsoft.Sql /servers/databases/securityMetrics/* Edit SQL server database security metrics Microsoft.Sql /servers/databases/sensitivityLabels/* Microsoft.Sql /servers/databases/vulnerabilityAssessments/* Microsoft.Sql /servers/databases/vulnerabilityAssessmentScans/* Microsoft.Sql /servers/databases/vulnerabilityAssessmentSettings/* Microsoft.Sql /servers/devOpsAuditingSettings/* Microsoft.Sql /servers/extendedAuditingSettings/* Microsoft.Sql /servers/securityAlertPolicies/* Edit SQL server security alert policies Microsoft.Sql /servers/vulnerabilityAssessments/* Microsoft.Sql /servers/azureADOnlyAuthentications/delete Deletes a specific server Azure Active Directory only authentication object Microsoft.Sql /servers/azureADOnlyAuthentications/write Adds or updates a specific server Azure Active Directory only authentication object Microsoft.Sql /servers/externalPolicyBasedAuthorizations/delete Deletes a specific server external policy based authorization property Microsoft.Sql /servers/externalPolicyBasedAuthorizations/write Adds or updates a specific server external policy based authorization property DataActions NotDataActions "description": "Lets you manage SQL servers and databases, but not access to them, and not their security -related policies.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/6d8ee4ec-f05a-4a1d-8b00-a9b17e38b437", "name": "6d8ee4ec-f05a-4a1d-8b00-a9b17e38b437", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Sql/locations/*/read", "Microsoft.Sql/servers/*", "Microsoft.Support/*", "Microsoft.Insights/metrics/read", "Microsoft.Insights/metricDefinitions/read" "notActions": [ "Microsoft.Sql/managedInstances/databases/currentSensitivityLabels/*", "Microsoft.Sql/managedInstances/databases/recommendedSensitivityLabels/*", "Microsoft.Sql/managedInstances/databases/schemas/tables/columns/sensitivityLabels/*", "Microsoft.Sql/managedInstances/databases/securityAlertPolicies/*", "Microsoft.Sql/managedInstances/databases/sensitivityLabels/*", "Microsoft.Sql/managedInstances/databases/vulnerabilityAssessments/*", "Microsoft.Sql/managedInstances/securityAlertPolicies/*", "Microsoft.Sql/managedInstances/vulnerabilityAssessments/*", "Microsoft.Sql/servers/auditingSettings/*", "Microsoft.Sql/servers/databases/auditingSettings/*", "Microsoft.Sql/servers/databases/auditRecords/read", "Microsoft.Sql/servers/databases/currentSensitivityLabels/*", "Microsoft.Sql/servers/databases/dataMaskingPolicies/*", "Microsoft.Sql/servers/databases/extendedAuditingSettings/*", "Microsoft.Sql/servers/databases/recommendedSensitivityLabels/*", "Microsoft.Sql/servers/databases/schemas/tables/columns/sensitivityLabels/*", "Microsoft.Sql/servers/databases/securityAlertPolicies/*", "Microsoft.Sql/servers/databases/securityMetrics/*", "Microsoft.Sql/servers/databases/sensitivityLabels/*", "Microsoft.Sql/servers/databases/vulnerabilityAssessments/*", "Microsoft.Sql/servers/databases/vulnerabilityAssessmentScans/*", "Microsoft.Sql/servers/databases/vulnerabilityAssessmentSettings/*", "Microsoft.Sql/servers/devOpsAuditingSettings/*", "Microsoft.Sql/servers/extendedAuditingSettings/*", "Microsoft.Sql/servers/securityAlertPolicies/*", "Microsoft.Sql/servers/vulnerabilityAssessments/*", "Microsoft.Sql/servers/azureADOnlyAuthentications/delete", "Microsoft.Sql/servers/azureADOnlyAuthentications/write", "Microsoft.Sql/servers/externalPolicyBasedAuthorizations/delete", "Microsoft.Sql/servers/externalPolicyBasedAuthorizations/write" "dataActions": [], "notDataActions": [] "roleName": "SQL Server Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for full access to Azure Event Hubs resources. Learn more
"description": "Allows for full access to Azure Event Hubs resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/f526a384-b230-433a-b45c-95f59c4a2dec", "name": "f526a384-b230-433a-b45c-95f59c4a2dec", "permissions": [ "actions": [ "Microsoft.EventHub/*" "notActions": [], "dataActions": [ "Microsoft.EventHub/*" "notDataActions": [] "roleName": "Azure Event Hubs Data Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows receive access to Azure Event Hubs resources. Learn more
"description": "Allows receive access to Azure Event Hubs resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/a638d3c7-ab3a-418d-83e6-5f17a39d4fde", "name": "a638d3c7-ab3a-418d-83e6-5f17a39d4fde", "permissions": [ "actions": [ "Microsoft.EventHub/*/eventhubs/consumergroups/read" "notActions": [], "dataActions": [ "Microsoft.EventHub/*/receive/action" "notDataActions": [] "roleName": "Azure Event Hubs Data Receiver", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows send access to Azure Event Hubs resources. Learn more
"description": "Allows send access to Azure Event Hubs resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/2b629674-e913-4c01-ae53-ef4638d8f975", "name": "2b629674-e913-4c01-ae53-ef4638d8f975", "permissions": [ "actions": [ "Microsoft.EventHub/*/eventhubs/read" "notActions": [], "dataActions": [ "Microsoft.EventHub/*/send/action" "notDataActions": [] "roleName": "Azure Event Hubs Data Sender", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Create and manage data factories, as well as child resources within them. Learn more
Microsoft.DataFactory /dataFactories/* Create and manage data factories, and child resources within them. Microsoft.DataFactory /factories/* Create and manage data factories, and child resources within them. Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket Microsoft.EventGrid /eventSubscriptions/write Create or update an eventSubscription NotActions DataActions NotDataActions "description": "Create and manage data factories, as well as child resources within them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/673868aa-7521-48a0-acc6-0f60742d39f5", "name": "673868aa-7521-48a0-acc6-0f60742d39f5", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.DataFactory/dataFactories/*", "Microsoft.DataFactory/factories/*", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.EventGrid/eventSubscriptions/write" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Data Factory Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Delete private data from a Log Analytics workspace. Learn more
Microsoft.OperationalInsights /workspaces/purge/action Delete specified data by query from workspace. NotActions DataActions NotDataActions "description": "Can purge analytics data", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/150f5e0c-0603-4f03-8c7f-cf70034c4e90", "name": "150f5e0c-0603-4f03-8c7f-cf70034c4e90", "permissions": [ "actions": [ "Microsoft.Insights/components/*/read", "Microsoft.Insights/components/purge/action", "Microsoft.OperationalInsights/workspaces/*/read", "Microsoft.OperationalInsights/workspaces/purge/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Data Purger", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you read and modify HDInsight cluster configurations. Learn more
Microsoft.HDInsight /clusters/getGatewaySettings/action Get gateway settings for HDInsight Cluster Microsoft.HDInsight /clusters/updateGatewaySettings/action Update gateway settings for HDInsight Cluster Microsoft.HDInsight /clusters/configurations/* Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Resources /deployments/operations/read Gets or lists deployment operations. Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Authorization /*/read Read roles and role assignments Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you read and modify HDInsight cluster configurations.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/61ed4efc-fab3-44fd-b111-e24485cc132a", "name": "61ed4efc-fab3-44fd-b111-e24485cc132a", "permissions": [ "actions": [ "Microsoft.HDInsight/*/read", "Microsoft.HDInsight/clusters/getGatewaySettings/action", "Microsoft.HDInsight/clusters/updateGatewaySettings/action", "Microsoft.HDInsight/clusters/configurations/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/operations/read", "Microsoft.Insights/alertRules/*", "Microsoft.Authorization/*/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "HDInsight Cluster Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can Read, Create, Modify and Delete Domain Services related operations needed for HDInsight Enterprise Security Package Learn more
"description": "Can Read, Create, Modify and Delete Domain Services related operations needed for HDInsight Enterprise Security Package", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/8d8d5a11-05d3-4bda-a417-a08778121c7c", "name": "8d8d5a11-05d3-4bda-a417-a08778121c7c", "permissions": [ "actions": [ "Microsoft.AAD/*/read", "Microsoft.AAD/domainServices/*/read", "Microsoft.AAD/domainServices/oucontainer/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "HDInsight Domain Services Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Log Analytics Contributor can read all monitoring data and edit monitoring settings. Editing monitoring settings includes adding the VM extension to VMs; reading storage account keys to be able to configure collection of logs from Azure Storage; adding solutions; and configuring Azure diagnostics on all Azure resources. Learn more
Microsoft.ClassicStorage /storageAccounts/listKeys/action Lists the access keys for the storage accounts. Microsoft.Compute /virtualMachines/extensions/* Microsoft.HybridCompute /machines/extensions/write Installs or Updates an Azure Arc extensions Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Insights /diagnosticSettings/* Creates, updates, or reads the diagnostic setting for Analysis Server Microsoft.OperationalInsights /* Microsoft.OperationsManagement /* Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourcegroups/deployments/* Microsoft.Storage /storageAccounts/listKeys/action Returns the access keys for the specified storage account. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Log Analytics Contributor can read all monitoring data and edit monitoring settings. Editing monitoring settings includes adding the VM extension to VMs; reading storage account keys to be able to configure collection of logs from Azure Storage; adding solutions; and configuring Azure diagnostics on all Azure resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/92aaf0da-9dab-42b6-94a3-d43ce8d16293", "name": "92aaf0da-9dab-42b6-94a3-d43ce8d16293", "permissions": [ "actions": [ "*/read", "Microsoft.ClassicCompute/virtualMachines/extensions/*", "Microsoft.ClassicStorage/storageAccounts/listKeys/action", "Microsoft.Compute/virtualMachines/extensions/*", "Microsoft.HybridCompute/machines/extensions/write", "Microsoft.Insights/alertRules/*", "Microsoft.Insights/diagnosticSettings/*", "Microsoft.OperationalInsights/*", "Microsoft.OperationsManagement/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourcegroups/deployments/*", "Microsoft.Storage/storageAccounts/listKeys/action", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Log Analytics Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Log Analytics Reader can view and search all monitoring data as well as and view monitoring settings, including viewing the configuration of Azure diagnostics on all Azure resources. Learn more
Microsoft.OperationalInsights /workspaces/sharedKeys/read Retrieves the shared keys for the workspace. These keys are used to connect Microsoft Operational Insights agents to the workspace. DataActions NotDataActions "description": "Log Analytics Reader can view and search all monitoring data as well as and view monitoring settings, including viewing the configuration of Azure diagnostics on all Azure resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/73c42c96-874c-492b-b04d-ab87d138a893", "name": "73c42c96-874c-492b-b04d-ab87d138a893", "permissions": [ "actions": [ "*/read", "Microsoft.OperationalInsights/workspaces/analytics/query/action", "Microsoft.OperationalInsights/workspaces/search/action", "Microsoft.Support/*" "notActions": [ "Microsoft.OperationalInsights/workspaces/sharedKeys/read" "dataActions": [], "notDataActions": [] "roleName": "Log Analytics Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read, write, and delete Schema Registry groups and schemas.
"description": "Read, write, and delete Schema Registry groups and schemas.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5dffeca3-4936-4216-b2bc-10343a5abb25", "name": "5dffeca3-4936-4216-b2bc-10343a5abb25", "permissions": [ "actions": [ "Microsoft.EventHub/namespaces/schemagroups/*" "notActions": [], "dataActions": [ "Microsoft.EventHub/namespaces/schemas/*" "notDataActions": [] "roleName": "Schema Registry Contributor (Preview)", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read and list Schema Registry groups and schemas.
Microsoft.EventHub /namespaces/schemagroups/read Get list of SchemaGroup Resource Descriptions NotActions DataActions Microsoft.EventHub /namespaces/schemas/read Retrieve schemas NotDataActions "description": "Read and list Schema Registry groups and schemas.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/2c56ea50-c6b3-40a6-83c0-9d98858bc7d2", "name": "2c56ea50-c6b3-40a6-83c0-9d98858bc7d2", "permissions": [ "actions": [ "Microsoft.EventHub/namespaces/schemagroups/read" "notActions": [], "dataActions": [ "Microsoft.EventHub/namespaces/schemas/read" "notDataActions": [] "roleName": "Schema Registry Reader (Preview)", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you perform query testing without creating a stream analytics job first
Microsoft.StreamAnalytics /locations/TestQuery/action Test Query for Stream Analytics Resource Provider Microsoft.StreamAnalytics /locations/OperationResults/read Read Stream Analytics Operation Result Microsoft.StreamAnalytics /locations/SampleInput/action Sample Input for Stream Analytics Resource Provider Microsoft.StreamAnalytics /locations/CompileQuery/action Compile Query for Stream Analytics Resource Provider NotActions DataActions NotDataActions "description": "Lets you perform query testing without creating a stream analytics job first", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/1ec5b3c1-b17e-4e25-8312-2acb3c3c5abf", "name": "1ec5b3c1-b17e-4e25-8312-2acb3c3c5abf", "permissions": [ "actions": [ "Microsoft.StreamAnalytics/locations/TestQuery/action", "Microsoft.StreamAnalytics/locations/OperationResults/read", "Microsoft.StreamAnalytics/locations/SampleInput/action", "Microsoft.StreamAnalytics/locations/CompileQuery/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Stream Analytics Query Tester", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can perform all actions within an Azure Machine Learning workspace, except for creating or deleting compute resources and modifying the workspace itself.
Microsoft.MachineLearningServices /featurestores/read Gets the Machine Learning Services FeatureStore(s) Microsoft.MachineLearningServices /featurestores/checkNameAvailability/read Checks the Machine Learning Services FeatureStore name availability NotActions Microsoft.MachineLearningServices /workspaces/delete Deletes the Machine Learning Services Workspace(s) Microsoft.MachineLearningServices /workspaces/write Creates or updates a Machine Learning Services Workspace(s) Microsoft.MachineLearningServices /workspaces/computes/*/write Microsoft.MachineLearningServices /workspaces/computes/*/delete Microsoft.MachineLearningServices /workspaces/computes/listKeys/action List secrets for compute resources in Machine Learning Services Workspace Microsoft.MachineLearningServices /workspaces/listKeys/action List secrets for a Machine Learning Services Workspace DataActions NotDataActions "description": "Can perform all actions within an Azure Machine Learning workspace, except for creating or deleting compute resources and modifying the workspace itself.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/f6c7c914-8db3-469d-8ca1-694a8f32e121", "name": "f6c7c914-8db3-469d-8ca1-694a8f32e121", "permissions": [ "actions": [ "Microsoft.MachineLearningServices/workspaces/*/read", "Microsoft.MachineLearningServices/workspaces/*/action", "Microsoft.MachineLearningServices/workspaces/*/delete", "Microsoft.MachineLearningServices/workspaces/*/write", "Microsoft.MachineLearningServices/featurestores/read", "Microsoft.MachineLearningServices/featurestores/checkNameAvailability/read" "notActions": [ "Microsoft.MachineLearningServices/workspaces/delete", "Microsoft.MachineLearningServices/workspaces/write", "Microsoft.MachineLearningServices/workspaces/computes/*/write", "Microsoft.MachineLearningServices/workspaces/computes/*/delete", "Microsoft.MachineLearningServices/workspaces/computes/listKeys/action", "Microsoft.MachineLearningServices/workspaces/listKeys/action" "dataActions": [], "notDataActions": [] "roleName": "AzureML Data Scientist", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you create, read, update, delete and manage keys of Cognitive Services. Learn more
Microsoft.Features /providers/features/read Gets the feature of a subscription in a given resource provider. Microsoft.Features /providers/features/register/action Registers the feature for a subscription in a given resource provider. Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Insights /diagnosticSettings/* Creates, updates, or reads the diagnostic setting for Analysis Server Microsoft.Insights /logDefinitions/read Read log definitions Microsoft.Insights /metricdefinitions/read Read metric definitions Microsoft.Insights /metrics/read Read metrics Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /deployments/operations/read Gets or lists deployment operations. Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourcegroups/deployments/* Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you create, read, update, delete and manage keys of Cognitive Services.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/25fbc0a9-bd7c-42a3-aa1a-3b75d497ee68", "name": "25fbc0a9-bd7c-42a3-aa1a-3b75d497ee68", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.CognitiveServices/*", "Microsoft.Features/features/read", "Microsoft.Features/providers/features/read", "Microsoft.Features/providers/features/register/action", "Microsoft.Insights/alertRules/*", "Microsoft.Insights/diagnosticSettings/*", "Microsoft.Insights/logDefinitions/read", "Microsoft.Insights/metricdefinitions/read", "Microsoft.Insights/metrics/read", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/deployments/operations/read", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourcegroups/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Cognitive Services Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Full access to the project, including the ability to view, create, edit, or delete projects. Learn more
"description": "Full access to the project, including the ability to view, create, edit, or delete projects.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/c1ff6cc2-c111-46fe-8896-e0ef812ad9f3", "name": "c1ff6cc2-c111-46fe-8896-e0ef812ad9f3", "permissions": [ "actions": [ "Microsoft.CognitiveServices/*/read" "notActions": [], "dataActions": [ "Microsoft.CognitiveServices/accounts/CustomVision/*" "notDataActions": [] "roleName": "Cognitive Services Custom Vision Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Publish, unpublish or export models. Deployment can view the project but can't update. Learn more
"description": "Publish, unpublish or export models. Deployment can view the project but can't update.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5c4089e1-6d96-4d2f-b296-c1bc7137275f", "name": "5c4089e1-6d96-4d2f-b296-c1bc7137275f", "permissions": [ "actions": [ "Microsoft.CognitiveServices/*/read" "notActions": [], "dataActions": [ "Microsoft.CognitiveServices/accounts/CustomVision/*/read", "Microsoft.CognitiveServices/accounts/CustomVision/projects/predictions/*", "Microsoft.CognitiveServices/accounts/CustomVision/projects/iterations/publish/*", "Microsoft.CognitiveServices/accounts/CustomVision/projects/iterations/export/*", "Microsoft.CognitiveServices/accounts/CustomVision/projects/quicktest/*", "Microsoft.CognitiveServices/accounts/CustomVision/classify/*", "Microsoft.CognitiveServices/accounts/CustomVision/detect/*" "notDataActions": [ "Microsoft.CognitiveServices/accounts/CustomVision/projects/export/read" "roleName": "Cognitive Services Custom Vision Deployment", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"View, edit training images and create, add, remove, or delete the image tags. Labelers can view the project but can't update anything other than training images and tags. Learn more
Microsoft.CognitiveServices /accounts/CustomVision/projects/predictions/query/action Get images that were sent to your prediction endpoint. Microsoft.CognitiveServices /accounts/CustomVision/projects/images/* Microsoft.CognitiveServices /accounts/CustomVision/projects/tags/* Microsoft.CognitiveServices /accounts/CustomVision/projects/images/suggested/* Microsoft.CognitiveServices /accounts/CustomVision/projects/tagsandregions/suggestions/action This API will get suggested tags and regions for an array/batch of untagged images along with confidences for the tags. It returns an empty array if no tags are found. NotDataActions Microsoft.CognitiveServices /accounts/CustomVision/projects/export/read Exports a project. "description": "View, edit training images and create, add, remove, or delete the image tags. Labelers can view the project but can't update anything other than training images and tags.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/88424f51-ebe7-446f-bc41-7fa16989e96c", "name": "88424f51-ebe7-446f-bc41-7fa16989e96c", "permissions": [ "actions": [ "Microsoft.CognitiveServices/*/read" "notActions": [], "dataActions": [ "Microsoft.CognitiveServices/accounts/CustomVision/*/read", "Microsoft.CognitiveServices/accounts/CustomVision/projects/predictions/query/action", "Microsoft.CognitiveServices/accounts/CustomVision/projects/images/*", "Microsoft.CognitiveServices/accounts/CustomVision/projects/tags/*", "Microsoft.CognitiveServices/accounts/CustomVision/projects/images/suggested/*", "Microsoft.CognitiveServices/accounts/CustomVision/projects/tagsandregions/suggestions/action" "notDataActions": [ "Microsoft.CognitiveServices/accounts/CustomVision/projects/export/read" "roleName": "Cognitive Services Custom Vision Labeler", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read-only actions in the project. Readers can't create or update the project. Learn more
Microsoft.CognitiveServices /accounts/CustomVision/projects/predictions/query/action Get images that were sent to your prediction endpoint. NotDataActions Microsoft.CognitiveServices /accounts/CustomVision/projects/export/read Exports a project. "description": "Read-only actions in the project. Readers can't create or update the project.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/93586559-c37d-4a6b-ba08-b9f0940c2d73", "name": "93586559-c37d-4a6b-ba08-b9f0940c2d73", "permissions": [ "actions": [ "Microsoft.CognitiveServices/*/read" "notActions": [], "dataActions": [ "Microsoft.CognitiveServices/accounts/CustomVision/*/read", "Microsoft.CognitiveServices/accounts/CustomVision/projects/predictions/query/action" "notDataActions": [ "Microsoft.CognitiveServices/accounts/CustomVision/projects/export/read" "roleName": "Cognitive Services Custom Vision Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"View, edit projects and train the models, including the ability to publish, unpublish, export the models. Trainers can't create or delete the project. Learn more
Microsoft.CognitiveServices /accounts/CustomVision/projects/delete Delete a specific project. Microsoft.CognitiveServices /accounts/CustomVision/projects/import/action Imports a project. Microsoft.CognitiveServices /accounts/CustomVision/projects/export/read Exports a project. "description": "View, edit projects and train the models, including the ability to publish, unpublish, export the models. Trainers can't create or delete the project.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/0a5ae4ab-0d65-4eeb-be61-29fc9b54394b", "name": "0a5ae4ab-0d65-4eeb-be61-29fc9b54394b", "permissions": [ "actions": [ "Microsoft.CognitiveServices/*/read" "notActions": [], "dataActions": [ "Microsoft.CognitiveServices/accounts/CustomVision/*" "notDataActions": [ "Microsoft.CognitiveServices/accounts/CustomVision/projects/action", "Microsoft.CognitiveServices/accounts/CustomVision/projects/delete", "Microsoft.CognitiveServices/accounts/CustomVision/projects/import/action", "Microsoft.CognitiveServices/accounts/CustomVision/projects/export/read" "roleName": "Cognitive Services Custom Vision Trainer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you read Cognitive Services data.
"description": "Lets you read Cognitive Services data.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/b59867f0-fa02-499b-be73-45a86b5b3e1c", "name": "b59867f0-fa02-499b-be73-45a86b5b3e1c", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.CognitiveServices/*/read" "notDataActions": [] "roleName": "Cognitive Services Data Reader (Preview)", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you perform detect, verify, identify, group, and find similar operations on Face API. This role does not allow create or delete operations, which makes it well suited for endpoints that only need inferencing capabilities, following 'least privilege' best practices.
Microsoft.CognitiveServices /accounts/Face/detect/action Detect human faces in an image, return face rectangles, and optionally with faceIds, landmarks, and attributes. Microsoft.CognitiveServices /accounts/Face/verify/action Verify whether two faces belong to a same person or whether one face belongs to a person. Microsoft.CognitiveServices /accounts/Face/identify/action 1-to-many identification to find the closest matches of the specific query person face from a person group or large person group. Microsoft.CognitiveServices /accounts/Face/group/action Divide candidate faces into groups based on face similarity. Microsoft.CognitiveServices /accounts/Face/findsimilars/action Given query face's faceId, to search the similar-looking faces from a faceId array, a face list or a large face list. faceId Microsoft.CognitiveServices /accounts/Face/detectliveness/multimodal/actionPerforms liveness detection on a target face in a sequence of infrared, color and/or depth images, and returns the liveness classification of the target face as either ‘real face’, ‘spoof face’, or ‘uncertain’ if a classification cannot be made with the given inputs.
Microsoft.CognitiveServices /accounts/Face/detectliveness/singlemodal/actionPerforms liveness detection on a target face in a sequence of images of the same modality (e.g. color or infrared), and returns the liveness classification of the target face as either ‘real face’, ‘spoof face’, or ‘uncertain’ if a classification cannot be made with the given inputs.
Microsoft.CognitiveServices /accounts/Face/detectlivenesswithverify/singlemodal/action Detects liveness of a target face in a sequence of images of the same stream type (e.g. color) and then compares with VerifyImage to return confidence score for identity scenarios. NotDataActions "description": "Lets you perform detect, verify, identify, group, and find similar operations on Face API. This role does not allow create or delete operations, which makes it well suited for endpoints that only need inferencing capabilities, following 'least privilege' best practices.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/9894cab4-e18a-44aa-828b-cb588cd6f2d7", "name": "9894cab4-e18a-44aa-828b-cb588cd6f2d7", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.CognitiveServices/accounts/Face/detect/action", "Microsoft.CognitiveServices/accounts/Face/verify/action", "Microsoft.CognitiveServices/accounts/Face/identify/action", "Microsoft.CognitiveServices/accounts/Face/group/action", "Microsoft.CognitiveServices/accounts/Face/findsimilars/action", "Microsoft.CognitiveServices/accounts/Face/detectliveness/multimodal/action", "Microsoft.CognitiveServices/accounts/Face/detectliveness/singlemodal/action", "Microsoft.CognitiveServices/accounts/Face/detectlivenesswithverify/singlemodal/action" "notDataActions": [] "roleName": "Cognitive Services Face Recognizer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Full access to the project, including the system level configuration. Learn more
"description": "Full access to the project, including the system level configuration.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/cb43c632-a144-4ec5-977c-e80c4affc34a", "name": "cb43c632-a144-4ec5-977c-e80c4affc34a", "permissions": [ "actions": [ "Microsoft.CognitiveServices/*/read" "notActions": [], "dataActions": [ "Microsoft.CognitiveServices/accounts/MetricsAdvisor/*" "notDataActions": [] "roleName": "Cognitive Services Metrics Advisor Administrator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Let's you create, edit, import and export a KB. You cannot publish or delete a KB. Learn more
Microsoft.CognitiveServices /accounts/QnAMaker/knowledgebases/read Gets List of Knowledgebases or details of a specific knowledgebaser. Microsoft.CognitiveServices /accounts/QnAMaker/knowledgebases/download/read Download the knowledgebase. Microsoft.CognitiveServices /accounts/QnAMaker/knowledgebases/create/write Asynchronous operation to create a new knowledgebase. Microsoft.CognitiveServices /accounts/QnAMaker/knowledgebases/write Asynchronous operation to modify a knowledgebase or Replace knowledgebase contents. Microsoft.CognitiveServices /accounts/QnAMaker/knowledgebases/generateanswer/action GenerateAnswer call to query the knowledgebase. Microsoft.CognitiveServices /accounts/QnAMaker/knowledgebases/train/action Train call to add suggestions to the knowledgebase. Microsoft.CognitiveServices /accounts/QnAMaker/alterations/read Download alterations from runtime. Microsoft.CognitiveServices /accounts/QnAMaker/alterations/write Replace alterations data. Microsoft.CognitiveServices /accounts/QnAMaker/endpointkeys/read Gets endpoint keys for an endpoint Microsoft.CognitiveServices /accounts/QnAMaker/endpointkeys/refreshkeys/action Re-generates an endpoint key. Microsoft.CognitiveServices /accounts/QnAMaker/endpointsettings/read Gets endpoint settings for an endpoint Microsoft.CognitiveServices /accounts/QnAMaker/endpointsettings/write Update endpoint seettings for an endpoint. Microsoft.CognitiveServices /accounts/QnAMaker/operations/read Gets details of a specific long running operation. Microsoft.CognitiveServices /accounts/QnAMaker.v2/knowledgebases/read Gets List of Knowledgebases or details of a specific knowledgebaser. Microsoft.CognitiveServices /accounts/QnAMaker.v2/knowledgebases/download/read Download the knowledgebase. Microsoft.CognitiveServices /accounts/QnAMaker.v2/knowledgebases/create/write Asynchronous operation to create a new knowledgebase. Microsoft.CognitiveServices /accounts/QnAMaker.v2/knowledgebases/write Asynchronous operation to modify a knowledgebase or Replace knowledgebase contents. Microsoft.CognitiveServices /accounts/QnAMaker.v2/knowledgebases/generateanswer/action GenerateAnswer call to query the knowledgebase. Microsoft.CognitiveServices /accounts/QnAMaker.v2/knowledgebases/train/action Train call to add suggestions to the knowledgebase. Microsoft.CognitiveServices /accounts/QnAMaker.v2/alterations/read Download alterations from runtime. Microsoft.CognitiveServices /accounts/QnAMaker.v2/alterations/write Replace alterations data. Microsoft.CognitiveServices /accounts/QnAMaker.v2/endpointkeys/read Gets endpoint keys for an endpoint Microsoft.CognitiveServices /accounts/QnAMaker.v2/endpointkeys/refreshkeys/action Re-generates an endpoint key. Microsoft.CognitiveServices /accounts/QnAMaker.v2/endpointsettings/read Gets endpoint settings for an endpoint Microsoft.CognitiveServices /accounts/QnAMaker.v2/endpointsettings/write Update endpoint seettings for an endpoint. Microsoft.CognitiveServices /accounts/QnAMaker.v2/operations/read Gets details of a specific long running operation. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/knowledgebases/read Gets List of Knowledgebases or details of a specific knowledgebaser. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/knowledgebases/download/read Download the knowledgebase. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/knowledgebases/create/write Asynchronous operation to create a new knowledgebase. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/knowledgebases/write Asynchronous operation to modify a knowledgebase or Replace knowledgebase contents. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/knowledgebases/generateanswer/action GenerateAnswer call to query the knowledgebase. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/knowledgebases/train/action Train call to add suggestions to the knowledgebase. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/alterations/read Download alterations from runtime. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/alterations/write Replace alterations data. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/endpointkeys/read Gets endpoint keys for an endpoint Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/endpointkeys/refreshkeys/action Re-generates an endpoint key. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/endpointsettings/read Gets endpoint settings for an endpoint Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/endpointsettings/write Update endpoint seettings for an endpoint. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/operations/read Gets details of a specific long running operation. NotDataActions "description": "Let's you create, edit, import and export a KB. You cannot publish or delete a KB.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/f4cc2bf9-21be-47a1-bdf1-5c5804381025", "name": "f4cc2bf9-21be-47a1-bdf1-5c5804381025", "permissions": [ "actions": [ "Microsoft.CognitiveServices/*/read", "Microsoft.Authorization/roleAssignments/read", "Microsoft.Authorization/roleDefinitions/read" "notActions": [], "dataActions": [ "Microsoft.CognitiveServices/accounts/QnAMaker/knowledgebases/read", "Microsoft.CognitiveServices/accounts/QnAMaker/knowledgebases/download/read", "Microsoft.CognitiveServices/accounts/QnAMaker/knowledgebases/create/write", "Microsoft.CognitiveServices/accounts/QnAMaker/knowledgebases/write", "Microsoft.CognitiveServices/accounts/QnAMaker/knowledgebases/generateanswer/action", "Microsoft.CognitiveServices/accounts/QnAMaker/knowledgebases/train/action", "Microsoft.CognitiveServices/accounts/QnAMaker/alterations/read", "Microsoft.CognitiveServices/accounts/QnAMaker/alterations/write", "Microsoft.CognitiveServices/accounts/QnAMaker/endpointkeys/read", "Microsoft.CognitiveServices/accounts/QnAMaker/endpointkeys/refreshkeys/action", "Microsoft.CognitiveServices/accounts/QnAMaker/endpointsettings/read", "Microsoft.CognitiveServices/accounts/QnAMaker/endpointsettings/write", "Microsoft.CognitiveServices/accounts/QnAMaker/operations/read", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/knowledgebases/read", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/knowledgebases/download/read", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/knowledgebases/create/write", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/knowledgebases/write", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/knowledgebases/generateanswer/action", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/knowledgebases/train/action", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/alterations/read", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/alterations/write", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/endpointkeys/read", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/endpointkeys/refreshkeys/action", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/endpointsettings/read", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/endpointsettings/write", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/operations/read", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/knowledgebases/read", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/knowledgebases/download/read", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/knowledgebases/create/write", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/knowledgebases/write", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/knowledgebases/generateanswer/action", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/knowledgebases/train/action", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/alterations/read", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/alterations/write", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/endpointkeys/read", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/endpointkeys/refreshkeys/action", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/endpointsettings/read", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/endpointsettings/write", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/operations/read" "notDataActions": [] "roleName": "Cognitive Services QnA Maker Editor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Let's you read and test a KB only. Learn more
Microsoft.CognitiveServices /accounts/QnAMaker/knowledgebases/read Gets List of Knowledgebases or details of a specific knowledgebaser. Microsoft.CognitiveServices /accounts/QnAMaker/knowledgebases/download/read Download the knowledgebase. Microsoft.CognitiveServices /accounts/QnAMaker/knowledgebases/generateanswer/action GenerateAnswer call to query the knowledgebase. Microsoft.CognitiveServices /accounts/QnAMaker/alterations/read Download alterations from runtime. Microsoft.CognitiveServices /accounts/QnAMaker/endpointkeys/read Gets endpoint keys for an endpoint Microsoft.CognitiveServices /accounts/QnAMaker/endpointsettings/read Gets endpoint settings for an endpoint Microsoft.CognitiveServices /accounts/QnAMaker.v2/knowledgebases/read Gets List of Knowledgebases or details of a specific knowledgebaser. Microsoft.CognitiveServices /accounts/QnAMaker.v2/knowledgebases/download/read Download the knowledgebase. Microsoft.CognitiveServices /accounts/QnAMaker.v2/knowledgebases/generateanswer/action GenerateAnswer call to query the knowledgebase. Microsoft.CognitiveServices /accounts/QnAMaker.v2/alterations/read Download alterations from runtime. Microsoft.CognitiveServices /accounts/QnAMaker.v2/endpointkeys/read Gets endpoint keys for an endpoint Microsoft.CognitiveServices /accounts/QnAMaker.v2/endpointsettings/read Gets endpoint settings for an endpoint Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/knowledgebases/read Gets List of Knowledgebases or details of a specific knowledgebaser. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/knowledgebases/download/read Download the knowledgebase. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/knowledgebases/generateanswer/action GenerateAnswer call to query the knowledgebase. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/alterations/read Download alterations from runtime. Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/endpointkeys/read Gets endpoint keys for an endpoint Microsoft.CognitiveServices /accounts/TextAnalytics/QnAMaker/endpointsettings/read Gets endpoint settings for an endpoint NotDataActions "description": "Let's you read and test a KB only.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/466ccd10-b268-4a11-b098-b4849f024126", "name": "466ccd10-b268-4a11-b098-b4849f024126", "permissions": [ "actions": [ "Microsoft.CognitiveServices/*/read", "Microsoft.Authorization/roleAssignments/read", "Microsoft.Authorization/roleDefinitions/read" "notActions": [], "dataActions": [ "Microsoft.CognitiveServices/accounts/QnAMaker/knowledgebases/read", "Microsoft.CognitiveServices/accounts/QnAMaker/knowledgebases/download/read", "Microsoft.CognitiveServices/accounts/QnAMaker/knowledgebases/generateanswer/action", "Microsoft.CognitiveServices/accounts/QnAMaker/alterations/read", "Microsoft.CognitiveServices/accounts/QnAMaker/endpointkeys/read", "Microsoft.CognitiveServices/accounts/QnAMaker/endpointsettings/read", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/knowledgebases/read", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/knowledgebases/download/read", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/knowledgebases/generateanswer/action", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/alterations/read", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/endpointkeys/read", "Microsoft.CognitiveServices/accounts/QnAMaker.v2/endpointsettings/read", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/knowledgebases/read", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/knowledgebases/download/read", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/knowledgebases/generateanswer/action", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/alterations/read", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/endpointkeys/read", "Microsoft.CognitiveServices/accounts/TextAnalytics/QnAMaker/endpointsettings/read" "notDataActions": [] "roleName": "Cognitive Services QnA Maker Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you read and list keys of Cognitive Services. Learn more
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/operations/read Gets or lists deployment operations. Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions Microsoft.CognitiveServices /* NotDataActions "description": "Lets you read and list keys of Cognitive Services.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/a97b65f3-24c7-4388-baec-2e87135dc908", "name": "a97b65f3-24c7-4388-baec-2e87135dc908", "permissions": [ "actions": [ "Microsoft.CognitiveServices/*/read", "Microsoft.CognitiveServices/accounts/listkeys/action", "Microsoft.Insights/alertRules/read", "Microsoft.Insights/diagnosticSettings/read", "Microsoft.Insights/logDefinitions/read", "Microsoft.Insights/metricdefinitions/read", "Microsoft.Insights/metrics/read", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/operations/read", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [ "Microsoft.CognitiveServices/*" "notDataActions": [] "roleName": "Cognitive Services User", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Gives you full access to management and content operations Learn more
Microsoft.DeviceUpdate /accounts/instances/updates/read Performs a read operation related to updates Microsoft.DeviceUpdate /accounts/instances/updates/write Performs a write operation related to updates Microsoft.DeviceUpdate /accounts/instances/updates/delete Performs a delete operation related to updates Microsoft.DeviceUpdate /accounts/instances/management/read Performs a read operation related to management Microsoft.DeviceUpdate /accounts/instances/management/write Performs a write operation related to management Microsoft.DeviceUpdate /accounts/instances/management/delete Performs a delete operation related to management NotDataActions "description": "Gives you full access to management and content operations", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/02ca0879-e8e4-47a5-a61e-5c618b76e64a", "name": "02ca0879-e8e4-47a5-a61e-5c618b76e64a", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Insights/alertRules/*" "notActions": [], "dataActions": [ "Microsoft.DeviceUpdate/accounts/instances/updates/read", "Microsoft.DeviceUpdate/accounts/instances/updates/write", "Microsoft.DeviceUpdate/accounts/instances/updates/delete", "Microsoft.DeviceUpdate/accounts/instances/management/read", "Microsoft.DeviceUpdate/accounts/instances/management/write", "Microsoft.DeviceUpdate/accounts/instances/management/delete" "notDataActions": [] "roleName": "Device Update Administrator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Gives you full access to content operations Learn more
Microsoft.DeviceUpdate /accounts/instances/updates/read Performs a read operation related to updates Microsoft.DeviceUpdate /accounts/instances/updates/write Performs a write operation related to updates Microsoft.DeviceUpdate /accounts/instances/updates/delete Performs a delete operation related to updates NotDataActions "description": "Gives you full access to content operations", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/0378884a-3af5-44ab-8323-f5b22f9f3c98", "name": "0378884a-3af5-44ab-8323-f5b22f9f3c98", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Insights/alertRules/*" "notActions": [], "dataActions": [ "Microsoft.DeviceUpdate/accounts/instances/updates/read", "Microsoft.DeviceUpdate/accounts/instances/updates/write", "Microsoft.DeviceUpdate/accounts/instances/updates/delete" "notDataActions": [] "roleName": "Device Update Content Administrator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Gives you read access to content operations, but does not allow making changes Learn more
Microsoft.DeviceUpdate /accounts/instances/updates/read Performs a read operation related to updates NotDataActions "description": "Gives you read access to content operations, but does not allow making changes", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/d1ee9a80-8b14-47f0-bdc2-f4a351625a7b", "name": "d1ee9a80-8b14-47f0-bdc2-f4a351625a7b", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Insights/alertRules/*" "notActions": [], "dataActions": [ "Microsoft.DeviceUpdate/accounts/instances/updates/read" "notDataActions": [] "roleName": "Device Update Content Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Gives you full access to management operations Learn more
Microsoft.DeviceUpdate /accounts/instances/management/read Performs a read operation related to management Microsoft.DeviceUpdate /accounts/instances/management/write Performs a write operation related to management Microsoft.DeviceUpdate /accounts/instances/management/delete Performs a delete operation related to management Microsoft.DeviceUpdate /accounts/instances/updates/read Performs a read operation related to updates NotDataActions "description": "Gives you full access to management operations", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/e4237640-0e3d-4a46-8fda-70bc94856432", "name": "e4237640-0e3d-4a46-8fda-70bc94856432", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Insights/alertRules/*" "notActions": [], "dataActions": [ "Microsoft.DeviceUpdate/accounts/instances/management/read", "Microsoft.DeviceUpdate/accounts/instances/management/write", "Microsoft.DeviceUpdate/accounts/instances/management/delete", "Microsoft.DeviceUpdate/accounts/instances/updates/read" "notDataActions": [] "roleName": "Device Update Deployments Administrator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Gives you read access to management operations, but does not allow making changes Learn more
Microsoft.DeviceUpdate /accounts/instances/management/read Performs a read operation related to management Microsoft.DeviceUpdate /accounts/instances/updates/read Performs a read operation related to updates NotDataActions "description": "Gives you read access to management operations, but does not allow making changes", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/49e2f5d2-7741-4835-8efa-19e1fe35e47f", "name": "49e2f5d2-7741-4835-8efa-19e1fe35e47f", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Insights/alertRules/*" "notActions": [], "dataActions": [ "Microsoft.DeviceUpdate/accounts/instances/management/read", "Microsoft.DeviceUpdate/accounts/instances/updates/read" "notDataActions": [] "roleName": "Device Update Deployments Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Gives you read access to management and content operations, but does not allow making changes Learn more
Microsoft.DeviceUpdate /accounts/instances/updates/read Performs a read operation related to updates Microsoft.DeviceUpdate /accounts/instances/management/read Performs a read operation related to management NotDataActions "description": "Gives you read access to management and content operations, but does not allow making changes", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/e9dba6fb-3d52-4cf0-bce3-f06ce71b9e0f", "name": "e9dba6fb-3d52-4cf0-bce3-f06ce71b9e0f", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Insights/alertRules/*" "notActions": [], "dataActions": [ "Microsoft.DeviceUpdate/accounts/instances/updates/read", "Microsoft.DeviceUpdate/accounts/instances/management/read" "notDataActions": [] "roleName": "Device Update Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for full access to IoT Hub data plane operations. Learn more
"description": "Allows for full access to IoT Hub data plane operations.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/4fc6c259-987e-4a07-842e-c321cc9d413f", "name": "4fc6c259-987e-4a07-842e-c321cc9d413f", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Devices/IotHubs/*" "notDataActions": [] "roleName": "IoT Hub Data Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for full read access to IoT Hub data-plane properties Learn more
Microsoft.Devices /IotHubs/fileUpload/notifications/action Receive, complete, or abandon file upload notifications NotDataActions "description": "Allows for full read access to IoT Hub data-plane properties", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/b447c946-2db7-41ec-983d-d8bf3b1c77e3", "name": "b447c946-2db7-41ec-983d-d8bf3b1c77e3", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Devices/IotHubs/*/read", "Microsoft.Devices/IotHubs/fileUpload/notifications/action" "notDataActions": [] "roleName": "IoT Hub Data Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for full access to IoT Hub device registry. Learn more
"description": "Allows for full access to IoT Hub device registry.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/4ea46cd5-c1b2-4a8e-910b-273211f9ce47", "name": "4ea46cd5-c1b2-4a8e-910b-273211f9ce47", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Devices/IotHubs/devices/*" "notDataActions": [] "roleName": "IoT Hub Registry Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for read and write access to all IoT Hub device and module twins. Learn more
"description": "Allows for read and write access to all IoT Hub device and module twins.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/494bdba2-168f-4f31-a0a1-191d2f7c028c", "name": "494bdba2-168f-4f31-a0a1-191d2f7c028c", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Devices/IotHubs/twins/*" "notDataActions": [] "roleName": "IoT Hub Twin Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Provides user with conversion, manage session, rendering and diagnostics capabilities for Azure Remote Rendering Learn more
Microsoft.MixedReality /RemoteRenderingAccounts/convert/read Get asset conversion properties Microsoft.MixedReality /RemoteRenderingAccounts/convert/delete Stop asset conversion Microsoft.MixedReality /RemoteRenderingAccounts/managesessions/read Get session properties Microsoft.MixedReality /RemoteRenderingAccounts/managesessions/action Start sessions Microsoft.MixedReality /RemoteRenderingAccounts/managesessions/delete Stop sessions Microsoft.MixedReality /RemoteRenderingAccounts/render/read Connect to a session Microsoft.MixedReality /RemoteRenderingAccounts/diagnostic/read Connect to the Remote Rendering inspector NotDataActions "description": "Provides user with conversion, manage session, rendering and diagnostics capabilities for Azure Remote Rendering", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/3df8b902-2a6f-47c7-8cc5-360e9b272a7e", "name": "3df8b902-2a6f-47c7-8cc5-360e9b272a7e", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.MixedReality/RemoteRenderingAccounts/convert/action", "Microsoft.MixedReality/RemoteRenderingAccounts/convert/read", "Microsoft.MixedReality/RemoteRenderingAccounts/convert/delete", "Microsoft.MixedReality/RemoteRenderingAccounts/managesessions/read", "Microsoft.MixedReality/RemoteRenderingAccounts/managesessions/action", "Microsoft.MixedReality/RemoteRenderingAccounts/managesessions/delete", "Microsoft.MixedReality/RemoteRenderingAccounts/render/read", "Microsoft.MixedReality/RemoteRenderingAccounts/diagnostic/read" "notDataActions": [] "roleName": "Remote Rendering Administrator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Provides user with manage session, rendering and diagnostics capabilities for Azure Remote Rendering. Learn more
Microsoft.MixedReality /RemoteRenderingAccounts/managesessions/read Get session properties Microsoft.MixedReality /RemoteRenderingAccounts/managesessions/action Start sessions Microsoft.MixedReality /RemoteRenderingAccounts/managesessions/delete Stop sessions Microsoft.MixedReality /RemoteRenderingAccounts/render/read Connect to a session Microsoft.MixedReality /RemoteRenderingAccounts/diagnostic/read Connect to the Remote Rendering inspector NotDataActions "description": "Provides user with manage session, rendering and diagnostics capabilities for Azure Remote Rendering.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/d39065c4-c120-43c9-ab0a-63eed9795f0a", "name": "d39065c4-c120-43c9-ab0a-63eed9795f0a", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.MixedReality/RemoteRenderingAccounts/managesessions/read", "Microsoft.MixedReality/RemoteRenderingAccounts/managesessions/action", "Microsoft.MixedReality/RemoteRenderingAccounts/managesessions/delete", "Microsoft.MixedReality/RemoteRenderingAccounts/render/read", "Microsoft.MixedReality/RemoteRenderingAccounts/diagnostic/read" "notDataActions": [] "roleName": "Remote Rendering Client", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage spatial anchors in your account, but not delete them Learn more
Microsoft.MixedReality /SpatialAnchorsAccounts/discovery/read Discover nearby spatial anchors Microsoft.MixedReality /SpatialAnchorsAccounts/properties/read Get properties of spatial anchors Microsoft.MixedReality /SpatialAnchorsAccounts/query/read Locate spatial anchors Microsoft.MixedReality /SpatialAnchorsAccounts/submitdiag/read Submit diagnostics data to help improve the quality of the Azure Spatial Anchors service Microsoft.MixedReality /SpatialAnchorsAccounts/write Update spatial anchors properties NotDataActions "description": "Lets you manage spatial anchors in your account, but not delete them", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/8bbe83f1-e2a6-4df7-8cb4-4e04d4e5c827", "name": "8bbe83f1-e2a6-4df7-8cb4-4e04d4e5c827", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.MixedReality/SpatialAnchorsAccounts/create/action", "Microsoft.MixedReality/SpatialAnchorsAccounts/discovery/read", "Microsoft.MixedReality/SpatialAnchorsAccounts/properties/read", "Microsoft.MixedReality/SpatialAnchorsAccounts/query/read", "Microsoft.MixedReality/SpatialAnchorsAccounts/submitdiag/read", "Microsoft.MixedReality/SpatialAnchorsAccounts/write" "notDataActions": [] "roleName": "Spatial Anchors Account Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage spatial anchors in your account, including deleting them Learn more
Microsoft.MixedReality /SpatialAnchorsAccounts/discovery/read Discover nearby spatial anchors Microsoft.MixedReality /SpatialAnchorsAccounts/properties/read Get properties of spatial anchors Microsoft.MixedReality /SpatialAnchorsAccounts/query/read Locate spatial anchors Microsoft.MixedReality /SpatialAnchorsAccounts/submitdiag/read Submit diagnostics data to help improve the quality of the Azure Spatial Anchors service Microsoft.MixedReality /SpatialAnchorsAccounts/write Update spatial anchors properties NotDataActions "description": "Lets you manage spatial anchors in your account, including deleting them", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/70bbe301-9835-447d-afdd-19eb3167307c", "name": "70bbe301-9835-447d-afdd-19eb3167307c", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.MixedReality/SpatialAnchorsAccounts/create/action", "Microsoft.MixedReality/SpatialAnchorsAccounts/delete", "Microsoft.MixedReality/SpatialAnchorsAccounts/discovery/read", "Microsoft.MixedReality/SpatialAnchorsAccounts/properties/read", "Microsoft.MixedReality/SpatialAnchorsAccounts/query/read", "Microsoft.MixedReality/SpatialAnchorsAccounts/submitdiag/read", "Microsoft.MixedReality/SpatialAnchorsAccounts/write" "notDataActions": [] "roleName": "Spatial Anchors Account Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you locate and read properties of spatial anchors in your account Learn more
Microsoft.MixedReality /SpatialAnchorsAccounts/discovery/read Discover nearby spatial anchors Microsoft.MixedReality /SpatialAnchorsAccounts/properties/read Get properties of spatial anchors Microsoft.MixedReality /SpatialAnchorsAccounts/query/read Locate spatial anchors Microsoft.MixedReality /SpatialAnchorsAccounts/submitdiag/read Submit diagnostics data to help improve the quality of the Azure Spatial Anchors service NotDataActions "description": "Lets you locate and read properties of spatial anchors in your account", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5d51204f-eb77-4b1c-b86a-2ec626c49413", "name": "5d51204f-eb77-4b1c-b86a-2ec626c49413", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.MixedReality/SpatialAnchorsAccounts/discovery/read", "Microsoft.MixedReality/SpatialAnchorsAccounts/properties/read", "Microsoft.MixedReality/SpatialAnchorsAccounts/query/read", "Microsoft.MixedReality/SpatialAnchorsAccounts/submitdiag/read" "notDataActions": [] "roleName": "Spatial Anchors Account Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can manage service and the APIs Learn more
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Can manage service and the APIs", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/312a565d-c81f-4fd8-895a-4e21e48d571c", "name": "312a565d-c81f-4fd8-895a-4e21e48d571c", "permissions": [ "actions": [ "Microsoft.ApiManagement/service/*", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "API Management Service Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can manage service but not the APIs Learn more
Microsoft.ApiManagement /service/backup/action Backup API Management Service to the specified container in a user provided storage account Microsoft.ApiManagement /service/delete Delete API Management Service instance Microsoft.ApiManagement /service/managedeployments/action Change SKU/units, add/remove regional deployments of API Management Service Microsoft.ApiManagement /service/read Read metadata for an API Management Service instance Microsoft.ApiManagement /service/restore/action Restore API Management Service from the specified container in a user provided storage account Microsoft.ApiManagement /service/updatecertificate/action Upload TLS/SSL certificate for an API Management Service Microsoft.ApiManagement /service/updatehostname/action Setup, update or remove custom domain names for an API Management Service Microsoft.ApiManagement /service/write Create or Update API Management Service instance Microsoft.Authorization /*/read Read roles and role assignments Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions Microsoft.ApiManagement /service/users/keys/read Get keys associated with user DataActions NotDataActions "description": "Can manage service but not the APIs", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/e022efe7-f5ba-4159-bbe4-b44f577e9b61", "name": "e022efe7-f5ba-4159-bbe4-b44f577e9b61", "permissions": [ "actions": [ "Microsoft.ApiManagement/service/*/read", "Microsoft.ApiManagement/service/backup/action", "Microsoft.ApiManagement/service/delete", "Microsoft.ApiManagement/service/managedeployments/action", "Microsoft.ApiManagement/service/read", "Microsoft.ApiManagement/service/restore/action", "Microsoft.ApiManagement/service/updatecertificate/action", "Microsoft.ApiManagement/service/updatehostname/action", "Microsoft.ApiManagement/service/write", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [ "Microsoft.ApiManagement/service/users/keys/read" "dataActions": [], "notDataActions": [] "roleName": "API Management Service Operator Role", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read-only access to service and APIs Learn more
Microsoft.ApiManagement /service/read Read metadata for an API Management Service instance Microsoft.Authorization /*/read Read roles and role assignments Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions Microsoft.ApiManagement /service/users/keys/read Get keys associated with user DataActions NotDataActions "description": "Read-only access to service and APIs", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/71522526-b88f-4d52-b57f-d31fc3546d0d", "name": "71522526-b88f-4d52-b57f-d31fc3546d0d", "permissions": [ "actions": [ "Microsoft.ApiManagement/service/*/read", "Microsoft.ApiManagement/service/read", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [ "Microsoft.ApiManagement/service/users/keys/read" "dataActions": [], "notDataActions": [] "roleName": "API Management Service Reader Role", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Has read access to tags and products and write access to allow: assigning APIs to products, assigning tags to products and APIs. This role should be assigned on the service scope. Learn more
Microsoft.ApiManagement /service/tags/read Lists a collection of tags defined within a service instance. or Gets the details of the tag specified by its identifier. Microsoft.ApiManagement /service/tags/apiLinks/* Microsoft.ApiManagement /service/tags/operationLinks/* Microsoft.ApiManagement /service/tags/productLinks/* Microsoft.ApiManagement /service/products/read Lists a collection of products in the specified service instance. or Gets the details of the product specified by its identifier. Microsoft.ApiManagement /service/products/apiLinks/* Microsoft.ApiManagement /service/read Read metadata for an API Management Service instance Microsoft.Authorization /*/read Read roles and role assignments NotActions DataActions NotDataActions "description": "Has read access to tags and products and write access to allow: assigning APIs to products, assigning tags to products and APIs. This role should be assigned on the service scope.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/9565a273-41b9-4368-97d2-aeb0c976a9b3", "name": "9565a273-41b9-4368-97d2-aeb0c976a9b3", "permissions": [ "actions": [ "Microsoft.ApiManagement/service/tags/read", "Microsoft.ApiManagement/service/tags/apiLinks/*", "Microsoft.ApiManagement/service/tags/operationLinks/*", "Microsoft.ApiManagement/service/tags/productLinks/*", "Microsoft.ApiManagement/service/products/read", "Microsoft.ApiManagement/service/products/apiLinks/*", "Microsoft.ApiManagement/service/read", "Microsoft.Authorization/*/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "API Management Service Workspace API Developer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Has the same access as API Management Service Workspace API Developer as well as read access to users and write access to allow assigning users to groups. This role should be assigned on the service scope. Learn more
Microsoft.ApiManagement /service/users/read Lists a collection of registered users in the specified service instance. or Gets the details of the user specified by its identifier. Microsoft.ApiManagement /service/tags/read Lists a collection of tags defined within a service instance. or Gets the details of the tag specified by its identifier. Microsoft.ApiManagement /service/tags/apiLinks/* Microsoft.ApiManagement /service/tags/operationLinks/* Microsoft.ApiManagement /service/tags/productLinks/* Microsoft.ApiManagement /service/products/read Lists a collection of products in the specified service instance. or Gets the details of the product specified by its identifier. Microsoft.ApiManagement /service/products/apiLinks/* Microsoft.ApiManagement /service/groups/users/* Microsoft.ApiManagement /service/read Read metadata for an API Management Service instance Microsoft.Authorization /*/read Read roles and role assignments NotActions DataActions NotDataActions "description": "Has the same access as API Management Service Workspace API Developer as well as read access to users and write access to allow assigning users to groups. This role should be assigned on the service scope.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/d59a3e9c-6d52-4a5a-aeed-6bf3cf0e31da", "name": "d59a3e9c-6d52-4a5a-aeed-6bf3cf0e31da", "permissions": [ "actions": [ "Microsoft.ApiManagement/service/users/read", "Microsoft.ApiManagement/service/tags/read", "Microsoft.ApiManagement/service/tags/apiLinks/*", "Microsoft.ApiManagement/service/tags/operationLinks/*", "Microsoft.ApiManagement/service/tags/productLinks/*", "Microsoft.ApiManagement/service/products/read", "Microsoft.ApiManagement/service/products/apiLinks/*", "Microsoft.ApiManagement/service/groups/users/*", "Microsoft.ApiManagement/service/read", "Microsoft.Authorization/*/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "API Management Service Workspace API Product Manager", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Has read access to entities in the workspace and read and write access to entities for editing APIs. This role should be assigned on the workspace scope. Learn more
"description": "Has read access to entities in the workspace and read and write access to entities for editing APIs. This role should be assigned on the workspace scope.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/56328988-075d-4c6a-8766-d93edd6725b6", "name": "56328988-075d-4c6a-8766-d93edd6725b6", "permissions": [ "actions": [ "Microsoft.ApiManagement/service/workspaces/*/read", "Microsoft.ApiManagement/service/workspaces/apis/*", "Microsoft.ApiManagement/service/workspaces/apiVersionSets/*", "Microsoft.ApiManagement/service/workspaces/policies/*", "Microsoft.ApiManagement/service/workspaces/schemas/*", "Microsoft.ApiManagement/service/workspaces/products/*", "Microsoft.ApiManagement/service/workspaces/policyFragments/*", "Microsoft.ApiManagement/service/workspaces/namedValues/*", "Microsoft.ApiManagement/service/workspaces/tags/*", "Microsoft.Authorization/*/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "API Management Workspace API Developer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Has read access to entities in the workspace and read and write access to entities for publishing APIs. This role should be assigned on the workspace scope. Learn more
"description": "Has read access to entities in the workspace and read and write access to entities for publishing APIs. This role should be assigned on the workspace scope.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/73c2c328-d004-4c5e-938c-35c6f5679a1f", "name": "73c2c328-d004-4c5e-938c-35c6f5679a1f", "permissions": [ "actions": [ "Microsoft.ApiManagement/service/workspaces/*/read", "Microsoft.ApiManagement/service/workspaces/products/*", "Microsoft.ApiManagement/service/workspaces/subscriptions/*", "Microsoft.ApiManagement/service/workspaces/groups/*", "Microsoft.ApiManagement/service/workspaces/tags/*", "Microsoft.ApiManagement/service/workspaces/notifications/*", "Microsoft.Authorization/*/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "API Management Workspace API Product Manager", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can manage the workspace and view, but not modify its members. This role should be assigned on the workspace scope. Learn more
"description": "Can manage the workspace and view, but not modify its members. This role should be assigned on the workspace scope.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/0c34c906-8d99-4cb7-8bb7-33f5b0a1a799", "name": "0c34c906-8d99-4cb7-8bb7-33f5b0a1a799", "permissions": [ "actions": [ "Microsoft.ApiManagement/service/workspaces/*", "Microsoft.Authorization/*/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "API Management Workspace Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Has read-only access to entities in the workspace. This role should be assigned on the workspace scope. Learn more
"description": "Has read-only access to entities in the workspace. This role should be assigned on the workspace scope.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/ef1c2c96-4a77-49e8-b9a4-6179fe1d2fd2", "name": "ef1c2c96-4a77-49e8-b9a4-6179fe1d2fd2", "permissions": [ "actions": [ "Microsoft.ApiManagement/service/workspaces/*/read", "Microsoft.Authorization/*/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "API Management Workspace Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows full access to App Configuration data. Learn more
"description": "Allows full access to App Configuration data.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5ae67dd6-50cb-40e7-96ff-dc2bfa4b606b", "name": "5ae67dd6-50cb-40e7-96ff-dc2bfa4b606b", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.AppConfiguration/configurationStores/*/read", "Microsoft.AppConfiguration/configurationStores/*/write", "Microsoft.AppConfiguration/configurationStores/*/delete", "Microsoft.AppConfiguration/configurationStores/*/action" "notDataActions": [] "roleName": "App Configuration Data Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows read access to App Configuration data. Learn more
"description": "Allows read access to App Configuration data.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/516239f1-63e1-4d78-a4de-a74fb236a071", "name": "516239f1-63e1-4d78-a4de-a74fb236a071", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.AppConfiguration/configurationStores/*/read" "notDataActions": [] "roleName": "App Configuration Data Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for listen access to Azure Relay resources.
"description": "Allows for listen access to Azure Relay resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/26e0b698-aa6d-4085-9386-aadae190014d", "name": "26e0b698-aa6d-4085-9386-aadae190014d", "permissions": [ "actions": [ "Microsoft.Relay/*/wcfRelays/read", "Microsoft.Relay/*/hybridConnections/read" "notActions": [], "dataActions": [ "Microsoft.Relay/*/listen/action" "notDataActions": [] "roleName": "Azure Relay Listener", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for full access to Azure Relay resources.
"description": "Allows for full access to Azure Relay resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/2787bf04-f1f5-4bfe-8383-c8a24483ee38", "name": "2787bf04-f1f5-4bfe-8383-c8a24483ee38", "permissions": [ "actions": [ "Microsoft.Relay/*" "notActions": [], "dataActions": [ "Microsoft.Relay/*" "notDataActions": [] "roleName": "Azure Relay Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for send access to Azure Relay resources.
"description": "Allows for send access to Azure Relay resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/26baccc8-eea7-41f1-98f4-1762cc7f685d", "name": "26baccc8-eea7-41f1-98f4-1762cc7f685d", "permissions": [ "actions": [ "Microsoft.Relay/*/wcfRelays/read", "Microsoft.Relay/*/hybridConnections/read" "notActions": [], "dataActions": [ "Microsoft.Relay/*/send/action" "notDataActions": [] "roleName": "Azure Relay Sender", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for full access to Azure Service Bus resources. Learn more
"description": "Allows for full access to Azure Service Bus resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/090c5cfd-751d-490a-894a-3ce6f1109419", "name": "090c5cfd-751d-490a-894a-3ce6f1109419", "permissions": [ "actions": [ "Microsoft.ServiceBus/*" "notActions": [], "dataActions": [ "Microsoft.ServiceBus/*" "notDataActions": [] "roleName": "Azure Service Bus Data Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for receive access to Azure Service Bus resources. Learn more
"description": "Allows for receive access to Azure Service Bus resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/4f6d3b9b-027b-4f4c-9142-0e5a2a2247e0", "name": "4f6d3b9b-027b-4f4c-9142-0e5a2a2247e0", "permissions": [ "actions": [ "Microsoft.ServiceBus/*/queues/read", "Microsoft.ServiceBus/*/topics/read", "Microsoft.ServiceBus/*/topics/subscriptions/read" "notActions": [], "dataActions": [ "Microsoft.ServiceBus/*/receive/action" "notDataActions": [] "roleName": "Azure Service Bus Data Receiver", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for send access to Azure Service Bus resources. Learn more
"description": "Allows for send access to Azure Service Bus resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/69a216fc-b8fb-44d8-bc22-1f3c2cd27a39", "name": "69a216fc-b8fb-44d8-bc22-1f3c2cd27a39", "permissions": [ "actions": [ "Microsoft.ServiceBus/*/queues/read", "Microsoft.ServiceBus/*/topics/read", "Microsoft.ServiceBus/*/topics/subscriptions/read" "notActions": [], "dataActions": [ "Microsoft.ServiceBus/*/send/action" "notDataActions": [] "roleName": "Azure Service Bus Data Sender", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage Azure Stack registrations.
Microsoft.AzureStack /registrations/products/read Gets the properties of an Azure Stack Marketplace product Microsoft.AzureStack /registrations/read Gets the properties of an Azure Stack registration NotActions DataActions NotDataActions "description": "Lets you manage Azure Stack registrations.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/6f12a6df-dd06-4f3e-bcb1-ce8be600526a", "name": "6f12a6df-dd06-4f3e-bcb1-ce8be600526a", "permissions": [ "actions": [ "Microsoft.AzureStack/edgeSubscriptions/read", "Microsoft.AzureStack/registrations/products/*/action", "Microsoft.AzureStack/registrations/products/read", "Microsoft.AzureStack/registrations/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Azure Stack Registration Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage EventGrid operations.
"description": "Lets you manage EventGrid operations.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/1e241071-0855-49ea-94dc-649edcd759de", "name": "1e241071-0855-49ea-94dc-649edcd759de", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.EventGrid/*", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "EventGrid Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows send access to event grid events.
"description": "Allows send access to event grid events.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/d5a91429-5739-47e2-a06b-3470a27159e7", "name": "d5a91429-5739-47e2-a06b-3470a27159e7", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.EventGrid/topics/read", "Microsoft.EventGrid/domains/read", "Microsoft.EventGrid/partnerNamespaces/read", "Microsoft.Resources/subscriptions/resourceGroups/read" "notActions": [], "dataActions": [ "Microsoft.EventGrid/events/send/action" "notDataActions": [] "roleName": "EventGrid Data Sender", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage EventGrid event subscription operations. Learn more
Microsoft.EventGrid /topicTypes/eventSubscriptions/read List global event subscriptions by topic type Microsoft.EventGrid /locations/eventSubscriptions/read List regional event subscriptions Microsoft.EventGrid /locations/topicTypes/eventSubscriptions/read List regional event subscriptions by topictype Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage EventGrid event subscription operations.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/428e0ff0-5e57-4d9c-a221-2c70d0e0a443", "name": "428e0ff0-5e57-4d9c-a221-2c70d0e0a443", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.EventGrid/eventSubscriptions/*", "Microsoft.EventGrid/topicTypes/eventSubscriptions/read", "Microsoft.EventGrid/locations/eventSubscriptions/read", "Microsoft.EventGrid/locations/topicTypes/eventSubscriptions/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "EventGrid EventSubscription Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you read EventGrid event subscriptions. Learn more
Microsoft.EventGrid /topicTypes/eventSubscriptions/read List global event subscriptions by topic type Microsoft.EventGrid /locations/eventSubscriptions/read List regional event subscriptions Microsoft.EventGrid /locations/topicTypes/eventSubscriptions/read List regional event subscriptions by topictype Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. NotActions DataActions NotDataActions "description": "Lets you read EventGrid event subscriptions.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/2414bbcf-6497-4faf-8c65-045460748405", "name": "2414bbcf-6497-4faf-8c65-045460748405", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.EventGrid/eventSubscriptions/read", "Microsoft.EventGrid/topicTypes/eventSubscriptions/read", "Microsoft.EventGrid/locations/eventSubscriptions/read", "Microsoft.EventGrid/locations/topicTypes/eventSubscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "EventGrid EventSubscription Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Role allows user or principal full access to FHIR Data Learn more
"description": "Role allows user or principal full access to FHIR Data", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5a1fc7df-4bf1-4951-a576-89034ee01acd", "name": "5a1fc7df-4bf1-4951-a576-89034ee01acd", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.HealthcareApis/services/fhir/resources/*", "Microsoft.HealthcareApis/workspaces/fhirservices/resources/*" "notDataActions": [] "roleName": "FHIR Data Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Role allows user or principal to read and export FHIR Data Learn more
Microsoft.HealthcareApis/services/fhir/resources/read Read FHIR resources (includes searching and versioned history). Microsoft.HealthcareApis/services/fhir/resources/export/action Export operation ($export). Microsoft.HealthcareApis/workspaces/fhirservices/resources/read Read FHIR resources (includes searching and versioned history). Microsoft.HealthcareApis/workspaces/fhirservices/resources/export/action Export operation ($export). NotDataActions "description": "Role allows user or principal to read and export FHIR Data", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/3db33094-8700-4567-8da5-1501d4e7e843", "name": "3db33094-8700-4567-8da5-1501d4e7e843", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.HealthcareApis/services/fhir/resources/read", "Microsoft.HealthcareApis/services/fhir/resources/export/action", "Microsoft.HealthcareApis/workspaces/fhirservices/resources/read", "Microsoft.HealthcareApis/workspaces/fhirservices/resources/export/action" "notDataActions": [] "roleName": "FHIR Data Exporter", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Role allows user or principal to read FHIR Data Learn more
Microsoft.HealthcareApis/services/fhir/resources/read Read FHIR resources (includes searching and versioned history). Microsoft.HealthcareApis/workspaces/fhirservices/resources/read Read FHIR resources (includes searching and versioned history). NotDataActions "description": "Role allows user or principal to read FHIR Data", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/4c8d0bbc-75d3-4935-991f-5f3c56d81508", "name": "4c8d0bbc-75d3-4935-991f-5f3c56d81508", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.HealthcareApis/services/fhir/resources/read", "Microsoft.HealthcareApis/workspaces/fhirservices/resources/read" "notDataActions": [] "roleName": "FHIR Data Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Role allows user or principal to read and write FHIR Data Learn more
Microsoft.HealthcareApis/services/fhir/resources/hardDelete/action Hard Delete (including version history). Microsoft.HealthcareApis/workspaces/fhirservices/resources/hardDelete/action Hard Delete (including version history). "description": "Role allows user or principal to read and write FHIR Data", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/3f88fce4-5892-4214-ae73-ba5294559913", "name": "3f88fce4-5892-4214-ae73-ba5294559913", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.HealthcareApis/services/fhir/resources/*", "Microsoft.HealthcareApis/workspaces/fhirservices/resources/*" "notDataActions": [ "Microsoft.HealthcareApis/services/fhir/resources/hardDelete/action", "Microsoft.HealthcareApis/workspaces/fhirservices/resources/hardDelete/action" "roleName": "FHIR Data Writer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage integration service environments, but not access to them. Learn more
"description": "Lets you manage integration service environments, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/a41e2c5b-bd99-4a07-88f4-9bf657a760b8", "name": "a41e2c5b-bd99-4a07-88f4-9bf657a760b8", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Support/*", "Microsoft.Logic/integrationServiceEnvironments/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Integration Service Environment Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows developers to create and update workflows, integration accounts and API connections in integration service environments. Learn more
Microsoft.Logic /integrationServiceEnvironments/read Reads the integration service environment. Microsoft.Logic /integrationServiceEnvironments/*/join/action NotActions DataActions NotDataActions "description": "Allows developers to create and update workflows, integration accounts and API connections in integration service environments.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/c7aa55d3-1abb-444a-a5ca-5e51e485d6ec", "name": "c7aa55d3-1abb-444a-a5ca-5e51e485d6ec", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Support/*", "Microsoft.Logic/integrationServiceEnvironments/read", "Microsoft.Logic/integrationServiceEnvironments/*/join/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Integration Service Environment Developer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage Intelligent Systems accounts, but not access to them.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage Intelligent Systems accounts, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/03a6d094-3444-4b3d-88af-7477090a9e5e", "name": "03a6d094-3444-4b3d-88af-7477090a9e5e", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.IntelligentSystems/accounts/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Intelligent Systems Account Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage logic apps, but not change access to them. Learn more
Microsoft.ClassicStorage /storageAccounts/listKeys/action Lists the access keys for the storage accounts. Microsoft.ClassicStorage /storageAccounts/read Return the storage account with the given account. Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Insights /metricAlerts/* Microsoft.Insights /diagnosticSettings/* Creates, updates, or reads the diagnostic setting for Analysis Server Microsoft.Insights /logdefinitions/* This permission is necessary for users who need access to Activity Logs via the portal. List log categories in Activity Log. Microsoft.Insights /metricDefinitions/* Read metric definitions (list of available metric types for a resource). Microsoft.Logic /* Manages Logic Apps resources. Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Storage /storageAccounts/listkeys/action Returns the access keys for the specified storage account. Microsoft.Storage /storageAccounts/read Returns the list of storage accounts or gets the properties for the specified storage account. Microsoft.Support /* Create and update a support ticket Microsoft.Web /connectionGateways/* Create and manages a Connection Gateway. Microsoft.Web /connections/* Create and manages a Connection. Microsoft.Web /customApis/* Creates and manages a Custom API. Microsoft.Web /serverFarms/join/action Joins an App Service Plan Microsoft.Web /serverFarms/read Get the properties on an App Service Plan Microsoft.Web /sites/functions/listSecrets/action List Function secrets. NotActions DataActions NotDataActions "description": "Lets you manage logic app, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/87a39d53-fc1b-424a-814c-f7e04687dc9e", "name": "87a39d53-fc1b-424a-814c-f7e04687dc9e", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.ClassicStorage/storageAccounts/listKeys/action", "Microsoft.ClassicStorage/storageAccounts/read", "Microsoft.Insights/alertRules/*", "Microsoft.Insights/metricAlerts/*", "Microsoft.Insights/diagnosticSettings/*", "Microsoft.Insights/logdefinitions/*", "Microsoft.Insights/metricDefinitions/*", "Microsoft.Logic/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Storage/storageAccounts/listkeys/action", "Microsoft.Storage/storageAccounts/read", "Microsoft.Support/*", "Microsoft.Web/connectionGateways/*", "Microsoft.Web/connections/*", "Microsoft.Web/customApis/*", "Microsoft.Web/serverFarms/join/action", "Microsoft.Web/serverFarms/read", "Microsoft.Web/sites/functions/listSecrets/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Logic App Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you read, enable, and disable logic apps, but not edit or update them. Learn more
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket Microsoft.Web /connectionGateways/*/read Read Connection Gateways. Microsoft.Web /connections/*/read Read Connections. Microsoft.Web /customApis/*/read Read Custom API. Microsoft.Web /serverFarms/read Get the properties on an App Service Plan NotActions DataActions NotDataActions "description": "Lets you read, enable and disable logic app.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/515c2055-d9d4-4321-b1b9-bd0c9a0f79fe", "name": "515c2055-d9d4-4321-b1b9-bd0c9a0f79fe", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*/read", "Microsoft.Insights/metricAlerts/*/read", "Microsoft.Insights/diagnosticSettings/*/read", "Microsoft.Insights/metricDefinitions/*/read", "Microsoft.Logic/*/read", "Microsoft.Logic/workflows/disable/action", "Microsoft.Logic/workflows/enable/action", "Microsoft.Logic/workflows/validate/action", "Microsoft.Resources/deployments/operations/read", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Web/connectionGateways/*/read", "Microsoft.Web/connections/*/read", "Microsoft.Web/customApis/*/read", "Microsoft.Web/serverFarms/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Logic App Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can manage Azure AD Domain Services and related network configurations Learn more
Microsoft.Resources /deployments/operationstatuses/read Gets or lists deployment operation statuses. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Insights /AlertRules/Write Create or update a classic metric alert Microsoft.Insights /AlertRules/Delete Delete a classic metric alert Microsoft.Insights /AlertRules/Read Read a classic metric alert Microsoft.Insights /AlertRules/Activated/Action Classic metric alert activated Microsoft.Insights /AlertRules/Resolved/Action Classic metric alert resolved Microsoft.Insights /AlertRules/Throttled/Action Classic metric alert rule throttled Microsoft.Insights /AlertRules/Incidents/Read Read a classic metric alert incident Microsoft.Insights /Logs/Read Reading data from all your logs Microsoft.Insights /Metrics/Read Read metrics Microsoft.Insights /DiagnosticSettings/* Creates, updates, or reads the diagnostic setting for Analysis Server Microsoft.Insights /DiagnosticSettingsCategories/Read Read diagnostic settings categories Microsoft.AAD /register/action Register Domain Service Microsoft.AAD /unregister/action Unregister Domain Service Microsoft.AAD /domainServices/* Microsoft.Network /register/action Registers the subscription Microsoft.Network /unregister/action Unregisters the subscription Microsoft.Network /virtualNetworks/read Get the virtual network definition Microsoft.Network /virtualNetworks/write Creates a virtual network or updates an existing virtual network Microsoft.Network /virtualNetworks/delete Deletes a virtual network Microsoft.Network /virtualNetworks/peer/action Peers a virtual network with another virtual network Microsoft.Network /virtualNetworks/join/action Joins a virtual network. Not Alertable. Microsoft.Network /virtualNetworks/subnets/read Gets a virtual network subnet definition Microsoft.Network /virtualNetworks/subnets/write Creates a virtual network subnet or updates an existing virtual network subnet Microsoft.Network /virtualNetworks/subnets/delete Deletes a virtual network subnet Microsoft.Network /virtualNetworks/subnets/join/action Joins a virtual network. Not Alertable. Microsoft.Network /virtualNetworks/virtualNetworkPeerings/read Gets a virtual network peering definition Microsoft.Network /virtualNetworks/virtualNetworkPeerings/write Creates a virtual network peering or updates an existing virtual network peering Microsoft.Network /virtualNetworks/virtualNetworkPeerings/delete Deletes a virtual network peering Microsoft.Network /virtualNetworks/providers/Microsoft.Insights/diagnosticSettings/read Get the diagnostic settings of Virtual Network Microsoft.Network /virtualNetworks/providers/Microsoft.Insights/metricDefinitions/read Gets available metrics for the PingMesh Microsoft.Network /azureFirewalls/read Get Azure Firewall Microsoft.Network /ddosProtectionPlans/read Gets a DDoS Protection Plan Microsoft.Network /ddosProtectionPlans/join/action Joins a DDoS Protection Plan. Not alertable. Microsoft.Network /loadBalancers/read Gets a load balancer definition Microsoft.Network /loadBalancers/delete Deletes a load balancer Microsoft.Network /loadBalancers/*/read Microsoft.Network /loadBalancers/backendAddressPools/join/action Joins a load balancer backend address pool. Not Alertable. Microsoft.Network /loadBalancers/inboundNatRules/join/action Joins a load balancer inbound nat rule. Not Alertable. Microsoft.Network /natGateways/join/action Joins a NAT Gateway Microsoft.Network /networkInterfaces/read Gets a network interface definition. Microsoft.Network /networkInterfaces/write Creates a network interface or updates an existing network interface. Microsoft.Network /networkInterfaces/delete Deletes a network interface Microsoft.Network /networkInterfaces/join/action Joins a Virtual Machine to a network interface. Not Alertable. Microsoft.Network /networkSecurityGroups/defaultSecurityRules/read Gets a default security rule definition Microsoft.Network /networkSecurityGroups/read Gets a network security group definition Microsoft.Network /networkSecurityGroups/write Creates a network security group or updates an existing network security group Microsoft.Network /networkSecurityGroups/delete Deletes a network security group Microsoft.Network /networkSecurityGroups/join/action Joins a network security group. Not Alertable. Microsoft.Network /networkSecurityGroups/securityRules/read Gets a security rule definition Microsoft.Network /networkSecurityGroups/securityRules/write Creates a security rule or updates an existing security rule Microsoft.Network /networkSecurityGroups/securityRules/delete Deletes a security rule Microsoft.Network /routeTables/read Gets a route table definition Microsoft.Network /routeTables/write Creates a route table or Updates an existing route table Microsoft.Network /routeTables/delete Deletes a route table definition Microsoft.Network /routeTables/join/action Joins a route table. Not Alertable. Microsoft.Network /routeTables/routes/read Gets a route definition Microsoft.Network /routeTables/routes/write Creates a route or Updates an existing route Microsoft.Network /routeTables/routes/delete Deletes a route definition NotActions DataActions NotDataActions "description": "Can manage Azure AD Domain Services and related network configurations", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/eeaeda52-9324-47f6-8069-5d5bade478b2", "name": "eeaeda52-9324-47f6-8069-5d5bade478b2", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/read", "Microsoft.Resources/deployments/write", "Microsoft.Resources/deployments/delete", "Microsoft.Resources/deployments/cancel/action", "Microsoft.Resources/deployments/validate/action", "Microsoft.Resources/deployments/whatIf/action", "Microsoft.Resources/deployments/exportTemplate/action", "Microsoft.Resources/deployments/operations/read", "Microsoft.Resources/deployments/operationstatuses/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Insights/AlertRules/Write", "Microsoft.Insights/AlertRules/Delete", "Microsoft.Insights/AlertRules/Read", "Microsoft.Insights/AlertRules/Activated/Action", "Microsoft.Insights/AlertRules/Resolved/Action", "Microsoft.Insights/AlertRules/Throttled/Action", "Microsoft.Insights/AlertRules/Incidents/Read", "Microsoft.Insights/Logs/Read", "Microsoft.Insights/Metrics/Read", "Microsoft.Insights/DiagnosticSettings/*", "Microsoft.Insights/DiagnosticSettingsCategories/Read", "Microsoft.AAD/register/action", "Microsoft.AAD/unregister/action", "Microsoft.AAD/domainServices/*", "Microsoft.Network/register/action", "Microsoft.Network/unregister/action", "Microsoft.Network/virtualNetworks/read", "Microsoft.Network/virtualNetworks/write", "Microsoft.Network/virtualNetworks/delete", "Microsoft.Network/virtualNetworks/peer/action", "Microsoft.Network/virtualNetworks/join/action", "Microsoft.Network/virtualNetworks/subnets/read", "Microsoft.Network/virtualNetworks/subnets/write", "Microsoft.Network/virtualNetworks/subnets/delete", "Microsoft.Network/virtualNetworks/subnets/join/action", "Microsoft.Network/virtualNetworks/virtualNetworkPeerings/read", "Microsoft.Network/virtualNetworks/virtualNetworkPeerings/write", "Microsoft.Network/virtualNetworks/virtualNetworkPeerings/delete", "Microsoft.Network/virtualNetworks/providers/Microsoft.Insights/diagnosticSettings/read", "Microsoft.Network/virtualNetworks/providers/Microsoft.Insights/metricDefinitions/read", "Microsoft.Network/azureFirewalls/read", "Microsoft.Network/ddosProtectionPlans/read", "Microsoft.Network/ddosProtectionPlans/join/action", "Microsoft.Network/loadBalancers/read", "Microsoft.Network/loadBalancers/delete", "Microsoft.Network/loadBalancers/*/read", "Microsoft.Network/loadBalancers/backendAddressPools/join/action", "Microsoft.Network/loadBalancers/inboundNatRules/join/action", "Microsoft.Network/natGateways/join/action", "Microsoft.Network/networkInterfaces/read", "Microsoft.Network/networkInterfaces/write", "Microsoft.Network/networkInterfaces/delete", "Microsoft.Network/networkInterfaces/join/action", "Microsoft.Network/networkSecurityGroups/defaultSecurityRules/read", "Microsoft.Network/networkSecurityGroups/read", "Microsoft.Network/networkSecurityGroups/write", "Microsoft.Network/networkSecurityGroups/delete", "Microsoft.Network/networkSecurityGroups/join/action", "Microsoft.Network/networkSecurityGroups/securityRules/read", "Microsoft.Network/networkSecurityGroups/securityRules/write", "Microsoft.Network/networkSecurityGroups/securityRules/delete", "Microsoft.Network/routeTables/read", "Microsoft.Network/routeTables/write", "Microsoft.Network/routeTables/delete", "Microsoft.Network/routeTables/join/action", "Microsoft.Network/routeTables/routes/read", "Microsoft.Network/routeTables/routes/write", "Microsoft.Network/routeTables/routes/delete" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Domain Services Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can view Azure AD Domain Services and related network configurations
Microsoft.Resources /deployments/operationstatuses/read Gets or lists deployment operation statuses. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Insights /AlertRules/Read Read a classic metric alert Microsoft.Insights /AlertRules/Incidents/Read Read a classic metric alert incident Microsoft.Insights /Logs/Read Reading data from all your logs Microsoft.Insights /Metrics/read Read metrics Microsoft.Insights /DiagnosticSettings/read Read a resource diagnostic setting Microsoft.Insights /DiagnosticSettingsCategories/Read Read diagnostic settings categories Microsoft.AAD /domainServices/*/read Microsoft.Network /virtualNetworks/read Get the virtual network definition Microsoft.Network /virtualNetworks/subnets/read Gets a virtual network subnet definition Microsoft.Network /virtualNetworks/virtualNetworkPeerings/read Gets a virtual network peering definition Microsoft.Network /virtualNetworks/providers/Microsoft.Insights/diagnosticSettings/read Get the diagnostic settings of Virtual Network Microsoft.Network /virtualNetworks/providers/Microsoft.Insights/metricDefinitions/read Gets available metrics for the PingMesh Microsoft.Network /azureFirewalls/read Get Azure Firewall Microsoft.Network /ddosProtectionPlans/read Gets a DDoS Protection Plan Microsoft.Network /loadBalancers/read Gets a load balancer definition Microsoft.Network /loadBalancers/*/read Microsoft.Network /natGateways/read Gets a Nat Gateway Definition Microsoft.Network /networkInterfaces/read Gets a network interface definition. Microsoft.Network /networkSecurityGroups/defaultSecurityRules/read Gets a default security rule definition Microsoft.Network /networkSecurityGroups/read Gets a network security group definition Microsoft.Network /networkSecurityGroups/securityRules/read Gets a security rule definition Microsoft.Network /routeTables/read Gets a route table definition Microsoft.Network /routeTables/routes/read Gets a route definition NotActions DataActions NotDataActions "description": "Can view Azure AD Domain Services and related network configurations", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/361898ef-9ed1-48c2-849c-a832951106bb", "name": "361898ef-9ed1-48c2-849c-a832951106bb", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/read", "Microsoft.Resources/deployments/operations/read", "Microsoft.Resources/deployments/operationstatuses/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Insights/AlertRules/Read", "Microsoft.Insights/AlertRules/Incidents/Read", "Microsoft.Insights/Logs/Read", "Microsoft.Insights/Metrics/read", "Microsoft.Insights/DiagnosticSettings/read", "Microsoft.Insights/DiagnosticSettingsCategories/Read", "Microsoft.AAD/domainServices/*/read", "Microsoft.Network/virtualNetworks/read", "Microsoft.Network/virtualNetworks/subnets/read", "Microsoft.Network/virtualNetworks/virtualNetworkPeerings/read", "Microsoft.Network/virtualNetworks/providers/Microsoft.Insights/diagnosticSettings/read", "Microsoft.Network/virtualNetworks/providers/Microsoft.Insights/metricDefinitions/read", "Microsoft.Network/azureFirewalls/read", "Microsoft.Network/ddosProtectionPlans/read", "Microsoft.Network/loadBalancers/read", "Microsoft.Network/loadBalancers/*/read", "Microsoft.Network/natGateways/read", "Microsoft.Network/networkInterfaces/read", "Microsoft.Network/networkSecurityGroups/defaultSecurityRules/read", "Microsoft.Network/networkSecurityGroups/read", "Microsoft.Network/networkSecurityGroups/securityRules/read", "Microsoft.Network/routeTables/read", "Microsoft.Network/routeTables/routes/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Domain Services Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Create, Read, Update, and Delete User Assigned Identity Learn more
Microsoft.ManagedIdentity /userAssignedIdentities/read Gets an existing user assigned identity Microsoft.ManagedIdentity /userAssignedIdentities/write Creates a new user assigned identity or updates the tags associated with an existing user assigned identity Microsoft.ManagedIdentity /userAssignedIdentities/delete Deletes an existing user assigned identity Microsoft.Authorization /*/read Read roles and role assignments Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Create, Read, Update, and Delete User Assigned Identity", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/e40ec5ca-96e0-45a2-b4ff-59039f2c2b59", "name": "e40ec5ca-96e0-45a2-b4ff-59039f2c2b59", "permissions": [ "actions": [ "Microsoft.ManagedIdentity/userAssignedIdentities/read", "Microsoft.ManagedIdentity/userAssignedIdentities/write", "Microsoft.ManagedIdentity/userAssignedIdentities/delete", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Managed Identity Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read and Assign User Assigned Identity Learn more
"description": "Read and Assign User Assigned Identity", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/f1a07417-d97a-45cb-824c-7a7467783830", "name": "f1a07417-d97a-45cb-824c-7a7467783830", "permissions": [ "actions": [ "Microsoft.ManagedIdentity/userAssignedIdentities/*/read", "Microsoft.ManagedIdentity/userAssignedIdentities/*/assign/action", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Managed Identity Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can read write or delete the attestation provider instance Learn more
"description": "Can read write or delete the attestation provider instance", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/bbf86eb8-f7b4-4cce-96e4-18cddf81d86e", "name": "bbf86eb8-f7b4-4cce-96e4-18cddf81d86e", "permissions": [ "actions": [ "Microsoft.Attestation/attestationProviders/attestation/read", "Microsoft.Attestation/attestationProviders/attestation/write", "Microsoft.Attestation/attestationProviders/attestation/delete" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Attestation Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can read the attestation provider properties Learn more
"description": "Can read the attestation provider properties", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/fd1bd22b-8476-40bc-a0bc-69b95687b9f3", "name": "fd1bd22b-8476-40bc-a0bc-69b95687b9f3", "permissions": [ "actions": [ "Microsoft.Attestation/attestationProviders/attestation/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Attestation Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Perform all data plane operations on a key vault and all objects in it, including certificates, keys, and secrets. Cannot manage key vault resources or manage role assignments. Only works for key vaults that use the 'Azure role-based access control' permission model. Learn more
Microsoft.KeyVault /checkNameAvailability/read Checks that a key vault name is valid and is not in use Microsoft.KeyVault /deletedVaults/read View the properties of soft deleted key vaults Microsoft.KeyVault /locations/*/read Microsoft.KeyVault /vaults/*/read Microsoft.KeyVault /operations/read Lists operations available on Microsoft.KeyVault resource provider NotActions DataActions Microsoft.KeyVault /vaults/* NotDataActions "description": "Perform all data plane operations on a key vault and all objects in it, including certificates, keys, and secrets. Cannot manage key vault resources or manage role assignments. Only works for key vaults that use the 'Azure role-based access control' permission model.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/00482a5a-887f-4fb3-b363-3b7fe8e74483", "name": "00482a5a-887f-4fb3-b363-3b7fe8e74483", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.KeyVault/checkNameAvailability/read", "Microsoft.KeyVault/deletedVaults/read", "Microsoft.KeyVault/locations/*/read", "Microsoft.KeyVault/vaults/*/read", "Microsoft.KeyVault/operations/read" "notActions": [], "dataActions": [ "Microsoft.KeyVault/vaults/*" "notDataActions": [] "roleName": "Key Vault Administrator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Perform any action on the certificates of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model. Learn more
Microsoft.KeyVault /checkNameAvailability/read Checks that a key vault name is valid and is not in use Microsoft.KeyVault /deletedVaults/read View the properties of soft deleted key vaults Microsoft.KeyVault /locations/*/read Microsoft.KeyVault /vaults/*/read Microsoft.KeyVault /operations/read Lists operations available on Microsoft.KeyVault resource provider NotActions DataActions Microsoft.KeyVault /vaults/certificatecas/* Microsoft.KeyVault /vaults/certificates/* NotDataActions "description": "Perform any action on the certificates of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/a4417e6f-fecd-4de8-b567-7b0420556985", "name": "a4417e6f-fecd-4de8-b567-7b0420556985", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.KeyVault/checkNameAvailability/read", "Microsoft.KeyVault/deletedVaults/read", "Microsoft.KeyVault/locations/*/read", "Microsoft.KeyVault/vaults/*/read", "Microsoft.KeyVault/operations/read" "notActions": [], "dataActions": [ "Microsoft.KeyVault/vaults/certificatecas/*", "Microsoft.KeyVault/vaults/certificates/*" "notDataActions": [] "roleName": "Key Vault Certificates Officer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Manage key vaults, but does not allow you to assign roles in Azure RBAC, and does not allow you to access secrets, keys, or certificates. Learn more
"description": "Lets you manage key vaults, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/f25e0fa2-a7c8-4377-a976-54943a77a395", "name": "f25e0fa2-a7c8-4377-a976-54943a77a395", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.KeyVault/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [ "Microsoft.KeyVault/locations/deletedVaults/purge/action", "Microsoft.KeyVault/hsmPools/*", "Microsoft.KeyVault/managedHsms/*" "dataActions": [], "notDataActions": [] "roleName": "Key Vault Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Perform any action on the keys of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model. Learn more
Microsoft.KeyVault /checkNameAvailability/read Checks that a key vault name is valid and is not in use Microsoft.KeyVault /deletedVaults/read View the properties of soft deleted key vaults Microsoft.KeyVault /locations/*/read Microsoft.KeyVault /vaults/*/read Microsoft.KeyVault /operations/read Lists operations available on Microsoft.KeyVault resource provider NotActions DataActions Microsoft.KeyVault /vaults/keys/* Microsoft.KeyVault /vaults/keyrotationpolicies/* NotDataActions "description": "Perform any action on the keys of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/14b46e9e-c2b7-41b4-b07b-48a6ebf60603", "name": "14b46e9e-c2b7-41b4-b07b-48a6ebf60603", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.KeyVault/checkNameAvailability/read", "Microsoft.KeyVault/deletedVaults/read", "Microsoft.KeyVault/locations/*/read", "Microsoft.KeyVault/vaults/*/read", "Microsoft.KeyVault/operations/read" "notActions": [], "dataActions": [ "Microsoft.KeyVault/vaults/keys/*", "Microsoft.KeyVault/vaults/keyrotationpolicies/*" "notDataActions": [] "roleName": "Key Vault Crypto Officer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read metadata of keys and perform wrap/unwrap operations. Only works for key vaults that use the 'Azure role-based access control' permission model. Learn more
Microsoft.KeyVault /vaults/keys/read List keys in the specified vault, or read properties and public material of a key. For asymmetric keys, this operation exposes public key and includes ability to perform public key algorithms such as encrypt and verify signature. Private keys and symmetric keys are never exposed. Microsoft.KeyVault /vaults/keys/wrap/action Wraps a symmetric key with a Key Vault key. Note that if the Key Vault key is asymmetric, this operation can be performed by principals with read access. Microsoft.KeyVault /vaults/keys/unwrap/action Unwraps a symmetric key with a Key Vault key. NotDataActions "description": "Read metadata of keys and perform wrap/unwrap operations. Only works for key vaults that use the 'Azure role-based access control' permission model.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/e147488a-f6f5-4113-8e2d-b22465e65bf6", "name": "e147488a-f6f5-4113-8e2d-b22465e65bf6", "permissions": [ "actions": [ "Microsoft.EventGrid/eventSubscriptions/write", "Microsoft.EventGrid/eventSubscriptions/read", "Microsoft.EventGrid/eventSubscriptions/delete" "notActions": [], "dataActions": [ "Microsoft.KeyVault/vaults/keys/read", "Microsoft.KeyVault/vaults/keys/wrap/action", "Microsoft.KeyVault/vaults/keys/unwrap/action" "notDataActions": [] "roleName": "Key Vault Crypto Service Encryption User", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Perform cryptographic operations using keys. Only works for key vaults that use the 'Azure role-based access control' permission model. Learn more
Microsoft.KeyVault /vaults/keys/read List keys in the specified vault, or read properties and public material of a key. For asymmetric keys, this operation exposes public key and includes ability to perform public key algorithms such as encrypt and verify signature. Private keys and symmetric keys are never exposed. Microsoft.KeyVault /vaults/keys/update/action Updates the specified attributes associated with the given key. Microsoft.KeyVault /vaults/keys/backup/action Creates the backup file of a key. The file can used to restore the key in a Key Vault of same subscription. Restrictions may apply. Microsoft.KeyVault /vaults/keys/encrypt/action Encrypts plaintext with a key. Note that if the key is asymmetric, this operation can be performed by principals with read access. Microsoft.KeyVault /vaults/keys/decrypt/action Decrypts ciphertext with a key. Microsoft.KeyVault /vaults/keys/wrap/action Wraps a symmetric key with a Key Vault key. Note that if the Key Vault key is asymmetric, this operation can be performed by principals with read access. Microsoft.KeyVault /vaults/keys/unwrap/action Unwraps a symmetric key with a Key Vault key. Microsoft.KeyVault /vaults/keys/sign/action Signs a message digest (hash) with a key. Microsoft.KeyVault /vaults/keys/verify/action Verifies the signature of a message digest (hash) with a key. Note that if the key is asymmetric, this operation can be performed by principals with read access. NotDataActions "description": "Perform cryptographic operations using keys. Only works for key vaults that use the 'Azure role-based access control' permission model.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/12338af0-0e69-4776-bea7-57ae8d297424", "name": "12338af0-0e69-4776-bea7-57ae8d297424", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.KeyVault/vaults/keys/read", "Microsoft.KeyVault/vaults/keys/update/action", "Microsoft.KeyVault/vaults/keys/backup/action", "Microsoft.KeyVault/vaults/keys/encrypt/action", "Microsoft.KeyVault/vaults/keys/decrypt/action", "Microsoft.KeyVault/vaults/keys/wrap/action", "Microsoft.KeyVault/vaults/keys/unwrap/action", "Microsoft.KeyVault/vaults/keys/sign/action", "Microsoft.KeyVault/vaults/keys/verify/action" "notDataActions": [] "roleName": "Key Vault Crypto User", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read metadata of key vaults and its certificates, keys, and secrets. Cannot read sensitive values such as secret contents or key material. Only works for key vaults that use the 'Azure role-based access control' permission model. Learn more
Microsoft.KeyVault /checkNameAvailability/read Checks that a key vault name is valid and is not in use Microsoft.KeyVault /deletedVaults/read View the properties of soft deleted key vaults Microsoft.KeyVault /locations/*/read Microsoft.KeyVault /vaults/*/read Microsoft.KeyVault /operations/read Lists operations available on Microsoft.KeyVault resource provider NotActions DataActions Microsoft.KeyVault /vaults/*/read Microsoft.KeyVault /vaults/secrets/readMetadata/action List or view the properties of a secret, but not its value. NotDataActions "description": "Read metadata of key vaults and its certificates, keys, and secrets. Cannot read sensitive values such as secret contents or key material. Only works for key vaults that use the 'Azure role-based access control' permission model.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/21090545-7ca7-4776-b22c-e363652d74d2", "name": "21090545-7ca7-4776-b22c-e363652d74d2", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.KeyVault/checkNameAvailability/read", "Microsoft.KeyVault/deletedVaults/read", "Microsoft.KeyVault/locations/*/read", "Microsoft.KeyVault/vaults/*/read", "Microsoft.KeyVault/operations/read" "notActions": [], "dataActions": [ "Microsoft.KeyVault/vaults/*/read", "Microsoft.KeyVault/vaults/secrets/readMetadata/action" "notDataActions": [] "roleName": "Key Vault Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Perform any action on the secrets of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model. Learn more
Microsoft.KeyVault /checkNameAvailability/read Checks that a key vault name is valid and is not in use Microsoft.KeyVault /deletedVaults/read View the properties of soft deleted key vaults Microsoft.KeyVault /locations/*/read Microsoft.KeyVault /vaults/*/read Microsoft.KeyVault /operations/read Lists operations available on Microsoft.KeyVault resource provider NotActions DataActions Microsoft.KeyVault /vaults/secrets/* NotDataActions "description": "Perform any action on the secrets of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/b86a8fe4-44ce-4948-aee5-eccb2c155cd7", "name": "b86a8fe4-44ce-4948-aee5-eccb2c155cd7", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.KeyVault/checkNameAvailability/read", "Microsoft.KeyVault/deletedVaults/read", "Microsoft.KeyVault/locations/*/read", "Microsoft.KeyVault/vaults/*/read", "Microsoft.KeyVault/operations/read" "notActions": [], "dataActions": [ "Microsoft.KeyVault/vaults/secrets/*" "notDataActions": [] "roleName": "Key Vault Secrets Officer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read secret contents. Only works for key vaults that use the 'Azure role-based access control' permission model. Learn more
Microsoft.KeyVault /vaults/secrets/readMetadata/action List or view the properties of a secret, but not its value. NotDataActions "description": "Read secret contents. Only works for key vaults that use the 'Azure role-based access control' permission model.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/4633458b-17de-408a-b874-0445c86b69e6", "name": "4633458b-17de-408a-b874-0445c86b69e6", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.KeyVault/vaults/secrets/getSecret/action", "Microsoft.KeyVault/vaults/secrets/readMetadata/action" "notDataActions": [] "roleName": "Key Vault Secrets User", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage managed HSM pools, but not access to them. Learn more
Microsoft.KeyVault /locations/deletedManagedHsms/read View the properties of a deleted managed hsm Microsoft.KeyVault /locations/deletedManagedHsms/purge/action Purge a soft deleted managed hsm Microsoft.KeyVault /locations/managedHsmOperationResults/read Check the result of a long run operation NotActions DataActions NotDataActions "description": "Lets you manage managed HSM pools, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/18500a29-7fe2-46b2-a342-b16a415e101d", "name": "18500a29-7fe2-46b2-a342-b16a415e101d", "permissions": [ "actions": [ "Microsoft.KeyVault/managedHSMs/*", "Microsoft.KeyVault/deletedManagedHsms/read", "Microsoft.KeyVault/locations/deletedManagedHsms/read", "Microsoft.KeyVault/locations/deletedManagedHsms/purge/action", "Microsoft.KeyVault/locations/managedHsmOperationResults/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Managed HSM contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Microsoft Sentinel Automation Contributor Learn more
Microsoft.Logic /workflows/triggers/listCallbackUrl/action Gets the callback URL for trigger. Microsoft.Logic /workflows/runs/read Reads the workflow run. Microsoft.Web /sites/hostruntime/webhooks/api/workflows/triggers/read List Web Apps Hostruntime Workflow Triggers. Microsoft.Web /sites/hostruntime/webhooks/api/workflows/triggers/listCallbackUrl/action Get Web Apps Hostruntime Workflow Trigger Uri. Microsoft.Web /sites/hostruntime/webhooks/api/workflows/runs/read List Web Apps Hostruntime Workflow Runs. NotActions DataActions NotDataActions "description": "Microsoft Sentinel Automation Contributor", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/f4c81013-99ee-4d62-a7ee-b3f1f648599a", "name": "f4c81013-99ee-4d62-a7ee-b3f1f648599a", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Logic/workflows/triggers/read", "Microsoft.Logic/workflows/triggers/listCallbackUrl/action", "Microsoft.Logic/workflows/runs/read", "Microsoft.Web/sites/hostruntime/webhooks/api/workflows/triggers/read", "Microsoft.Web/sites/hostruntime/webhooks/api/workflows/triggers/listCallbackUrl/action", "Microsoft.Web/sites/hostruntime/webhooks/api/workflows/runs/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Microsoft Sentinel Automation Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Microsoft Sentinel Contributor Learn more
Microsoft.OperationalInsights /workspaces/query/read Run queries over the data in the workspace Microsoft.OperationalInsights /workspaces/query/*/read Microsoft.OperationalInsights /workspaces/dataSources/read Get data source under a workspace. Microsoft.OperationalInsights /querypacks/*/read Microsoft.Insights /workbooks/* Microsoft.Insights /myworkbooks/read Read a private Workbook Microsoft.Authorization /*/read Read roles and role assignments Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions Microsoft.SecurityInsights /ConfidentialWatchlists/* Microsoft.OperationalInsights /workspaces/query/ConfidentialWatchlist/* DataActions NotDataActions "description": "Microsoft Sentinel Contributor", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/ab8e14d6-4a74-4a29-9ba8-549422addade", "name": "ab8e14d6-4a74-4a29-9ba8-549422addade", "permissions": [ "actions": [ "Microsoft.SecurityInsights/*", "Microsoft.OperationalInsights/workspaces/analytics/query/action", "Microsoft.OperationalInsights/workspaces/*/read", "Microsoft.OperationalInsights/workspaces/savedSearches/*", "Microsoft.OperationsManagement/solutions/read", "Microsoft.OperationalInsights/workspaces/query/read", "Microsoft.OperationalInsights/workspaces/query/*/read", "Microsoft.OperationalInsights/workspaces/dataSources/read", "Microsoft.OperationalInsights/querypacks/*/read", "Microsoft.Insights/workbooks/*", "Microsoft.Insights/myworkbooks/read", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [ "Microsoft.SecurityInsights/ConfidentialWatchlists/*", "Microsoft.OperationalInsights/workspaces/query/ConfidentialWatchlist/*" "dataActions": [], "notDataActions": [] "roleName": "Microsoft Sentinel Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Microsoft Sentinel Playbook Operator Learn more
Microsoft.Logic /workflows/triggers/listCallbackUrl/action Gets the callback URL for trigger. Microsoft.Web /sites/hostruntime/webhooks/api/workflows/triggers/listCallbackUrl/action Get Web Apps Hostruntime Workflow Trigger Uri. Microsoft.Web /sites/read Get the properties of a Web App NotActions DataActions NotDataActions "description": "Microsoft Sentinel Playbook Operator", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/51d6186e-6489-4900-b93f-92e23144cca5", "name": "51d6186e-6489-4900-b93f-92e23144cca5", "permissions": [ "actions": [ "Microsoft.Logic/workflows/read", "Microsoft.Logic/workflows/triggers/listCallbackUrl/action", "Microsoft.Web/sites/hostruntime/webhooks/api/workflows/triggers/listCallbackUrl/action", "Microsoft.Web/sites/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Microsoft Sentinel Playbook Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Microsoft Sentinel Reader Learn more
Microsoft.SecurityInsights /dataConnectorsCheckRequirements/action Check user authorization and license Microsoft.SecurityInsights /threatIntelligence/indicators/query/action Query Threat Intelligence Indicators Microsoft.SecurityInsights /threatIntelligence/queryIndicators/action Query Threat Intelligence Indicators Microsoft.OperationalInsights /workspaces/analytics/query/action Search using new engine. Microsoft.OperationalInsights /workspaces/*/read View log analytics data Microsoft.OperationalInsights /workspaces/LinkedServices/read Get linked services under given workspace. Microsoft.OperationalInsights /workspaces/savedSearches/read Gets a saved search query. Microsoft.OperationsManagement /solutions/read Get exiting OMS solution Microsoft.OperationalInsights /workspaces/query/read Run queries over the data in the workspace Microsoft.OperationalInsights /workspaces/query/*/read Microsoft.OperationalInsights /querypacks/*/read Microsoft.OperationalInsights /workspaces/dataSources/read Get data source under a workspace. Microsoft.Insights /workbooks/read Read a workbook Microsoft.Insights /myworkbooks/read Read a private Workbook Microsoft.Authorization /*/read Read roles and role assignments Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Resources /templateSpecs/*/read Get or list template specs and template spec versions Microsoft.Support /* Create and update a support ticket NotActions Microsoft.SecurityInsights /ConfidentialWatchlists/* Microsoft.OperationalInsights /workspaces/query/ConfidentialWatchlist/* DataActions NotDataActions "description": "Microsoft Sentinel Reader", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/8d289c81-5878-46d4-8554-54e1e3d8b5cb", "name": "8d289c81-5878-46d4-8554-54e1e3d8b5cb", "permissions": [ "actions": [ "Microsoft.SecurityInsights/*/read", "Microsoft.SecurityInsights/dataConnectorsCheckRequirements/action", "Microsoft.SecurityInsights/threatIntelligence/indicators/query/action", "Microsoft.SecurityInsights/threatIntelligence/queryIndicators/action", "Microsoft.OperationalInsights/workspaces/analytics/query/action", "Microsoft.OperationalInsights/workspaces/*/read", "Microsoft.OperationalInsights/workspaces/LinkedServices/read", "Microsoft.OperationalInsights/workspaces/savedSearches/read", "Microsoft.OperationsManagement/solutions/read", "Microsoft.OperationalInsights/workspaces/query/read", "Microsoft.OperationalInsights/workspaces/query/*/read", "Microsoft.OperationalInsights/querypacks/*/read", "Microsoft.OperationalInsights/workspaces/dataSources/read", "Microsoft.Insights/workbooks/read", "Microsoft.Insights/myworkbooks/read", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/templateSpecs/*/read", "Microsoft.Support/*" "notActions": [ "Microsoft.SecurityInsights/ConfidentialWatchlists/*", "Microsoft.OperationalInsights/workspaces/query/ConfidentialWatchlist/*" "dataActions": [], "notDataActions": [] "roleName": "Microsoft Sentinel Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Microsoft Sentinel Responder Learn more
Microsoft.SecurityInsights /dataConnectorsCheckRequirements/action Check user authorization and license Microsoft.SecurityInsights /automationRules/* Microsoft.SecurityInsights /cases/* Microsoft.SecurityInsights /incidents/* Microsoft.SecurityInsights /threatIntelligence/indicators/appendTags/action Append tags to Threat Intelligence Indicator Microsoft.SecurityInsights /threatIntelligence/indicators/query/action Query Threat Intelligence Indicators Microsoft.SecurityInsights /threatIntelligence/bulkTag/action Bulk Tags Threat Intelligence Microsoft.SecurityInsights /threatIntelligence/indicators/appendTags/action Append tags to Threat Intelligence Indicator Microsoft.SecurityInsights /threatIntelligence/indicators/replaceTags/action Replace Tags of Threat Intelligence Indicator Microsoft.SecurityInsights /threatIntelligence/queryIndicators/action Query Threat Intelligence Indicators Microsoft.OperationalInsights /workspaces/analytics/query/action Search using new engine. Microsoft.OperationalInsights /workspaces/*/read View log analytics data Microsoft.OperationalInsights /workspaces/dataSources/read Get data source under a workspace. Microsoft.OperationalInsights /workspaces/savedSearches/read Gets a saved search query. Microsoft.OperationsManagement /solutions/read Get exiting OMS solution Microsoft.OperationalInsights /workspaces/query/read Run queries over the data in the workspace Microsoft.OperationalInsights /workspaces/query/*/read Microsoft.OperationalInsights /workspaces/dataSources/read Get data source under a workspace. Microsoft.OperationalInsights /querypacks/*/read Microsoft.Insights /workbooks/read Read a workbook Microsoft.Insights /myworkbooks/read Read a private Workbook Microsoft.Authorization /*/read Read roles and role assignments Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions Microsoft.SecurityInsights /cases/*/Delete Microsoft.SecurityInsights /incidents/*/Delete Microsoft.SecurityInsights /ConfidentialWatchlists/* Microsoft.OperationalInsights /workspaces/query/ConfidentialWatchlist/* DataActions NotDataActions "description": "Microsoft Sentinel Responder", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/3e150937-b8fe-4cfb-8069-0eaf05ecd056", "name": "3e150937-b8fe-4cfb-8069-0eaf05ecd056", "permissions": [ "actions": [ "Microsoft.SecurityInsights/*/read", "Microsoft.SecurityInsights/dataConnectorsCheckRequirements/action", "Microsoft.SecurityInsights/automationRules/*", "Microsoft.SecurityInsights/cases/*", "Microsoft.SecurityInsights/incidents/*", "Microsoft.SecurityInsights/threatIntelligence/indicators/appendTags/action", "Microsoft.SecurityInsights/threatIntelligence/indicators/query/action", "Microsoft.SecurityInsights/threatIntelligence/bulkTag/action", "Microsoft.SecurityInsights/threatIntelligence/indicators/appendTags/action", "Microsoft.SecurityInsights/threatIntelligence/indicators/replaceTags/action", "Microsoft.SecurityInsights/threatIntelligence/queryIndicators/action", "Microsoft.OperationalInsights/workspaces/analytics/query/action", "Microsoft.OperationalInsights/workspaces/*/read", "Microsoft.OperationalInsights/workspaces/dataSources/read", "Microsoft.OperationalInsights/workspaces/savedSearches/read", "Microsoft.OperationsManagement/solutions/read", "Microsoft.OperationalInsights/workspaces/query/read", "Microsoft.OperationalInsights/workspaces/query/*/read", "Microsoft.OperationalInsights/workspaces/dataSources/read", "Microsoft.OperationalInsights/querypacks/*/read", "Microsoft.Insights/workbooks/read", "Microsoft.Insights/myworkbooks/read", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [ "Microsoft.SecurityInsights/cases/*/Delete", "Microsoft.SecurityInsights/incidents/*/Delete", "Microsoft.SecurityInsights/ConfidentialWatchlists/*", "Microsoft.OperationalInsights/workspaces/query/ConfidentialWatchlist/*" "dataActions": [], "notDataActions": [] "roleName": "Microsoft Sentinel Responder", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"
View and update permissions for Microsoft Defender for Cloud. Same permissions as the Security Reader role and can also update the security policy and dismiss alerts and recommendations.
For Microsoft Defender for IoT, see
Azure user roles for OT and Enterprise IoT monitoring
.
Learn more
Lets you push assessments to Microsoft Defender for Cloud
Microsoft.Security /assessments/write Create or update security assessments on your subscription NotActions DataActions NotDataActions "description": "Lets you push assessments to Security Center", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/612c2aa1-cb24-443b-ac28-3ab7272de6f5", "name": "612c2aa1-cb24-443b-ac28-3ab7272de6f5", "permissions": [ "actions": [ "Microsoft.Security/assessments/write" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Security Assessment Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"This is a legacy role. Please use Security Admin instead.
Microsoft.ClassicCompute /virtualMachines/*/write Write configuration for classic virtual machines Microsoft.ClassicNetwork /*/read Read configuration information about classic network Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Security /* Create and manage security components and policies Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "This is a legacy role. Please use Security Administrator instead", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/e3d13bf0-dd5a-482e-ba6b-9b8433878d10", "name": "e3d13bf0-dd5a-482e-ba6b-9b8433878d10", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.ClassicCompute/*/read", "Microsoft.ClassicCompute/virtualMachines/*/write", "Microsoft.ClassicNetwork/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Security/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Security Manager (Legacy)", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"
View permissions for Microsoft Defender for Cloud. Can view recommendations, alerts, a security policy, and security states, but cannot make changes.
For Microsoft Defender for IoT, see
Azure user roles for OT and Enterprise IoT monitoring
.
Learn more
Lets you connect, start, restart, and shutdown your virtual machines in your Azure DevTest Labs. Learn more
Microsoft.Compute /virtualMachines/*/read Read the properties of a virtual machine (VM sizes, runtime status, VM extensions, etc.) Microsoft.Compute /virtualMachines/deallocate/action Powers off the virtual machine and releases the compute resources Microsoft.Compute /virtualMachines/read Get the properties of a virtual machine Microsoft.Compute /virtualMachines/restart/action Restarts the virtual machine Microsoft.Compute /virtualMachines/start/action Starts the virtual machine Microsoft.DevTestLab /*/read Read the properties of a lab Microsoft.DevTestLab /labs/claimAnyVm/action Claim a random claimable virtual machine in the lab. Microsoft.DevTestLab /labs/createEnvironment/action Create virtual machines in a lab. Microsoft.DevTestLab /labs/ensureCurrentUserProfile/action Ensure the current user has a valid profile in the lab. Microsoft.DevTestLab /labs/formulas/delete Delete formulas. Microsoft.DevTestLab /labs/formulas/read Read formulas. Microsoft.DevTestLab /labs/formulas/write Add or modify formulas. Microsoft.DevTestLab /labs/policySets/evaluatePolicies/action Evaluates lab policy. Microsoft.DevTestLab /labs/virtualMachines/claim/action Take ownership of an existing virtual machine Microsoft.DevTestLab /labs/virtualmachines/listApplicableSchedules/action Lists the applicable start/stop schedules, if any. Microsoft.DevTestLab /labs/virtualMachines/getRdpFileContents/action Gets a string that represents the contents of the RDP file for the virtual machine Microsoft.Network /loadBalancers/backendAddressPools/join/action Joins a load balancer backend address pool. Not Alertable. Microsoft.Network /loadBalancers/inboundNatRules/join/action Joins a load balancer inbound nat rule. Not Alertable. Microsoft.Network /networkInterfaces/*/read Read the properties of a network interface (for example, all the load balancers that the network interface is a part of) Microsoft.Network /networkInterfaces/join/action Joins a Virtual Machine to a network interface. Not Alertable. Microsoft.Network /networkInterfaces/read Gets a network interface definition. Microsoft.Network /networkInterfaces/write Creates a network interface or updates an existing network interface. Microsoft.Network /publicIPAddresses/*/read Read the properties of a public IP address Microsoft.Network /publicIPAddresses/join/action Joins a public ip address. Not Alertable. Microsoft.Network /publicIPAddresses/read Gets a public ip address definition. Microsoft.Network /virtualNetworks/subnets/join/action Joins a virtual network. Not Alertable. Microsoft.Resources /deployments/operations/read Gets or lists deployment operations. Microsoft.Resources /deployments/read Gets or lists deployments. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Storage /storageAccounts/listKeys/action Returns the access keys for the specified storage account. NotActions Microsoft.Compute /virtualMachines/vmSizes/read Lists available sizes the virtual machine can be updated to DataActions NotDataActions "description": "Lets you connect, start, restart, and shutdown your virtual machines in your Azure DevTest Labs.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/76283e04-6283-4c54-8f91-bcf1374a3c64", "name": "76283e04-6283-4c54-8f91-bcf1374a3c64", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Compute/availabilitySets/read", "Microsoft.Compute/virtualMachines/*/read", "Microsoft.Compute/virtualMachines/deallocate/action", "Microsoft.Compute/virtualMachines/read", "Microsoft.Compute/virtualMachines/restart/action", "Microsoft.Compute/virtualMachines/start/action", "Microsoft.DevTestLab/*/read", "Microsoft.DevTestLab/labs/claimAnyVm/action", "Microsoft.DevTestLab/labs/createEnvironment/action", "Microsoft.DevTestLab/labs/ensureCurrentUserProfile/action", "Microsoft.DevTestLab/labs/formulas/delete", "Microsoft.DevTestLab/labs/formulas/read", "Microsoft.DevTestLab/labs/formulas/write", "Microsoft.DevTestLab/labs/policySets/evaluatePolicies/action", "Microsoft.DevTestLab/labs/virtualMachines/claim/action", "Microsoft.DevTestLab/labs/virtualmachines/listApplicableSchedules/action", "Microsoft.DevTestLab/labs/virtualMachines/getRdpFileContents/action", "Microsoft.Network/loadBalancers/backendAddressPools/join/action", "Microsoft.Network/loadBalancers/inboundNatRules/join/action", "Microsoft.Network/networkInterfaces/*/read", "Microsoft.Network/networkInterfaces/join/action", "Microsoft.Network/networkInterfaces/read", "Microsoft.Network/networkInterfaces/write", "Microsoft.Network/publicIPAddresses/*/read", "Microsoft.Network/publicIPAddresses/join/action", "Microsoft.Network/publicIPAddresses/read", "Microsoft.Network/virtualNetworks/subnets/join/action", "Microsoft.Resources/deployments/operations/read", "Microsoft.Resources/deployments/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Storage/storageAccounts/listKeys/action" "notActions": [ "Microsoft.Compute/virtualMachines/vmSizes/read" "dataActions": [], "notDataActions": [] "roleName": "DevTest Labs User", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Enables you to view an existing lab, perform actions on the lab VMs and send invitations to the lab. Learn more
Microsoft.LabServices /labs/users/invite/action Send email invitation to a user to join the lab. Microsoft.LabServices /labs/virtualMachines/read Get the properties of a virtual machine. Microsoft.LabServices /labs/virtualMachines/start/action Start a virtual machine. Microsoft.LabServices /labs/virtualMachines/stop/action Stop and deallocate a virtual machine. Microsoft.LabServices /labs/virtualMachines/reimage/action Reimage a virtual machine to the last published image. Microsoft.LabServices /labs/virtualMachines/redeploy/action Redeploy a virtual machine to a different compute node. Microsoft.LabServices /locations/usages/read Get Usage in a location Microsoft.LabServices /skus/read Get the properties of a Lab Services SKU. Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. NotActions DataActions NotDataActions "description": "The lab assistant role", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/ce40b423-cede-4313-a93f-9b28290b72e1", "name": "ce40b423-cede-4313-a93f-9b28290b72e1", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.LabServices/labPlans/images/read", "Microsoft.LabServices/labPlans/read", "Microsoft.LabServices/labs/read", "Microsoft.LabServices/labs/schedules/read", "Microsoft.LabServices/labs/users/read", "Microsoft.LabServices/labs/users/invite/action", "Microsoft.LabServices/labs/virtualMachines/read", "Microsoft.LabServices/labs/virtualMachines/start/action", "Microsoft.LabServices/labs/virtualMachines/stop/action", "Microsoft.LabServices/labs/virtualMachines/reimage/action", "Microsoft.LabServices/labs/virtualMachines/redeploy/action", "Microsoft.LabServices/locations/usages/read", "Microsoft.LabServices/skus/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Lab Assistant", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Applied at lab level, enables you to manage the lab. Applied at a resource group, enables you to create and manage labs. Learn more
Microsoft.LabServices /labPlans/saveImage/action Create an image from a virtual machine in the gallery attached to the lab plan. Microsoft.LabServices /labs/read Get the properties of a lab. Microsoft.LabServices /labs/write Create new or update an existing lab. Microsoft.LabServices /labs/delete Delete the lab and all its users, schedules and virtual machines. Microsoft.LabServices /labs/publish/action Publish a lab by propagating image of the template virtual machine to all virtual machines in the lab. Microsoft.LabServices /labs/syncGroup/action Updates the list of users from the Active Directory group assigned to the lab. Microsoft.LabServices /labs/schedules/read Get the properties of a schedule. Microsoft.LabServices /labs/schedules/write Create new or update an existing schedule. Microsoft.LabServices /labs/schedules/delete Delete the schedule. Microsoft.LabServices /labs/users/read Get the properties of a user. Microsoft.LabServices /labs/users/write Create new or update an existing user. Microsoft.LabServices /labs/users/delete Delete the user. Microsoft.LabServices /labs/users/invite/action Send email invitation to a user to join the lab. Microsoft.LabServices /labs/virtualMachines/read Get the properties of a virtual machine. Microsoft.LabServices /labs/virtualMachines/start/action Start a virtual machine. Microsoft.LabServices /labs/virtualMachines/stop/action Stop and deallocate a virtual machine. Microsoft.LabServices /labs/virtualMachines/reimage/action Reimage a virtual machine to the last published image. Microsoft.LabServices /labs/virtualMachines/redeploy/action Redeploy a virtual machine to a different compute node. Microsoft.LabServices /labs/virtualMachines/resetPassword/action Reset local user's password on a virtual machine. Microsoft.LabServices /locations/usages/read Get Usage in a location Microsoft.LabServices /skus/read Get the properties of a Lab Services SKU. Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. NotActions DataActions Microsoft.LabServices /labPlans/createLab/action Create a new lab from a lab plan. NotDataActions "description": "The lab contributor role", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5daaa2af-1fe8-407c-9122-bba179798270", "name": "5daaa2af-1fe8-407c-9122-bba179798270", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.LabServices/labPlans/images/read", "Microsoft.LabServices/labPlans/read", "Microsoft.LabServices/labPlans/saveImage/action", "Microsoft.LabServices/labs/read", "Microsoft.LabServices/labs/write", "Microsoft.LabServices/labs/delete", "Microsoft.LabServices/labs/publish/action", "Microsoft.LabServices/labs/syncGroup/action", "Microsoft.LabServices/labs/schedules/read", "Microsoft.LabServices/labs/schedules/write", "Microsoft.LabServices/labs/schedules/delete", "Microsoft.LabServices/labs/users/read", "Microsoft.LabServices/labs/users/write", "Microsoft.LabServices/labs/users/delete", "Microsoft.LabServices/labs/users/invite/action", "Microsoft.LabServices/labs/virtualMachines/read", "Microsoft.LabServices/labs/virtualMachines/start/action", "Microsoft.LabServices/labs/virtualMachines/stop/action", "Microsoft.LabServices/labs/virtualMachines/reimage/action", "Microsoft.LabServices/labs/virtualMachines/redeploy/action", "Microsoft.LabServices/labs/virtualMachines/resetPassword/action", "Microsoft.LabServices/locations/usages/read", "Microsoft.LabServices/skus/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read" "notActions": [], "dataActions": [ "Microsoft.LabServices/labPlans/createLab/action" "notDataActions": [] "roleName": "Lab Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you create new labs under your Azure Lab Accounts. Learn more
Microsoft.LabServices /labAccounts/getPricingAndAvailability/action Get the pricing and availability of combinations of sizes, geographies, and operating systems for the lab account. Microsoft.LabServices /labAccounts/getRestrictionsAndUsage/action Get core restrictions and usage for this subscription Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.LabServices /labPlans/images/read Get the properties of an image. Microsoft.LabServices /labPlans/read Get the properties of a lab plan. Microsoft.LabServices /labPlans/saveImage/action Create an image from a virtual machine in the gallery attached to the lab plan. Microsoft.LabServices /labs/read Get the properties of a lab. Microsoft.LabServices /labs/schedules/read Get the properties of a schedule. Microsoft.LabServices /labs/users/read Get the properties of a user. Microsoft.LabServices /labs/virtualMachines/read Get the properties of a virtual machine. Microsoft.LabServices /locations/usages/read Get Usage in a location Microsoft.LabServices /skus/read Get the properties of a Lab Services SKU. Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions Microsoft.LabServices /labPlans/createLab/action Create a new lab from a lab plan. NotDataActions "description": "Lets you create new labs under your Azure Lab Accounts.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/b97fb8bc-a8b2-4522-a38b-dd33c7e65ead", "name": "b97fb8bc-a8b2-4522-a38b-dd33c7e65ead", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.LabServices/labAccounts/*/read", "Microsoft.LabServices/labAccounts/createLab/action", "Microsoft.LabServices/labAccounts/getPricingAndAvailability/action", "Microsoft.LabServices/labAccounts/getRestrictionsAndUsage/action", "Microsoft.Insights/alertRules/*", "Microsoft.LabServices/labPlans/images/read", "Microsoft.LabServices/labPlans/read", "Microsoft.LabServices/labPlans/saveImage/action", "Microsoft.LabServices/labs/read", "Microsoft.LabServices/labs/schedules/read", "Microsoft.LabServices/labs/users/read", "Microsoft.LabServices/labs/virtualMachines/read", "Microsoft.LabServices/locations/usages/read", "Microsoft.LabServices/skus/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [ "Microsoft.LabServices/labPlans/createLab/action" "notDataActions": [] "roleName": "Lab Creator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Gives you limited ability to manage existing labs. Learn more
Microsoft.LabServices /labPlans/saveImage/action Create an image from a virtual machine in the gallery attached to the lab plan. Microsoft.LabServices /labs/publish/action Publish a lab by propagating image of the template virtual machine to all virtual machines in the lab. Microsoft.LabServices /labs/read Get the properties of a lab. Microsoft.LabServices /labs/schedules/read Get the properties of a schedule. Microsoft.LabServices /labs/schedules/write Create new or update an existing schedule. Microsoft.LabServices /labs/schedules/delete Delete the schedule. Microsoft.LabServices /labs/users/read Get the properties of a user. Microsoft.LabServices /labs/users/write Create new or update an existing user. Microsoft.LabServices /labs/users/delete Delete the user. Microsoft.LabServices /labs/users/invite/action Send email invitation to a user to join the lab. Microsoft.LabServices /labs/virtualMachines/read Get the properties of a virtual machine. Microsoft.LabServices /labs/virtualMachines/start/action Start a virtual machine. Microsoft.LabServices /labs/virtualMachines/stop/action Stop and deallocate a virtual machine. Microsoft.LabServices /labs/virtualMachines/reimage/action Reimage a virtual machine to the last published image. Microsoft.LabServices /labs/virtualMachines/redeploy/action Redeploy a virtual machine to a different compute node. Microsoft.LabServices /labs/virtualMachines/resetPassword/action Reset local user's password on a virtual machine. Microsoft.LabServices /locations/usages/read Get Usage in a location Microsoft.LabServices /skus/read Get the properties of a Lab Services SKU. Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. NotActions DataActions NotDataActions "description": "The lab operator role", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/a36e6959-b6be-4b12-8e9f-ef4b474d304d", "name": "a36e6959-b6be-4b12-8e9f-ef4b474d304d", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.LabServices/labPlans/images/read", "Microsoft.LabServices/labPlans/read", "Microsoft.LabServices/labPlans/saveImage/action", "Microsoft.LabServices/labs/publish/action", "Microsoft.LabServices/labs/read", "Microsoft.LabServices/labs/schedules/read", "Microsoft.LabServices/labs/schedules/write", "Microsoft.LabServices/labs/schedules/delete", "Microsoft.LabServices/labs/users/read", "Microsoft.LabServices/labs/users/write", "Microsoft.LabServices/labs/users/delete", "Microsoft.LabServices/labs/users/invite/action", "Microsoft.LabServices/labs/virtualMachines/read", "Microsoft.LabServices/labs/virtualMachines/start/action", "Microsoft.LabServices/labs/virtualMachines/stop/action", "Microsoft.LabServices/labs/virtualMachines/reimage/action", "Microsoft.LabServices/labs/virtualMachines/redeploy/action", "Microsoft.LabServices/labs/virtualMachines/resetPassword/action", "Microsoft.LabServices/locations/usages/read", "Microsoft.LabServices/skus/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Lab Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Enables you to fully control all Lab Services scenarios in the resource group. Learn more
"description": "The lab services contributor role", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/f69b8690-cc87-41d6-b77a-a4bc3c0a966f", "name": "f69b8690-cc87-41d6-b77a-a4bc3c0a966f", "permissions": [ "actions": [ "Microsoft.LabServices/*", "Microsoft.Insights/alertRules/*", "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read" "notActions": [], "dataActions": [ "Microsoft.LabServices/labPlans/createLab/action" "notDataActions": [] "roleName": "Lab Services Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Enables you to view, but not change, all lab plans and lab resources. Learn more
"description": "The lab services reader role", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/2a5c394f-5eb7-4d4f-9c8e-e8eae39faebc", "name": "2a5c394f-5eb7-4d4f-9c8e-e8eae39faebc", "permissions": [ "actions": [ "Microsoft.LabServices/*/read", "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Lab Services Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can manage Application Insights components Learn more
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Can manage Application Insights components", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/ae349356-3a1b-4a5e-921d-050484c6347e", "name": "ae349356-3a1b-4a5e-921d-050484c6347e", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Insights/generateLiveToken/read", "Microsoft.Insights/metricAlerts/*", "Microsoft.Insights/components/*", "Microsoft.Insights/scheduledqueryrules/*", "Microsoft.Insights/topology/read", "Microsoft.Insights/transactions/read", "Microsoft.Insights/webtests/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Application Insights Component Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Gives user permission to view and download debug snapshots collected with the Application Insights Snapshot Debugger. Note that these permissions are not included in the Owner or Contributor roles. When giving users the Application Insights Snapshot Debugger role, you must grant the role directly to the user. The role is not recognized when it is added to a custom role. Learn more
"description": "Gives user permission to use Application Insights Snapshot Debugger features", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/08954f03-6346-4c2e-81c0-ec3a5cfae23b", "name": "08954f03-6346-4c2e-81c0-ec3a5cfae23b", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Insights/components/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Application Insights Snapshot Debugger", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can read all monitoring data and edit monitoring settings. See also Get started with roles, permissions, and security with Azure Monitor . Learn more
Microsoft.Insights /DiagnosticSettings/* Creates, updates, or reads the diagnostic setting for Analysis Server Microsoft.Insights /eventtypes/* List Activity Log events (management events) in a subscription. This permission is applicable to both programmatic and portal access to the Activity Log. Microsoft.Insights /LogDefinitions/* This permission is necessary for users who need access to Activity Logs via the portal. List log categories in Activity Log. Microsoft.Insights /metricalerts/* Microsoft.Insights /MetricDefinitions/* Read metric definitions (list of available metric types for a resource). Microsoft.Insights /Metrics/* Read metrics for a resource. Microsoft.Insights /notificationStatus/* Microsoft.Insights /Register/Action Register the Microsoft Insights provider Microsoft.Insights /scheduledqueryrules/* Microsoft.Insights /webtests/* Create and manage Insights web tests Microsoft.Insights /workbooks/* Microsoft.Insights /workbooktemplates/* Microsoft.Insights /privateLinkScopes/* Microsoft.Insights /privateLinkScopeOperationStatuses/* Microsoft.OperationalInsights /workspaces/write Creates a new workspace or links to an existing workspace by providing the customer id from the existing workspace. Microsoft.OperationalInsights /workspaces/intelligencepacks/* Read/write/delete log analytics solution packs. Microsoft.OperationalInsights /workspaces/savedSearches/* Read/write/delete log analytics saved searches. Microsoft.OperationalInsights /workspaces/search/action Executes a search query Microsoft.OperationalInsights /workspaces/sharedKeys/action Retrieves the shared keys for the workspace. These keys are used to connect Microsoft Operational Insights agents to the workspace. Microsoft.OperationalInsights /workspaces/storageinsightconfigs/* Read/write/delete log analytics storage insight configurations. Microsoft.Support /* Create and update a support ticket Microsoft.WorkloadMonitor/monitors/* Get information about guest VM health monitors. Microsoft.AlertsManagement /smartDetectorAlertRules/* Microsoft.AlertsManagement /actionRules/* Microsoft.AlertsManagement /smartGroups/* Microsoft.AlertsManagement /migrateFromSmartDetection/* NotActions DataActions NotDataActions "description": "Can read all monitoring data and update monitoring settings.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/749f88d5-cbae-40b8-bcfc-e573ddc772fa", "name": "749f88d5-cbae-40b8-bcfc-e573ddc772fa", "permissions": [ "actions": [ "*/read", "Microsoft.AlertsManagement/alerts/*", "Microsoft.AlertsManagement/alertsSummary/*", "Microsoft.Insights/actiongroups/*", "Microsoft.Insights/activityLogAlerts/*", "Microsoft.Insights/AlertRules/*", "Microsoft.Insights/components/*", "Microsoft.Insights/createNotifications/*", "Microsoft.Insights/dataCollectionEndpoints/*", "Microsoft.Insights/dataCollectionRules/*", "Microsoft.Insights/dataCollectionRuleAssociations/*", "Microsoft.Insights/DiagnosticSettings/*", "Microsoft.Insights/eventtypes/*", "Microsoft.Insights/LogDefinitions/*", "Microsoft.Insights/metricalerts/*", "Microsoft.Insights/MetricDefinitions/*", "Microsoft.Insights/Metrics/*", "Microsoft.Insights/notificationStatus/*", "Microsoft.Insights/Register/Action", "Microsoft.Insights/scheduledqueryrules/*", "Microsoft.Insights/webtests/*", "Microsoft.Insights/workbooks/*", "Microsoft.Insights/workbooktemplates/*", "Microsoft.Insights/privateLinkScopes/*", "Microsoft.Insights/privateLinkScopeOperationStatuses/*", "Microsoft.OperationalInsights/workspaces/write", "Microsoft.OperationalInsights/workspaces/intelligencepacks/*", "Microsoft.OperationalInsights/workspaces/savedSearches/*", "Microsoft.OperationalInsights/workspaces/search/action", "Microsoft.OperationalInsights/workspaces/sharedKeys/action", "Microsoft.OperationalInsights/workspaces/storageinsightconfigs/*", "Microsoft.Support/*", "Microsoft.WorkloadMonitor/monitors/*", "Microsoft.AlertsManagement/smartDetectorAlertRules/*", "Microsoft.AlertsManagement/actionRules/*", "Microsoft.AlertsManagement/smartGroups/*", "Microsoft.AlertsManagement/migrateFromSmartDetection/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Monitoring Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Enables publishing metrics against Azure resources Learn more
"description": "Enables publishing metrics against Azure resources", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/3913510d-42f4-4e42-8a64-420c390055eb", "name": "3913510d-42f4-4e42-8a64-420c390055eb", "permissions": [ "actions": [ "Microsoft.Insights/Register/Action", "Microsoft.Support/*", "Microsoft.Resources/subscriptions/resourceGroups/read" "notActions": [], "dataActions": [ "Microsoft.Insights/Metrics/Write", "Microsoft.Insights/Telemetry/Write" "notDataActions": [] "roleName": "Monitoring Metrics Publisher", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can read all monitoring data (metrics, logs, etc.). See also Get started with roles, permissions, and security with Azure Monitor . Learn more
"description": "Can read all monitoring data.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/43d0d8ad-25c7-4714-9337-8ba259a9fe05", "name": "43d0d8ad-25c7-4714-9337-8ba259a9fe05", "permissions": [ "actions": [ "*/read", "Microsoft.OperationalInsights/workspaces/search/action", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Monitoring Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can save shared workbooks. Learn more
"description": "Can save shared workbooks.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/e8ddcd69-c73f-4f9f-9844-4100522f16ad", "name": "e8ddcd69-c73f-4f9f-9844-4100522f16ad", "permissions": [ "actions": [ "Microsoft.Insights/workbooks/write", "Microsoft.Insights/workbooks/delete", "Microsoft.Insights/workbooks/read", "Microsoft.Insights/workbooks/revisions/read", "Microsoft.Insights/workbooktemplates/write", "Microsoft.Insights/workbooktemplates/delete", "Microsoft.Insights/workbooktemplates/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Workbook Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can read workbooks. Learn more
"description": "Can read workbooks.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/b279062a-9be3-42a0-92ae-8b3cf002ec4d", "name": "b279062a-9be3-42a0-92ae-8b3cf002ec4d", "permissions": [ "actions": [ "microsoft.insights/workbooks/read", "microsoft.insights/workbooks/revisions/read", "microsoft.insights/workbooktemplates/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Workbook Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Manage Azure Automation resources and other resources using Azure Automation. Learn more
Microsoft.Insights /diagnosticSettings/* Creates, updates, or reads the diagnostic setting for Analysis Server Microsoft.OperationalInsights /workspaces/sharedKeys/action Retrieves the shared keys for the workspace. These keys are used to connect Microsoft Operational Insights agents to the workspace. NotActions DataActions NotDataActions "description": "Manage azure automation resources and other resources using azure automation.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/f353d9bd-d4a6-484e-a77a-8050b599b867", "name": "f353d9bd-d4a6-484e-a77a-8050b599b867", "permissions": [ "actions": [ "Microsoft.Automation/automationAccounts/*", "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Insights/ActionGroups/*", "Microsoft.Insights/ActivityLogAlerts/*", "Microsoft.Insights/MetricAlerts/*", "Microsoft.Insights/ScheduledQueryRules/*", "Microsoft.Insights/diagnosticSettings/*", "Microsoft.OperationalInsights/workspaces/sharedKeys/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Automation Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Create and Manage Jobs using Automation Runbooks. Learn more
Microsoft.Automation /automationAccounts/hybridRunbookWorkerGroups/read Reads a Hybrid Runbook Worker Group Microsoft.Automation /automationAccounts/jobs/read Gets an Azure Automation job Microsoft.Automation /automationAccounts/jobs/resume/action Resumes an Azure Automation job Microsoft.Automation /automationAccounts/jobs/stop/action Stops an Azure Automation job Microsoft.Automation /automationAccounts/jobs/streams/read Gets an Azure Automation job stream Microsoft.Automation /automationAccounts/jobs/suspend/action Suspends an Azure Automation job Microsoft.Automation /automationAccounts/jobs/write Creates an Azure Automation job Microsoft.Automation /automationAccounts/jobs/output/read Gets the output of a job Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Create and Manage Jobs using Automation Runbooks.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/4fe576fe-1146-4730-92eb-48519fa6bf9f", "name": "4fe576fe-1146-4730-92eb-48519fa6bf9f", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups/read", "Microsoft.Automation/automationAccounts/jobs/read", "Microsoft.Automation/automationAccounts/jobs/resume/action", "Microsoft.Automation/automationAccounts/jobs/stop/action", "Microsoft.Automation/automationAccounts/jobs/streams/read", "Microsoft.Automation/automationAccounts/jobs/suspend/action", "Microsoft.Automation/automationAccounts/jobs/write", "Microsoft.Automation/automationAccounts/jobs/output/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Automation Job Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Automation Operators are able to start, stop, suspend, and resume jobs Learn more
Microsoft.Automation /automationAccounts/hybridRunbookWorkerGroups/read Reads a Hybrid Runbook Worker Group Microsoft.Automation /automationAccounts/jobs/read Gets an Azure Automation job Microsoft.Automation /automationAccounts/jobs/resume/action Resumes an Azure Automation job Microsoft.Automation /automationAccounts/jobs/stop/action Stops an Azure Automation job Microsoft.Automation /automationAccounts/jobs/streams/read Gets an Azure Automation job stream Microsoft.Automation /automationAccounts/jobs/suspend/action Suspends an Azure Automation job Microsoft.Automation /automationAccounts/jobs/write Creates an Azure Automation job Microsoft.Automation /automationAccounts/jobSchedules/read Gets an Azure Automation job schedule Microsoft.Automation /automationAccounts/jobSchedules/write Creates an Azure Automation job schedule Microsoft.Automation /automationAccounts/linkedWorkspace/read Gets the workspace linked to the automation account Microsoft.Automation /automationAccounts/read Gets an Azure Automation account Microsoft.Automation /automationAccounts/runbooks/read Gets an Azure Automation runbook Microsoft.Automation /automationAccounts/schedules/read Gets an Azure Automation schedule asset Microsoft.Automation /automationAccounts/schedules/write Creates or updates an Azure Automation schedule asset Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Automation /automationAccounts/jobs/output/read Gets the output of a job Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Automation Operators are able to start, stop, suspend, and resume jobs", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/d3881f73-407a-4167-8283-e981cbba0404", "name": "d3881f73-407a-4167-8283-e981cbba0404", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups/read", "Microsoft.Automation/automationAccounts/jobs/read", "Microsoft.Automation/automationAccounts/jobs/resume/action", "Microsoft.Automation/automationAccounts/jobs/stop/action", "Microsoft.Automation/automationAccounts/jobs/streams/read", "Microsoft.Automation/automationAccounts/jobs/suspend/action", "Microsoft.Automation/automationAccounts/jobs/write", "Microsoft.Automation/automationAccounts/jobSchedules/read", "Microsoft.Automation/automationAccounts/jobSchedules/write", "Microsoft.Automation/automationAccounts/linkedWorkspace/read", "Microsoft.Automation/automationAccounts/read", "Microsoft.Automation/automationAccounts/runbooks/read", "Microsoft.Automation/automationAccounts/schedules/read", "Microsoft.Automation/automationAccounts/schedules/write", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Automation/automationAccounts/jobs/output/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Automation Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read Runbook properties - to be able to create Jobs of the runbook. Learn more
"description": "Read Runbook properties - to be able to create Jobs of the runbook.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5fb5aef8-1081-4b8e-bb16-9d5d0385bab5", "name": "5fb5aef8-1081-4b8e-bb16-9d5d0385bab5", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Automation/automationAccounts/runbooks/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Automation Runbook Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"List cluster user credentials action.
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Kubernetes /connectedClusters/listClusterUserCredentials/action List clusterUser credential(preview) Microsoft.Authorization /*/read Read roles and role assignments Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Support /* Create and update a support ticket Microsoft.Kubernetes /connectedClusters/listClusterUserCredential/action List clusterUser credential NotActions DataActions NotDataActions "description": "List cluster user credentials action.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/00493d72-78f6-4148-b6c5-d3ce8e4799dd", "name": "00493d72-78f6-4148-b6c5-d3ce8e4799dd", "permissions": [ "actions": [ "Microsoft.Resources/deployments/write", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Support/*", "Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Azure Arc Enabled Kubernetes Cluster User Role", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces. Learn more
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions Microsoft.Kubernetes /connectedClusters/apps/controllerrevisions/read Reads controllerrevisions Microsoft.Kubernetes /connectedClusters/apps/daemonsets/* Microsoft.Kubernetes /connectedClusters/apps/deployments/* Microsoft.Kubernetes /connectedClusters/apps/replicasets/* Microsoft.Kubernetes /connectedClusters/apps/statefulsets/* Microsoft.Kubernetes /connectedClusters/authorization.k8s.io/localsubjectaccessreviews/write Writes localsubjectaccessreviews Microsoft.Kubernetes /connectedClusters/autoscaling/horizontalpodautoscalers/* Microsoft.Kubernetes /connectedClusters/batch/cronjobs/* Microsoft.Kubernetes /connectedClusters/batch/jobs/* Microsoft.Kubernetes /connectedClusters/configmaps/* Microsoft.Kubernetes /connectedClusters/endpoints/* Microsoft.Kubernetes /connectedClusters/events.k8s.io/events/read Reads events Microsoft.Kubernetes /connectedClusters/events/read Reads events Microsoft.Kubernetes /connectedClusters/extensions/daemonsets/* Microsoft.Kubernetes /connectedClusters/extensions/deployments/* Microsoft.Kubernetes /connectedClusters/extensions/ingresses/* Microsoft.Kubernetes /connectedClusters/extensions/networkpolicies/* Microsoft.Kubernetes /connectedClusters/extensions/replicasets/* Microsoft.Kubernetes /connectedClusters/limitranges/read Reads limitranges Microsoft.Kubernetes /connectedClusters/namespaces/read Reads namespaces Microsoft.Kubernetes /connectedClusters/networking.k8s.io/ingresses/* Microsoft.Kubernetes /connectedClusters/networking.k8s.io/networkpolicies/* Microsoft.Kubernetes /connectedClusters/persistentvolumeclaims/* Microsoft.Kubernetes /connectedClusters/pods/* Microsoft.Kubernetes /connectedClusters/policy/poddisruptionbudgets/* Microsoft.Kubernetes /connectedClusters/rbac.authorization.k8s.io/rolebindings/* Microsoft.Kubernetes /connectedClusters/rbac.authorization.k8s.io/roles/* Microsoft.Kubernetes /connectedClusters/replicationcontrollers/* Microsoft.Kubernetes /connectedClusters/replicationcontrollers/* Microsoft.Kubernetes /connectedClusters/resourcequotas/read Reads resourcequotas Microsoft.Kubernetes /connectedClusters/secrets/* Microsoft.Kubernetes /connectedClusters/serviceaccounts/* Microsoft.Kubernetes /connectedClusters/services/* NotDataActions "description": "Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/dffb1e0c-446f-4dde-a09f-99eb5cc68b96", "name": "dffb1e0c-446f-4dde-a09f-99eb5cc68b96", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/write", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [ "Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read", "Microsoft.Kubernetes/connectedClusters/apps/daemonsets/*", "Microsoft.Kubernetes/connectedClusters/apps/deployments/*", "Microsoft.Kubernetes/connectedClusters/apps/replicasets/*", "Microsoft.Kubernetes/connectedClusters/apps/statefulsets/*", "Microsoft.Kubernetes/connectedClusters/authorization.k8s.io/localsubjectaccessreviews/write", "Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/*", "Microsoft.Kubernetes/connectedClusters/batch/cronjobs/*", "Microsoft.Kubernetes/connectedClusters/batch/jobs/*", "Microsoft.Kubernetes/connectedClusters/configmaps/*", "Microsoft.Kubernetes/connectedClusters/endpoints/*", "Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read", "Microsoft.Kubernetes/connectedClusters/events/read", "Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/*", "Microsoft.Kubernetes/connectedClusters/extensions/deployments/*", "Microsoft.Kubernetes/connectedClusters/extensions/ingresses/*", "Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/*", "Microsoft.Kubernetes/connectedClusters/extensions/replicasets/*", "Microsoft.Kubernetes/connectedClusters/limitranges/read", "Microsoft.Kubernetes/connectedClusters/namespaces/read", "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/*", "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/*", "Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/*", "Microsoft.Kubernetes/connectedClusters/pods/*", "Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/*", "Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/rolebindings/*", "Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/roles/*", "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*", "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*", "Microsoft.Kubernetes/connectedClusters/resourcequotas/read", "Microsoft.Kubernetes/connectedClusters/secrets/*", "Microsoft.Kubernetes/connectedClusters/serviceaccounts/*", "Microsoft.Kubernetes/connectedClusters/services/*" "notDataActions": [] "roleName": "Azure Arc Kubernetes Admin", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage all resources in the cluster. Learn more
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions Microsoft.Kubernetes /connectedClusters/* NotDataActions "description": "Lets you manage all resources in the cluster.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/8393591c-06b9-48a2-a542-1bd6b377f6a2", "name": "8393591c-06b9-48a2-a542-1bd6b377f6a2", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/write", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [ "Microsoft.Kubernetes/connectedClusters/*" "notDataActions": [] "roleName": "Azure Arc Kubernetes Cluster Admin", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you view all resources in cluster/namespace, except secrets. Learn more
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions Microsoft.Kubernetes /connectedClusters/apps/controllerrevisions/read Reads controllerrevisions Microsoft.Kubernetes /connectedClusters/apps/daemonsets/read Reads daemonsets Microsoft.Kubernetes /connectedClusters/apps/deployments/read Reads deployments Microsoft.Kubernetes /connectedClusters/apps/replicasets/read Reads replicasets Microsoft.Kubernetes /connectedClusters/apps/statefulsets/read Reads statefulsets Microsoft.Kubernetes /connectedClusters/autoscaling/horizontalpodautoscalers/read Reads horizontalpodautoscalers Microsoft.Kubernetes /connectedClusters/batch/cronjobs/read Reads cronjobs Microsoft.Kubernetes /connectedClusters/batch/jobs/read Reads jobs Microsoft.Kubernetes /connectedClusters/configmaps/read Reads configmaps Microsoft.Kubernetes /connectedClusters/endpoints/read Reads endpoints Microsoft.Kubernetes /connectedClusters/events.k8s.io/events/read Reads events Microsoft.Kubernetes /connectedClusters/events/read Reads events Microsoft.Kubernetes /connectedClusters/extensions/daemonsets/read Reads daemonsets Microsoft.Kubernetes /connectedClusters/extensions/deployments/read Reads deployments Microsoft.Kubernetes /connectedClusters/extensions/ingresses/read Reads ingresses Microsoft.Kubernetes /connectedClusters/extensions/networkpolicies/read Reads networkpolicies Microsoft.Kubernetes /connectedClusters/extensions/replicasets/read Reads replicasets Microsoft.Kubernetes /connectedClusters/limitranges/read Reads limitranges Microsoft.Kubernetes /connectedClusters/namespaces/read Reads namespaces Microsoft.Kubernetes /connectedClusters/networking.k8s.io/ingresses/read Reads ingresses Microsoft.Kubernetes /connectedClusters/networking.k8s.io/networkpolicies/read Reads networkpolicies Microsoft.Kubernetes /connectedClusters/persistentvolumeclaims/read Reads persistentvolumeclaims Microsoft.Kubernetes /connectedClusters/pods/read Reads pods Microsoft.Kubernetes /connectedClusters/policy/poddisruptionbudgets/read Reads poddisruptionbudgets Microsoft.Kubernetes /connectedClusters/replicationcontrollers/read Reads replicationcontrollers Microsoft.Kubernetes /connectedClusters/replicationcontrollers/read Reads replicationcontrollers Microsoft.Kubernetes /connectedClusters/resourcequotas/read Reads resourcequotas Microsoft.Kubernetes /connectedClusters/serviceaccounts/read Reads serviceaccounts Microsoft.Kubernetes /connectedClusters/services/read Reads services NotDataActions "description": "Lets you view all resources in cluster/namespace, except secrets.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/63f0a09d-1495-4db4-a681-037d84835eb4", "name": "63f0a09d-1495-4db4-a681-037d84835eb4", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/write", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [ "Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read", "Microsoft.Kubernetes/connectedClusters/apps/daemonsets/read", "Microsoft.Kubernetes/connectedClusters/apps/deployments/read", "Microsoft.Kubernetes/connectedClusters/apps/replicasets/read", "Microsoft.Kubernetes/connectedClusters/apps/statefulsets/read", "Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/read", "Microsoft.Kubernetes/connectedClusters/batch/cronjobs/read", "Microsoft.Kubernetes/connectedClusters/batch/jobs/read", "Microsoft.Kubernetes/connectedClusters/configmaps/read", "Microsoft.Kubernetes/connectedClusters/endpoints/read", "Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read", "Microsoft.Kubernetes/connectedClusters/events/read", "Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/read", "Microsoft.Kubernetes/connectedClusters/extensions/deployments/read", "Microsoft.Kubernetes/connectedClusters/extensions/ingresses/read", "Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/read", "Microsoft.Kubernetes/connectedClusters/extensions/replicasets/read", "Microsoft.Kubernetes/connectedClusters/limitranges/read", "Microsoft.Kubernetes/connectedClusters/namespaces/read", "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/read", "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/read", "Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/read", "Microsoft.Kubernetes/connectedClusters/pods/read", "Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/read", "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/read", "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/read", "Microsoft.Kubernetes/connectedClusters/resourcequotas/read", "Microsoft.Kubernetes/connectedClusters/serviceaccounts/read", "Microsoft.Kubernetes/connectedClusters/services/read" "notDataActions": [] "roleName": "Azure Arc Kubernetes Viewer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you update everything in cluster/namespace, except (cluster)roles and (cluster)role bindings. Learn more
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions Microsoft.Kubernetes /connectedClusters/apps/controllerrevisions/read Reads controllerrevisions Microsoft.Kubernetes /connectedClusters/apps/daemonsets/* Microsoft.Kubernetes /connectedClusters/apps/deployments/* Microsoft.Kubernetes /connectedClusters/apps/replicasets/* Microsoft.Kubernetes /connectedClusters/apps/statefulsets/* Microsoft.Kubernetes /connectedClusters/autoscaling/horizontalpodautoscalers/* Microsoft.Kubernetes /connectedClusters/batch/cronjobs/* Microsoft.Kubernetes /connectedClusters/batch/jobs/* Microsoft.Kubernetes /connectedClusters/configmaps/* Microsoft.Kubernetes /connectedClusters/endpoints/* Microsoft.Kubernetes /connectedClusters/events.k8s.io/events/read Reads events Microsoft.Kubernetes /connectedClusters/events/read Reads events Microsoft.Kubernetes /connectedClusters/extensions/daemonsets/* Microsoft.Kubernetes /connectedClusters/extensions/deployments/* Microsoft.Kubernetes /connectedClusters/extensions/ingresses/* Microsoft.Kubernetes /connectedClusters/extensions/networkpolicies/* Microsoft.Kubernetes /connectedClusters/extensions/replicasets/* Microsoft.Kubernetes /connectedClusters/limitranges/read Reads limitranges Microsoft.Kubernetes /connectedClusters/namespaces/read Reads namespaces Microsoft.Kubernetes /connectedClusters/networking.k8s.io/ingresses/* Microsoft.Kubernetes /connectedClusters/networking.k8s.io/networkpolicies/* Microsoft.Kubernetes /connectedClusters/persistentvolumeclaims/* Microsoft.Kubernetes /connectedClusters/pods/* Microsoft.Kubernetes /connectedClusters/policy/poddisruptionbudgets/* Microsoft.Kubernetes /connectedClusters/replicationcontrollers/* Microsoft.Kubernetes /connectedClusters/replicationcontrollers/* Microsoft.Kubernetes /connectedClusters/resourcequotas/read Reads resourcequotas Microsoft.Kubernetes /connectedClusters/secrets/* Microsoft.Kubernetes /connectedClusters/serviceaccounts/* Microsoft.Kubernetes /connectedClusters/services/* NotDataActions "description": "Lets you update everything in cluster/namespace, except (cluster)roles and (cluster)role bindings.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5b999177-9696-4545-85c7-50de3797e5a1", "name": "5b999177-9696-4545-85c7-50de3797e5a1", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/write", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [ "Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read", "Microsoft.Kubernetes/connectedClusters/apps/daemonsets/*", "Microsoft.Kubernetes/connectedClusters/apps/deployments/*", "Microsoft.Kubernetes/connectedClusters/apps/replicasets/*", "Microsoft.Kubernetes/connectedClusters/apps/statefulsets/*", "Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/*", "Microsoft.Kubernetes/connectedClusters/batch/cronjobs/*", "Microsoft.Kubernetes/connectedClusters/batch/jobs/*", "Microsoft.Kubernetes/connectedClusters/configmaps/*", "Microsoft.Kubernetes/connectedClusters/endpoints/*", "Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read", "Microsoft.Kubernetes/connectedClusters/events/read", "Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/*", "Microsoft.Kubernetes/connectedClusters/extensions/deployments/*", "Microsoft.Kubernetes/connectedClusters/extensions/ingresses/*", "Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/*", "Microsoft.Kubernetes/connectedClusters/extensions/replicasets/*", "Microsoft.Kubernetes/connectedClusters/limitranges/read", "Microsoft.Kubernetes/connectedClusters/namespaces/read", "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/*", "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/*", "Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/*", "Microsoft.Kubernetes/connectedClusters/pods/*", "Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/*", "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*", "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*", "Microsoft.Kubernetes/connectedClusters/resourcequotas/read", "Microsoft.Kubernetes/connectedClusters/secrets/*", "Microsoft.Kubernetes/connectedClusters/serviceaccounts/*", "Microsoft.Kubernetes/connectedClusters/services/*" "notDataActions": [] "roleName": "Azure Arc Kubernetes Writer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can onboard Azure Connected Machines. Learn more
Microsoft.GuestConfiguration /guestConfigurationAssignments/read Get guest configuration assignment. NotActions DataActions NotDataActions "description": "Can onboard Azure Connected Machines.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/b64e21ea-ac4e-4cdf-9dc9-5b892992bee7", "name": "b64e21ea-ac4e-4cdf-9dc9-5b892992bee7", "permissions": [ "actions": [ "Microsoft.HybridCompute/machines/read", "Microsoft.HybridCompute/machines/write", "Microsoft.HybridCompute/privateLinkScopes/read", "Microsoft.GuestConfiguration/guestConfigurationAssignments/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Azure Connected Machine Onboarding", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can read, write, delete and re-onboard Azure Connected Machines.
Microsoft.HybridCompute /machines/UpgradeExtensions/action Upgrades Extensions on Azure Arc machines Microsoft.HybridCompute /machines/extensions/read Reads any Azure Arc extensions Microsoft.HybridCompute /machines/extensions/write Installs or Updates an Azure Arc extensions Microsoft.HybridCompute /machines/extensions/delete Deletes an Azure Arc extensions Microsoft.HybridCompute /privateLinkScopes/* Microsoft.HybridCompute /*/read Microsoft.Resources /deployments/* Create and manage a deployment NotActions DataActions NotDataActions "description": "Can read, write, delete and re-onboard Azure Connected Machines.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/cd570a14-e51a-42ad-bac8-bafd67325302", "name": "cd570a14-e51a-42ad-bac8-bafd67325302", "permissions": [ "actions": [ "Microsoft.HybridCompute/machines/read", "Microsoft.HybridCompute/machines/write", "Microsoft.HybridCompute/machines/delete", "Microsoft.HybridCompute/machines/UpgradeExtensions/action", "Microsoft.HybridCompute/machines/extensions/read", "Microsoft.HybridCompute/machines/extensions/write", "Microsoft.HybridCompute/machines/extensions/delete", "Microsoft.HybridCompute/privateLinkScopes/*", "Microsoft.HybridCompute/*/read", "Microsoft.Resources/deployments/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Azure Connected Machine Resource Administrator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows read access to billing data Learn more
Microsoft.Management /managementGroups/read List management groups for the authenticated user. Microsoft.CostManagement /*/read Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Allows read access to billing data", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/fa23ad8b-c56e-40d8-ac0c-ce449e1d2c64", "name": "fa23ad8b-c56e-40d8-ac0c-ce449e1d2c64", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Billing/*/read", "Microsoft.Commerce/*/read", "Microsoft.Consumption/*/read", "Microsoft.Management/managementGroups/read", "Microsoft.CostManagement/*/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Billing Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can manage blueprint definitions, but not assign them. Learn more
Microsoft.Blueprint /blueprints/* Create and manage blueprint definitions or blueprint artifacts. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Can manage blueprint definitions, but not assign them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/41077137-e803-4205-871c-5a86e6a753b4", "name": "41077137-e803-4205-871c-5a86e6a753b4", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Blueprint/blueprints/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Blueprint Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can assign existing published blueprints, but cannot create new blueprints. Note that this only works if the assignment is done with a user-assigned managed identity. Learn more
"description": "Can assign existing published blueprints, but cannot create new blueprints. NOTE: this only works if the assignment is done with a user-assigned managed identity.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/437d2ced-4a38-4302-8479-ed2bcb43d090", "name": "437d2ced-4a38-4302-8479-ed2bcb43d090", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Blueprint/blueprintAssignments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Blueprint Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can view costs and manage cost configuration (e.g. budgets, exports) Learn more
Microsoft.Management /managementGroups/read List management groups for the authenticated user. Microsoft.Billing /billingProperty/read NotActions DataActions NotDataActions "description": "Can view costs and manage cost configuration (e.g. budgets, exports)", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/434105ed-43f6-45c7-a02f-909b2ba83430", "name": "434105ed-43f6-45c7-a02f-909b2ba83430", "permissions": [ "actions": [ "Microsoft.Consumption/*", "Microsoft.CostManagement/*", "Microsoft.Billing/billingPeriods/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Advisor/configurations/read", "Microsoft.Advisor/recommendations/read", "Microsoft.Management/managementGroups/read", "Microsoft.Billing/billingProperty/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Cost Management Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can view cost data and configuration (e.g. budgets, exports) Learn more
Microsoft.Management /managementGroups/read List management groups for the authenticated user. Microsoft.Billing /billingProperty/read NotActions DataActions NotDataActions "description": "Can view cost data and configuration (e.g. budgets, exports)", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/72fafb9e-0641-4937-9268-a91bfd8191a3", "name": "72fafb9e-0641-4937-9268-a91bfd8191a3", "permissions": [ "actions": [ "Microsoft.Consumption/*/read", "Microsoft.CostManagement/*/read", "Microsoft.Billing/billingPeriods/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "Microsoft.Advisor/configurations/read", "Microsoft.Advisor/recommendations/read", "Microsoft.Management/managementGroups/read", "Microsoft.Billing/billingProperty/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Cost Management Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows users to edit and delete Hierarchy Settings
Microsoft.Management /managementGroups/settings/write Creates or updates management group hierarchy settings. Microsoft.Management /managementGroups/settings/delete Deletes management group hierarchy settings. NotActions DataActions NotDataActions "description": "Allows users to edit and delete Hierarchy Settings", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/350f8d15-c687-4448-8ae1-157740a3936d", "name": "350f8d15-c687-4448-8ae1-157740a3936d", "permissions": [ "actions": [ "Microsoft.Management/managementGroups/settings/write", "Microsoft.Management/managementGroups/settings/delete" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Hierarchy Settings Administrator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Role definition to authorize any user/service to create connectedClusters resource Learn more
Microsoft.Resources /subscriptions/operationresults/read Get the subscription operation results. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Kubernetes /connectedClusters/Write Writes connectedClusters Microsoft.Kubernetes /connectedClusters/read Read connectedClusters Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Role definition to authorize any user/service to create connectedClusters resource", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/34e09817-6cbe-4d01-b1a2-e0eac5743d41", "name": "34e09817-6cbe-4d01-b1a2-e0eac5743d41", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/write", "Microsoft.Resources/subscriptions/operationresults/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Kubernetes/connectedClusters/Write", "Microsoft.Kubernetes/connectedClusters/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Kubernetes Cluster - Azure Arc Onboarding", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Can create, update, get, list and delete Kubernetes Extensions, and get extension async operations
Microsoft.KubernetesConfiguration /extensions/write Creates or updates extension resource. Microsoft.KubernetesConfiguration /extensions/read Gets extension instance resource. Microsoft.KubernetesConfiguration /extensions/delete Deletes extension instance resource. Microsoft.KubernetesConfiguration /extensions/operations/read Gets Async Operation status. NotActions DataActions NotDataActions "description": "Can create, update, get, list and delete Kubernetes Extensions, and get extension async operations", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/85cb6faf-e071-4c9b-8136-154b5a04f717", "name": "85cb6faf-e071-4c9b-8136-154b5a04f717", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.KubernetesConfiguration/extensions/write", "Microsoft.KubernetesConfiguration/extensions/read", "Microsoft.KubernetesConfiguration/extensions/delete", "Microsoft.KubernetesConfiguration/extensions/operations/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Kubernetes Extension Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows for creating managed application resources.
"description": "Allows for creating managed application resources.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/641177b8-a67a-45b9-a033-47bc880bb21e", "name": "641177b8-a67a-45b9-a033-47bc880bb21e", "permissions": [ "actions": [ "*/read", "Microsoft.Solutions/applications/*", "Microsoft.Solutions/register/action", "Microsoft.Resources/subscriptions/resourceGroups/*", "Microsoft.Resources/deployments/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Managed Application Contributor Role", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you read and perform actions on Managed Application resources
"description": "Lets you read and perform actions on Managed Application resources", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/c7393b34-138c-406f-901b-d8cf2b17e6ae", "name": "c7393b34-138c-406f-901b-d8cf2b17e6ae", "permissions": [ "actions": [ "*/read", "Microsoft.Solutions/applications/read", "Microsoft.Solutions/*/action" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Managed Application Operator Role", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you read resources in a managed app and request JIT access.
"description": "Lets you read resources in a managed app and request JIT access.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/b9331d33-8a36-4f8c-b097-4f54124fdb44", "name": "b9331d33-8a36-4f8c-b097-4f54124fdb44", "permissions": [ "actions": [ "*/read", "Microsoft.Resources/deployments/*", "Microsoft.Solutions/jitRequests/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Managed Applications Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Managed Services Registration Assignment Delete Role allows the managing tenant users to delete the registration assignment assigned to their tenant. Learn more
Microsoft.ManagedServices /registrationAssignments/read Retrieves a list of Managed Services registration assignments. Microsoft.ManagedServices /registrationAssignments/delete Removes Managed Services registration assignment. Microsoft.ManagedServices /operationStatuses/read Reads the operation status for the resource. NotActions DataActions NotDataActions "description": "Managed Services Registration Assignment Delete Role allows the managing tenant users to delete the registration assignment assigned to their tenant.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/91c1777a-f3dc-4fae-b103-61d183457e46", "name": "91c1777a-f3dc-4fae-b103-61d183457e46", "permissions": [ "actions": [ "Microsoft.ManagedServices/registrationAssignments/read", "Microsoft.ManagedServices/registrationAssignments/delete", "Microsoft.ManagedServices/operationStatuses/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Managed Services Registration assignment Delete Role", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Management Group Contributor Role Learn more
Microsoft.Management /managementGroups/read List management groups for the authenticated user. Microsoft.Management /managementGroups/subscriptions/delete De-associates subscription from the management group. Microsoft.Management /managementGroups/subscriptions/write Associates existing subscription with the management group. Microsoft.Management /managementGroups/write Create or update a management group. Microsoft.Management /managementGroups/subscriptions/read Lists subscription under the given management group. Microsoft.Authorization /*/read Read roles and role assignments NotActions DataActions NotDataActions "description": "Management Group Contributor Role", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5d58bcaf-24a5-4b20-bdb6-eed9f69fbe4c", "name": "5d58bcaf-24a5-4b20-bdb6-eed9f69fbe4c", "permissions": [ "actions": [ "Microsoft.Management/managementGroups/delete", "Microsoft.Management/managementGroups/read", "Microsoft.Management/managementGroups/subscriptions/delete", "Microsoft.Management/managementGroups/subscriptions/write", "Microsoft.Management/managementGroups/write", "Microsoft.Management/managementGroups/subscriptions/read", "Microsoft.Authorization/*/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Management Group Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Management Group Reader Role
Microsoft.Management /managementGroups/read List management groups for the authenticated user. Microsoft.Management /managementGroups/subscriptions/read Lists subscription under the given management group. Microsoft.Authorization /*/read Read roles and role assignments NotActions DataActions NotDataActions "description": "Management Group Reader Role", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/ac63b705-f282-497d-ac71-919bf39d939d", "name": "ac63b705-f282-497d-ac71-919bf39d939d", "permissions": [ "actions": [ "Microsoft.Management/managementGroups/read", "Microsoft.Management/managementGroups/subscriptions/read", "Microsoft.Authorization/*/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Management Group Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage New Relic Application Performance Management accounts and applications, but not access to them.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NewRelic.APM/accounts/* NotActions DataActions NotDataActions "description": "Lets you manage New Relic Application Performance Management accounts and applications, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5d28c62d-5b37-4476-8438-e587778df237", "name": "5d28c62d-5b37-4476-8438-e587778df237", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*", "NewRelic.APM/accounts/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "New Relic APM Account Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows read access to resource policies and write access to resource component policy events. Learn more
Microsoft.Authorization /policyassignments/read Get information about a policy assignment. Microsoft.Authorization /policydefinitions/read Get information about a policy definition. Microsoft.Authorization /policyexemptions/read Get information about a policy exemption. Microsoft.Authorization /policysetdefinitions/read Get information about a policy set definition. NotActions DataActions Microsoft.PolicyInsights /checkDataPolicyCompliance/action Check the compliance status of a given component against data policies. Microsoft.PolicyInsights /policyEvents/logDataEvents/action Log the resource component policy events. NotDataActions "description": "Allows read access to resource policies and write access to resource component policy events.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/66bb4e9e-b016-4a94-8249-4c0511c2be84", "name": "66bb4e9e-b016-4a94-8249-4c0511c2be84", "permissions": [ "actions": [ "Microsoft.Authorization/policyassignments/read", "Microsoft.Authorization/policydefinitions/read", "Microsoft.Authorization/policyexemptions/read", "Microsoft.Authorization/policysetdefinitions/read" "notActions": [], "dataActions": [ "Microsoft.PolicyInsights/checkDataPolicyCompliance/action", "Microsoft.PolicyInsights/policyEvents/logDataEvents/action" "notDataActions": [] "roleName": "Policy Insights Data Writer (Preview)", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read and create quota requests, get quota request status, and create support tickets. Learn more
Microsoft.Capacity /resourceProviders/locations/serviceLimits/read Get the current service limit or quota of the specified resource and location Microsoft.Capacity /resourceProviders/locations/serviceLimits/write Create service limit or quota for the specified resource and location Microsoft.Capacity /resourceProviders/locations/serviceLimitsRequests/read Get any service limit request for the specified resource and location Microsoft.Capacity /register/action Registers the Capacity resource provider and enables the creation of Capacity resources. Microsoft.Quota/usages/read Get the usages for resource providers Microsoft.Quota/quotas/read Get the current Service limit or quota of the specified resource Microsoft.Quota/quotas/write Creates the service limit or quota request for the specified resource Microsoft.Quota/quotaRequests/read Get any service limit request for the specified resource Microsoft.Quota/register/action Register the subscription with Microsoft.Quota Resource Provider Microsoft.Authorization /*/read Read roles and role assignments Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Read and create quota requests, get quota request status, and create support tickets.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/0e5f05e5-9ab9-446b-b98d-1e2157c94125", "name": "0e5f05e5-9ab9-446b-b98d-1e2157c94125", "permissions": [ "actions": [ "Microsoft.Capacity/resourceProviders/locations/serviceLimits/read", "Microsoft.Capacity/resourceProviders/locations/serviceLimits/write", "Microsoft.Capacity/resourceProviders/locations/serviceLimitsRequests/read", "Microsoft.Capacity/register/action", "Microsoft.Quota/usages/read", "Microsoft.Quota/quotas/read", "Microsoft.Quota/quotas/write", "Microsoft.Quota/quotaRequests/read", "Microsoft.Quota/register/action", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Quota Request Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you purchase reservations Learn more
Microsoft.Capacity /register/action Registers the Capacity resource provider and enables the creation of Capacity resources. Microsoft.Compute /register/action Registers Subscription with Microsoft.Compute resource provider Microsoft.Consumption /register/action Register to Consumption RP Microsoft.Consumption /reservationRecommendationDetails/read List Reservation Recommendation Details Microsoft.Consumption /reservationRecommendations/read List single or shared recommendations for Reserved instances for a subscription. Microsoft.Resources /subscriptions/read Gets the list of subscriptions. Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.SQL /register/action Registers the subscription for the Microsoft SQL Database resource provider and enables the creation of Microsoft SQL Databases. Microsoft.Support /supporttickets/write Allows creating and updating a support ticket NotActions DataActions NotDataActions "description": "Lets you purchase reservations", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/f7b75c60-3036-4b75-91c3-6b41c27c1689", "name": "f7b75c60-3036-4b75-91c3-6b41c27c1689", "permissions": [ "actions": [ "Microsoft.Authorization/roleAssignments/read", "Microsoft.Capacity/catalogs/read", "Microsoft.Capacity/register/action", "Microsoft.Compute/register/action", "Microsoft.Consumption/register/action", "Microsoft.Consumption/reservationRecommendationDetails/read", "Microsoft.Consumption/reservationRecommendations/read", "Microsoft.Resources/subscriptions/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.SQL/register/action", "Microsoft.Support/supporttickets/write" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Reservation Purchaser", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Users with rights to create/modify resource policy, create support ticket and read resources/hierarchy. Learn more
"description": "Users with rights to create/modify resource policy, create support ticket and read resources/hierarchy.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/36243c78-bf99-498c-9df9-86d9f8d28608", "name": "36243c78-bf99-498c-9df9-86d9f8d28608", "permissions": [ "actions": [ "*/read", "Microsoft.Authorization/policyassignments/*", "Microsoft.Authorization/policydefinitions/*", "Microsoft.Authorization/policyexemptions/*", "Microsoft.Authorization/policysetdefinitions/*", "Microsoft.PolicyInsights/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Resource Policy Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage Site Recovery service except vault creation and role assignment Learn more
Microsoft.RecoveryServices /locations/allocatedStamp/read GetAllocatedStamp is internal operation used by service Microsoft.RecoveryServices /locations/allocateStamp/action AllocateStamp is internal operation used by service Microsoft.RecoveryServices /Vaults/certificates/write The Update Resource Certificate operation updates the resource/vault credential certificate. Microsoft.RecoveryServices /Vaults/extendedInformation/* Create and manage extended info related to vault Microsoft.RecoveryServices /Vaults/read The Get Vault operation gets an object representing the Azure resource of type 'vault' Microsoft.RecoveryServices /Vaults/refreshContainers/read Microsoft.RecoveryServices /Vaults/registeredIdentities/* Create and manage registered identities Microsoft.RecoveryServices /vaults/replicationAlertSettings/* Create or Update replication alert settings Microsoft.RecoveryServices /vaults/replicationEvents/read Read any Events Microsoft.RecoveryServices /vaults/replicationFabrics/* Create and manage replication fabrics Microsoft.RecoveryServices /vaults/replicationJobs/* Create and manage replication jobs Microsoft.RecoveryServices /vaults/replicationPolicies/* Create and manage replication policies Microsoft.RecoveryServices /vaults/replicationRecoveryPlans/* Create and manage recovery plans Microsoft.RecoveryServices /vaults/replicationVaultSettings/* Microsoft.RecoveryServices /Vaults/storageConfig/* Create and manage storage configuration of Recovery Services vault Microsoft.RecoveryServices /Vaults/tokenInfo/read Microsoft.RecoveryServices /Vaults/usages/read Returns usage details for a Recovery Services Vault. Microsoft.RecoveryServices /Vaults/vaultTokens/read The Vault Token operation can be used to get Vault Token for vault level backend operations. Microsoft.RecoveryServices /Vaults/monitoringAlerts/* Read alerts for the Recovery services vault Microsoft.RecoveryServices /Vaults/monitoringConfigurations/notificationConfiguration/read Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Storage /storageAccounts/read Returns the list of storage accounts or gets the properties for the specified storage account. Microsoft.RecoveryServices /vaults/replicationOperationStatus/read Read any Vault Replication Operation Status Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage Site Recovery service except vault creation and role assignment", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/6670b86e-a3f7-4917-ac9b-5d6ab1be4567", "name": "6670b86e-a3f7-4917-ac9b-5d6ab1be4567", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Network/virtualNetworks/read", "Microsoft.RecoveryServices/locations/allocatedStamp/read", "Microsoft.RecoveryServices/locations/allocateStamp/action", "Microsoft.RecoveryServices/Vaults/certificates/write", "Microsoft.RecoveryServices/Vaults/extendedInformation/*", "Microsoft.RecoveryServices/Vaults/read", "Microsoft.RecoveryServices/Vaults/refreshContainers/read", "Microsoft.RecoveryServices/Vaults/registeredIdentities/*", "Microsoft.RecoveryServices/vaults/replicationAlertSettings/*", "Microsoft.RecoveryServices/vaults/replicationEvents/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/*", "Microsoft.RecoveryServices/vaults/replicationJobs/*", "Microsoft.RecoveryServices/vaults/replicationPolicies/*", "Microsoft.RecoveryServices/vaults/replicationRecoveryPlans/*", "Microsoft.RecoveryServices/vaults/replicationVaultSettings/*", "Microsoft.RecoveryServices/Vaults/storageConfig/*", "Microsoft.RecoveryServices/Vaults/tokenInfo/read", "Microsoft.RecoveryServices/Vaults/usages/read", "Microsoft.RecoveryServices/Vaults/vaultTokens/read", "Microsoft.RecoveryServices/Vaults/monitoringAlerts/*", "Microsoft.RecoveryServices/Vaults/monitoringConfigurations/notificationConfiguration/read", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Storage/storageAccounts/read", "Microsoft.RecoveryServices/vaults/replicationOperationStatus/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Site Recovery Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you failover and failback but not perform other Site Recovery management operations Learn more
Microsoft.RecoveryServices /locations/allocatedStamp/read GetAllocatedStamp is internal operation used by service Microsoft.RecoveryServices /locations/allocateStamp/action AllocateStamp is internal operation used by service Microsoft.RecoveryServices /Vaults/extendedInformation/read The Get Extended Info operation gets an object's Extended Info representing the Azure resource of type ?vault? Microsoft.RecoveryServices /Vaults/read The Get Vault operation gets an object representing the Azure resource of type 'vault' Microsoft.RecoveryServices /Vaults/refreshContainers/read Microsoft.RecoveryServices /Vaults/registeredIdentities/operationResults/read The Get Operation Results operation can be used get the operation status and result for the asynchronously submitted operation Microsoft.RecoveryServices /Vaults/registeredIdentities/read The Get Containers operation can be used get the containers registered for a resource. Microsoft.RecoveryServices /vaults/replicationAlertSettings/read Read any Alerts Settings Microsoft.RecoveryServices /vaults/replicationEvents/read Read any Events Microsoft.RecoveryServices /vaults/replicationFabrics/checkConsistency/action Checks Consistency of the Fabric Microsoft.RecoveryServices /vaults/replicationFabrics/read Read any Fabrics Microsoft.RecoveryServices /vaults/replicationFabrics/reassociateGateway/action Reassociate Gateway Microsoft.RecoveryServices /vaults/replicationFabrics/renewcertificate/action Renew Certificate for Fabric Microsoft.RecoveryServices /vaults/replicationFabrics/replicationNetworks/read Read any Networks Microsoft.RecoveryServices /vaults/replicationFabrics/replicationNetworks/replicationNetworkMappings/read Read any Network Mappings Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/read Read any Protection Containers Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectableItems/read Read any Protectable Items Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/applyRecoveryPoint/action Apply Recovery Point Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/failoverCommit/action Failover Commit Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/plannedFailover/action Planned Failover Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/read Read any Protected Items Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/recoveryPoints/read Read any Replication Recovery Points Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/repairReplication/action Repair replication Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/reProtect/action ReProtect Protected Item Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/switchprotection/action Switch Protection Container Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/testFailover/action Test Failover Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/testFailoverCleanup/action Test Failover Cleanup Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/unplannedFailover/action Failover Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/updateMobilityService/action Update Mobility Service Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectionContainerMappings/read Read any Protection Container Mappings Microsoft.RecoveryServices /vaults/replicationFabrics/replicationRecoveryServicesProviders/read Read any Recovery Services Providers Microsoft.RecoveryServices /vaults/replicationFabrics/replicationRecoveryServicesProviders/refreshProvider/action Refresh Provider Microsoft.RecoveryServices /vaults/replicationFabrics/replicationStorageClassifications/read Read any Storage Classifications Microsoft.RecoveryServices /vaults/replicationFabrics/replicationStorageClassifications/replicationStorageClassificationMappings/read Read any Storage Classification Mappings Microsoft.RecoveryServices /vaults/replicationFabrics/replicationvCenters/read Read any vCenters Microsoft.RecoveryServices /vaults/replicationJobs/* Create and manage replication jobs Microsoft.RecoveryServices /vaults/replicationPolicies/read Read any Policies Microsoft.RecoveryServices /vaults/replicationRecoveryPlans/failoverCommit/action Failover Commit Recovery Plan Microsoft.RecoveryServices /vaults/replicationRecoveryPlans/plannedFailover/action Planned Failover Recovery Plan Microsoft.RecoveryServices /vaults/replicationRecoveryPlans/read Read any Recovery Plans Microsoft.RecoveryServices /vaults/replicationRecoveryPlans/reProtect/action ReProtect Recovery Plan Microsoft.RecoveryServices /vaults/replicationRecoveryPlans/testFailover/action Test Failover Recovery Plan Microsoft.RecoveryServices /vaults/replicationRecoveryPlans/testFailoverCleanup/action Test Failover Cleanup Recovery Plan Microsoft.RecoveryServices /vaults/replicationRecoveryPlans/unplannedFailover/action Failover Recovery Plan Microsoft.RecoveryServices /vaults/replicationVaultSettings/read Read any Microsoft.RecoveryServices /Vaults/monitoringAlerts/* Read alerts for the Recovery services vault Microsoft.RecoveryServices /Vaults/monitoringConfigurations/notificationConfiguration/read Microsoft.RecoveryServices /Vaults/storageConfig/read Microsoft.RecoveryServices /Vaults/tokenInfo/read Microsoft.RecoveryServices /Vaults/usages/read Returns usage details for a Recovery Services Vault. Microsoft.RecoveryServices /Vaults/vaultTokens/read The Vault Token operation can be used to get Vault Token for vault level backend operations. Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Storage /storageAccounts/read Returns the list of storage accounts or gets the properties for the specified storage account. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you failover and failback but not perform other Site Recovery management operations", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/494ae006-db33-4328-bf46-533a6560a3ca", "name": "494ae006-db33-4328-bf46-533a6560a3ca", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Network/virtualNetworks/read", "Microsoft.RecoveryServices/locations/allocatedStamp/read", "Microsoft.RecoveryServices/locations/allocateStamp/action", "Microsoft.RecoveryServices/Vaults/extendedInformation/read", "Microsoft.RecoveryServices/Vaults/read", "Microsoft.RecoveryServices/Vaults/refreshContainers/read", "Microsoft.RecoveryServices/Vaults/registeredIdentities/operationResults/read", "Microsoft.RecoveryServices/Vaults/registeredIdentities/read", "Microsoft.RecoveryServices/vaults/replicationAlertSettings/read", "Microsoft.RecoveryServices/vaults/replicationEvents/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/checkConsistency/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/reassociateGateway/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/renewcertificate/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationNetworks/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationNetworks/replicationNetworkMappings/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectableItems/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/applyRecoveryPoint/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/failoverCommit/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/plannedFailover/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/recoveryPoints/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/repairReplication/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/reProtect/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/switchprotection/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/testFailover/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/testFailoverCleanup/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/unplannedFailover/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/updateMobilityService/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectionContainerMappings/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationRecoveryServicesProviders/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationRecoveryServicesProviders/refreshProvider/action", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationStorageClassifications/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationStorageClassifications/replicationStorageClassificationMappings/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationvCenters/read", "Microsoft.RecoveryServices/vaults/replicationJobs/*", "Microsoft.RecoveryServices/vaults/replicationPolicies/read", "Microsoft.RecoveryServices/vaults/replicationRecoveryPlans/failoverCommit/action", "Microsoft.RecoveryServices/vaults/replicationRecoveryPlans/plannedFailover/action", "Microsoft.RecoveryServices/vaults/replicationRecoveryPlans/read", "Microsoft.RecoveryServices/vaults/replicationRecoveryPlans/reProtect/action", "Microsoft.RecoveryServices/vaults/replicationRecoveryPlans/testFailover/action", "Microsoft.RecoveryServices/vaults/replicationRecoveryPlans/testFailoverCleanup/action", "Microsoft.RecoveryServices/vaults/replicationRecoveryPlans/unplannedFailover/action", "Microsoft.RecoveryServices/vaults/replicationVaultSettings/read", "Microsoft.RecoveryServices/Vaults/monitoringAlerts/*", "Microsoft.RecoveryServices/Vaults/monitoringConfigurations/notificationConfiguration/read", "Microsoft.RecoveryServices/Vaults/storageConfig/read", "Microsoft.RecoveryServices/Vaults/tokenInfo/read", "Microsoft.RecoveryServices/Vaults/usages/read", "Microsoft.RecoveryServices/Vaults/vaultTokens/read", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Storage/storageAccounts/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Site Recovery Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you view Site Recovery status but not perform other management operations Learn more
Microsoft.RecoveryServices /locations/allocatedStamp/read GetAllocatedStamp is internal operation used by service Microsoft.RecoveryServices /Vaults/extendedInformation/read The Get Extended Info operation gets an object's Extended Info representing the Azure resource of type ?vault? Microsoft.RecoveryServices /Vaults/monitoringAlerts/read Gets the alerts for the Recovery services vault. Microsoft.RecoveryServices /Vaults/monitoringConfigurations/notificationConfiguration/read Microsoft.RecoveryServices /Vaults/read The Get Vault operation gets an object representing the Azure resource of type 'vault' Microsoft.RecoveryServices /Vaults/refreshContainers/read Microsoft.RecoveryServices /Vaults/registeredIdentities/operationResults/read The Get Operation Results operation can be used get the operation status and result for the asynchronously submitted operation Microsoft.RecoveryServices /Vaults/registeredIdentities/read The Get Containers operation can be used get the containers registered for a resource. Microsoft.RecoveryServices /vaults/replicationAlertSettings/read Read any Alerts Settings Microsoft.RecoveryServices /vaults/replicationEvents/read Read any Events Microsoft.RecoveryServices /vaults/replicationFabrics/read Read any Fabrics Microsoft.RecoveryServices /vaults/replicationFabrics/replicationNetworks/read Read any Networks Microsoft.RecoveryServices /vaults/replicationFabrics/replicationNetworks/replicationNetworkMappings/read Read any Network Mappings Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/read Read any Protection Containers Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectableItems/read Read any Protectable Items Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/read Read any Protected Items Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/recoveryPoints/read Read any Replication Recovery Points Microsoft.RecoveryServices /vaults/replicationFabrics/replicationProtectionContainers/replicationProtectionContainerMappings/read Read any Protection Container Mappings Microsoft.RecoveryServices /vaults/replicationFabrics/replicationRecoveryServicesProviders/read Read any Recovery Services Providers Microsoft.RecoveryServices /vaults/replicationFabrics/replicationStorageClassifications/read Read any Storage Classifications Microsoft.RecoveryServices /vaults/replicationFabrics/replicationStorageClassifications/replicationStorageClassificationMappings/read Read any Storage Classification Mappings Microsoft.RecoveryServices /vaults/replicationFabrics/replicationvCenters/read Read any vCenters Microsoft.RecoveryServices /vaults/replicationJobs/read Read any Jobs Microsoft.RecoveryServices /vaults/replicationPolicies/read Read any Policies Microsoft.RecoveryServices /vaults/replicationRecoveryPlans/read Read any Recovery Plans Microsoft.RecoveryServices /vaults/replicationVaultSettings/read Read any Microsoft.RecoveryServices /Vaults/storageConfig/read Microsoft.RecoveryServices /Vaults/tokenInfo/read Microsoft.RecoveryServices /Vaults/usages/read Returns usage details for a Recovery Services Vault. Microsoft.RecoveryServices /Vaults/vaultTokens/read The Vault Token operation can be used to get Vault Token for vault level backend operations. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you view Site Recovery status but not perform other management operations", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/dbaa88c4-0c30-4179-9fb3-46319faa6149", "name": "dbaa88c4-0c30-4179-9fb3-46319faa6149", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.RecoveryServices/locations/allocatedStamp/read", "Microsoft.RecoveryServices/Vaults/extendedInformation/read", "Microsoft.RecoveryServices/Vaults/monitoringAlerts/read", "Microsoft.RecoveryServices/Vaults/monitoringConfigurations/notificationConfiguration/read", "Microsoft.RecoveryServices/Vaults/read", "Microsoft.RecoveryServices/Vaults/refreshContainers/read", "Microsoft.RecoveryServices/Vaults/registeredIdentities/operationResults/read", "Microsoft.RecoveryServices/Vaults/registeredIdentities/read", "Microsoft.RecoveryServices/vaults/replicationAlertSettings/read", "Microsoft.RecoveryServices/vaults/replicationEvents/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationNetworks/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationNetworks/replicationNetworkMappings/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectableItems/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectedItems/recoveryPoints/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationProtectionContainers/replicationProtectionContainerMappings/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationRecoveryServicesProviders/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationStorageClassifications/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationStorageClassifications/replicationStorageClassificationMappings/read", "Microsoft.RecoveryServices/vaults/replicationFabrics/replicationvCenters/read", "Microsoft.RecoveryServices/vaults/replicationJobs/read", "Microsoft.RecoveryServices/vaults/replicationPolicies/read", "Microsoft.RecoveryServices/vaults/replicationRecoveryPlans/read", "Microsoft.RecoveryServices/vaults/replicationVaultSettings/read", "Microsoft.RecoveryServices/Vaults/storageConfig/read", "Microsoft.RecoveryServices/Vaults/tokenInfo/read", "Microsoft.RecoveryServices/Vaults/usages/read", "Microsoft.RecoveryServices/Vaults/vaultTokens/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Site Recovery Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you create and manage Support requests Learn more
"description": "Lets you create and manage Support requests", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/cfd33db0-3dd1-45e3-aa9d-cdbdf3b6f24e", "name": "cfd33db0-3dd1-45e3-aa9d-cdbdf3b6f24e", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Support Request Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage tags on entities, without providing access to the entities themselves. Learn more
Microsoft.Resources /subscriptions/resourceGroups/resources/read Gets the resources for the resource group. Microsoft.Resources /subscriptions/resources/read Gets resources of a subscription. Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Insights /alertRules/* Create and manage a classic metric alert Microsoft.Support /* Create and update a support ticket Microsoft.Resources /tags/* NotActions DataActions NotDataActions "description": "Lets you manage tags on entities, without providing access to the entities themselves.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/4a9ae827-6dc8-4573-8ac7-8239d42aa03f", "name": "4a9ae827-6dc8-4573-8ac7-8239d42aa03f", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/subscriptions/resourceGroups/resources/read", "Microsoft.Resources/subscriptions/resources/read", "Microsoft.Resources/deployments/*", "Microsoft.Insights/alertRules/*", "Microsoft.Support/*", "Microsoft.Resources/tags/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Tag Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows full access to Template Spec operations at the assigned scope.
Microsoft.Resources /templateSpecs/* Create and manage template specs and template spec versions Microsoft.Authorization /*/read Read roles and role assignments Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. NotActions DataActions NotDataActions "description": "Allows full access to Template Spec operations at the assigned scope.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/1c9b6475-caf0-4164-b5a1-2142a7116f4b", "name": "1c9b6475-caf0-4164-b5a1-2142a7116f4b", "permissions": [ "actions": [ "Microsoft.Resources/templateSpecs/*", "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Template Spec Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows read access to Template Specs at the assigned scope.
Microsoft.Resources /templateSpecs/*/read Get or list template specs and template spec versions NotActions DataActions NotDataActions "description": "Allows read access to Template Specs at the assigned scope.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/392ae280-861d-42bd-9ea5-08ee6d83b80e", "name": "392ae280-861d-42bd-9ea5-08ee6d83b80e", "permissions": [ "actions": [ "Microsoft.Resources/templateSpecs/*/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Template Spec Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Contributor of the Desktop Virtualization Application Group. Learn more
"description": "Contributor of the Desktop Virtualization Application Group.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/86240b0e-9422-4c43-887b-b61143f32ba8", "name": "86240b0e-9422-4c43-887b-b61143f32ba8", "permissions": [ "actions": [ "Microsoft.DesktopVirtualization/applicationgroups/*", "Microsoft.DesktopVirtualization/hostpools/read", "Microsoft.DesktopVirtualization/hostpools/sessionhosts/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/*", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Desktop Virtualization Application Group Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Reader of the Desktop Virtualization Application Group. Learn more
"description": "Reader of the Desktop Virtualization Application Group.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/aebf23d0-b568-4e86-b8f9-fe83a2c6ab55", "name": "aebf23d0-b568-4e86-b8f9-fe83a2c6ab55", "permissions": [ "actions": [ "Microsoft.DesktopVirtualization/applicationgroups/*/read", "Microsoft.DesktopVirtualization/applicationgroups/read", "Microsoft.DesktopVirtualization/hostpools/read", "Microsoft.DesktopVirtualization/hostpools/sessionhosts/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/read", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Desktop Virtualization Application Group Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Contributor of Desktop Virtualization. Learn more
"description": "Contributor of Desktop Virtualization.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/082f0a83-3be5-4ba1-904c-961cca79b387", "name": "082f0a83-3be5-4ba1-904c-961cca79b387", "permissions": [ "actions": [ "Microsoft.DesktopVirtualization/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/*", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Desktop Virtualization Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Contributor of the Desktop Virtualization Host Pool. Learn more
"description": "Contributor of the Desktop Virtualization Host Pool.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/e307426c-f9b6-4e81-87de-d99efb3c32bc", "name": "e307426c-f9b6-4e81-87de-d99efb3c32bc", "permissions": [ "actions": [ "Microsoft.DesktopVirtualization/hostpools/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/*", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Desktop Virtualization Host Pool Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Reader of the Desktop Virtualization Host Pool. Learn more
"description": "Reader of the Desktop Virtualization Host Pool.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/ceadfde2-b300-400a-ab7b-6143895aa822", "name": "ceadfde2-b300-400a-ab7b-6143895aa822", "permissions": [ "actions": [ "Microsoft.DesktopVirtualization/hostpools/*/read", "Microsoft.DesktopVirtualization/hostpools/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/read", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Desktop Virtualization Host Pool Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Reader of Desktop Virtualization. Learn more
"description": "Reader of Desktop Virtualization.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/49a72310-ab8d-41df-bbb0-79b649203868", "name": "49a72310-ab8d-41df-bbb0-79b649203868", "permissions": [ "actions": [ "Microsoft.DesktopVirtualization/*/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/read", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Desktop Virtualization Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Operator of the Desktop Virtualization Session Host. Learn more
"description": "Operator of the Desktop Virtualization Session Host.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/2ad6aaab-ead9-4eaa-8ac5-da422f562408", "name": "2ad6aaab-ead9-4eaa-8ac5-da422f562408", "permissions": [ "actions": [ "Microsoft.DesktopVirtualization/hostpools/read", "Microsoft.DesktopVirtualization/hostpools/sessionhosts/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/*", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Desktop Virtualization Session Host Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Allows user to use the applications in an application group. Learn more
Microsoft.DesktopVirtualization /applicationGroups/useApplications/action Use ApplicationGroup NotDataActions "description": "Allows user to use the applications in an application group.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/1d18fff3-a72a-46b5-b4a9-0b38a3cd7e63", "name": "1d18fff3-a72a-46b5-b4a9-0b38a3cd7e63", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.DesktopVirtualization/applicationGroups/useApplications/action" "notDataActions": [] "roleName": "Desktop Virtualization User", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Operator of the Desktop Virtualization User Session. Learn more
"description": "Operator of the Desktop Virtualization Uesr Session.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/ea4bfff8-7fb4-485a-aadd-d4129a0ffaa6", "name": "ea4bfff8-7fb4-485a-aadd-d4129a0ffaa6", "permissions": [ "actions": [ "Microsoft.DesktopVirtualization/hostpools/read", "Microsoft.DesktopVirtualization/hostpools/sessionhosts/read", "Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/*", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Desktop Virtualization User Session Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Contributor of the Desktop Virtualization Workspace. Learn more
"description": "Contributor of the Desktop Virtualization Workspace.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/21efdde3-836f-432b-bf3d-3e8e734d4b2b", "name": "21efdde3-836f-432b-bf3d-3e8e734d4b2b", "permissions": [ "actions": [ "Microsoft.DesktopVirtualization/workspaces/*", "Microsoft.DesktopVirtualization/applicationgroups/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/*", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Desktop Virtualization Workspace Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Reader of the Desktop Virtualization Workspace. Learn more
"description": "Reader of the Desktop Virtualization Workspace.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/0fa44ee9-7a7d-466b-9bb2-2bf446b1204d", "name": "0fa44ee9-7a7d-466b-9bb2-2bf446b1204d", "permissions": [ "actions": [ "Microsoft.DesktopVirtualization/workspaces/read", "Microsoft.DesktopVirtualization/applicationgroups/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/read", "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Desktop Virtualization Workspace Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Full access role for Digital Twins data-plane Learn more
Microsoft.DigitalTwins /digitaltwins/relationships/* Read, create, update, or delete any Digital Twin Relationship Microsoft.DigitalTwins /eventroutes/* Read, delete, create, or update any Event Route Microsoft.DigitalTwins /jobs/* Microsoft.DigitalTwins /models/* Read, create, update, or delete any Model Microsoft.DigitalTwins /query/* Query any Digital Twins Graph NotDataActions "description": "Full access role for Digital Twins data-plane", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/bcd981a7-7f74-457b-83e1-cceb9e632ffe", "name": "bcd981a7-7f74-457b-83e1-cceb9e632ffe", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.DigitalTwins/digitaltwins/*", "Microsoft.DigitalTwins/digitaltwins/commands/*", "Microsoft.DigitalTwins/digitaltwins/relationships/*", "Microsoft.DigitalTwins/eventroutes/*", "Microsoft.DigitalTwins/jobs/*", "Microsoft.DigitalTwins/models/*", "Microsoft.DigitalTwins/query/*" "notDataActions": [] "roleName": "Azure Digital Twins Data Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Read-only role for Digital Twins data-plane properties Learn more
Microsoft.DigitalTwins /digitaltwins/relationships/read Read any Digital Twin Relationship Microsoft.DigitalTwins /eventroutes/read Read any Event Route Microsoft.DigitalTwins /jobs/import/read Read any Bulk Import Job Microsoft.DigitalTwins /models/read Read any Model Microsoft.DigitalTwins /query/action Query any Digital Twins Graph NotDataActions "description": "Read-only role for Digital Twins data-plane properties", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/d57506d4-4c8d-48b1-8587-93c323f6a5a3", "name": "d57506d4-4c8d-48b1-8587-93c323f6a5a3", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.DigitalTwins/digitaltwins/read", "Microsoft.DigitalTwins/digitaltwins/relationships/read", "Microsoft.DigitalTwins/eventroutes/read", "Microsoft.DigitalTwins/jobs/import/read", "Microsoft.DigitalTwins/models/read", "Microsoft.DigitalTwins/query/action" "notDataActions": [] "roleName": "Azure Digital Twins Data Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage BizTalk services, but not access to them.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage BizTalk services, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/5e3c6656-6cfa-4708-81fe-0de47ac73342", "name": "5e3c6656-6cfa-4708-81fe-0de47ac73342", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.BizTalkServices/BizTalk/*", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "BizTalk Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Perform all Grafana operations, including the ability to manage data sources, create dashboards, and manage role assignments within Grafana. Learn more
"description": "Built-in Grafana admin role", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/22926164-76b3-42b3-bc55-97df8dab3e41", "name": "22926164-76b3-42b3-bc55-97df8dab3e41", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Dashboard/grafana/ActAsGrafanaAdmin/action" "notDataActions": [] "roleName": "Grafana Admin", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"View and edit a Grafana instance, including its dashboards and alerts. Learn more
"description": "Built-in Grafana Editor role", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/a79a5197-3a5c-4973-a920-486035ffd60f", "name": "a79a5197-3a5c-4973-a920-486035ffd60f", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Dashboard/grafana/ActAsGrafanaEditor/action" "notDataActions": [] "roleName": "Grafana Editor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"View a Grafana instance, including its dashboards and alerts. Learn more
"description": "Built-in Grafana Viewer role", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/60921a7e-fef1-4a43-9b16-a26c52ad4769", "name": "60921a7e-fef1-4a43-9b16-a26c52ad4769", "permissions": [ "actions": [], "notActions": [], "dataActions": [ "Microsoft.Dashboard/grafana/ActAsGrafanaViewer/action" "notDataActions": [] "roleName": "Grafana Viewer", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"View, create, update, delete and execute load tests. View and list load test resources but can not make any changes. Learn more
"description": "View, create, update, delete and execute load tests. View and list load test resources but can not make any changes.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/749a398d-560b-491b-bb21-08924219302e", "name": "749a398d-560b-491b-bb21-08924219302e", "permissions": [ "actions": [ "Microsoft.LoadTestService/*/read", "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Insights/alertRules/*" "notActions": [], "dataActions": [ "Microsoft.LoadTestService/loadtests/*" "notDataActions": [] "roleName": "Load Test Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Execute all operations on load test resources and load tests Learn more
"description": "Execute all operations on load test resources and load tests", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/45bb0b16-2f0c-4e78-afaa-a07599b003f6", "name": "45bb0b16-2f0c-4e78-afaa-a07599b003f6", "permissions": [ "actions": [ "Microsoft.LoadTestService/*", "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Insights/alertRules/*" "notActions": [], "dataActions": [ "Microsoft.LoadTestService/*" "notDataActions": [] "roleName": "Load Test Owner", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"View and list all load tests and load test resources but can not make any changes Learn more
"description": "View and list all load tests and load test resources but can not make any changes", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/3ae3fb29-0000-4ccd-bf80-542e7b26e081", "name": "3ae3fb29-0000-4ccd-bf80-542e7b26e081", "permissions": [ "actions": [ "Microsoft.LoadTestService/*/read", "Microsoft.Authorization/*/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Insights/alertRules/*" "notActions": [], "dataActions": [ "Microsoft.LoadTestService/loadtests/readTest/action" "notDataActions": [] "roleName": "Load Test Reader", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Lets you manage Scheduler job collections, but not access to them.
Microsoft.ResourceHealth /availabilityStatuses/read Gets the availability statuses for all resources in the specified scope Microsoft.Resources /deployments/* Create and manage a deployment Microsoft.Resources /subscriptions/resourceGroups/read Gets or lists resource groups. Microsoft.Scheduler/jobcollections/* Create and manage job collections Microsoft.Support /* Create and update a support ticket NotActions DataActions NotDataActions "description": "Lets you manage Scheduler job collections, but not access to them.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/188a0f2f-5c9e-469b-ae67-2aa5ce574b94", "name": "188a0f2f-5c9e-469b-ae67-2aa5ce574b94", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Insights/alertRules/*", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Scheduler/jobcollections/*", "Microsoft.Support/*" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Scheduler Job Collections Contributor", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"Services Hub Operator allows you to perform all read, write, and deletion operations related to Services Hub Connectors. Learn more
Microsoft.ServicesHub /connectors/checkAssessmentEntitlement/action Lists the Assessment Entitlements for a given Services Hub Workspace Microsoft.ServicesHub /supportOfferingEntitlement/read View the Support Offering Entitlements for a given Services Hub Workspace Microsoft.ServicesHub /workspaces/read List the Services Hub Workspaces for a given User NotActions DataActions NotDataActions "description": "Services Hub Operator allows you to perform all read, write, and deletion operations related to Services Hub Connectors.", "id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/82200a5b-e217-47a5-b665-6d8765ee745b", "name": "82200a5b-e217-47a5-b665-6d8765ee745b", "permissions": [ "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Resources/deployments/*", "Microsoft.ServicesHub/connectors/write", "Microsoft.ServicesHub/connectors/read", "Microsoft.ServicesHub/connectors/delete", "Microsoft.ServicesHub/connectors/checkAssessmentEntitlement/action", "Microsoft.ServicesHub/supportOfferingEntitlement/read", "Microsoft.ServicesHub/workspaces/read" "notActions": [], "dataActions": [], "notDataActions": [] "roleName": "Services Hub Operator", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions"
![]() |
文雅的炒饭 · As a reader --> AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models - 阿洛萌萌哒 - 博 1 年前 |
![]() |
八块腹肌的葡萄酒 · 最近邻插值和双线性插值的算法实现 - 简书 2 年前 |