You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/built-in-roles/privileged.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -177,12 +177,14 @@ Lets one read and manage all the reservations in a tenant
177
177
178
178
Manage access to Azure resources by assigning roles using Azure RBAC. This role does not allow you to manage access using other ways, such as Azure Policy.
> |[Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/roleAssignments/write | Create a role assignment at the specified scope. |
184
186
> |[Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/roleAssignments/delete | Delete a role assignment at the specified scope. |
185
-
> |*/read |Read resources of all types, except secrets. |
187
+
> |*/read |Global read of all Azure resources and all types, except for secrets. |
186
188
> |[Microsoft.Support](../permissions/general.md#microsoftsupport)/*| Create and update a support ticket |
187
189
> |**NotActions**||
188
190
> |*none*||
@@ -222,12 +224,14 @@ Manage access to Azure resources by assigning roles using Azure RBAC. This role
This role includes global read permissions with the `*/read` action. Users with this role can read all Azure resources of all types, except for secrets.
0 commit comments