Skip to content

Commit 1acdff1

Browse files
committed
Fixing punctuation
1 parent efe24ea commit 1acdff1

File tree

2 files changed

+12
-12
lines changed

2 files changed

+12
-12
lines changed

articles/role-based-access-control/built-in-roles.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -105,24 +105,24 @@ The following table provides a brief description of each built-in role. Click th
105105
> | Built-in role | Description | ID |
106106
> | --- | --- | --- |
107107
> | <a name='avere-contributor'></a>[Avere Contributor](./built-in-roles/storage.md#avere-contributor) | Can create and manage an Avere vFXT cluster. | 4f8fab4f-1852-4a58-a46a-8eaf358af14a |
108-
> | <a name='avere-operator'></a>[Avere Operator](./built-in-roles/storage.md#avere-operator) | Used by the Avere vFXT cluster to manage the cluster | c025889f-8102-4ebf-b32c-fc0c6f0c6bd9 |
108+
> | <a name='avere-operator'></a>[Avere Operator](./built-in-roles/storage.md#avere-operator) | Used by the Avere vFXT cluster to manage the cluster. | c025889f-8102-4ebf-b32c-fc0c6f0c6bd9 |
109109
> | <a name='azure-file-sync-administrator'></a>[Azure File Sync Administrator](./built-in-roles/storage.md#azure-file-sync-administrator) | Provides full access to manage all Azure File Sync (Storage Sync Service) resources, including the ability to assign roles in Azure RBAC. | 92b92042-07d9-4307-87f7-36a593fc5850 |
110110
> | <a name='azure-file-sync-reader'></a>[Azure File Sync Reader](./built-in-roles/storage.md#azure-file-sync-reader) | Provides read access to Azure File Sync service (Storage Sync Service). | 754c1a27-40dc-4708-8ad4-2bffdeee09e8 |
111-
> | <a name='backup-contributor'></a>[Backup Contributor](./built-in-roles/storage.md#backup-contributor) | Lets you manage backup service, but can't create vaults and give access to others | 5e467623-bb1f-42f4-a55d-6e525e11384b |
112-
> | <a name='backup-mua-admin'></a>[Backup MUA Admin](./built-in-roles/storage.md#backup-mua-admin) | Backup MultiUser-Authorization. Can create/delete ResourceGuard | c2a970b4-16a7-4a51-8c84-8a8ea6ee0bb8 |
111+
> | <a name='backup-contributor'></a>[Backup Contributor](./built-in-roles/storage.md#backup-contributor) | Lets you manage backup service, but can't create vaults and give access to others. | 5e467623-bb1f-42f4-a55d-6e525e11384b |
112+
> | <a name='backup-mua-admin'></a>[Backup MUA Admin](./built-in-roles/storage.md#backup-mua-admin) | Backup MultiUser-Authorization. Can create/delete ResourceGuard. | c2a970b4-16a7-4a51-8c84-8a8ea6ee0bb8 |
113113
> | <a name='backup-mua-operator'></a>[Backup MUA Operator](./built-in-roles/storage.md#backup-mua-operator) | Backup MultiUser-Authorization. Allows user to perform critical operation protected by resourceguard | f54b6d04-23c6-443e-b462-9c16ab7b4a52 |
114-
> | <a name='backup-operator'></a>[Backup Operator](./built-in-roles/storage.md#backup-operator) | Lets you manage backup services, except removal of backup, vault creation and giving access to others | 00c29273-979b-4161-815c-10b084fb9324 |
115-
> | <a name='backup-reader'></a>[Backup Reader](./built-in-roles/storage.md#backup-reader) | Can view backup services, but can't make changes | a795c7a0-d4a2-40c1-ae25-d81f01202912 |
114+
> | <a name='backup-operator'></a>[Backup Operator](./built-in-roles/storage.md#backup-operator) | Lets you manage backup services, except removal of backup, vault creation and giving access to others. | 00c29273-979b-4161-815c-10b084fb9324 |
115+
> | <a name='backup-reader'></a>[Backup Reader](./built-in-roles/storage.md#backup-reader) | Can view backup services, but can't make changes. | a795c7a0-d4a2-40c1-ae25-d81f01202912 |
116116
> | <a name='classic-storage-account-contributor'></a>[Classic Storage Account Contributor](./built-in-roles/storage.md#classic-storage-account-contributor) | Lets you manage classic storage accounts, but not access to them. | 86e8f5dc-a6e9-4c67-9d15-de283e8eac25 |
117-
> | <a name='classic-storage-account-key-operator-service-role'></a>[Classic Storage Account Key Operator Service Role](./built-in-roles/storage.md#classic-storage-account-key-operator-service-role) | Classic Storage Account Key Operators are allowed to list and regenerate keys on Classic Storage Accounts | 985d6b00-f706-48f5-a6fe-d0ca12fb668d |
117+
> | <a name='classic-storage-account-key-operator-service-role'></a>[Classic Storage Account Key Operator Service Role](./built-in-roles/storage.md#classic-storage-account-key-operator-service-role) | Classic Storage Account Key Operators are allowed to list and regenerate keys on Classic Storage Accounts. | 985d6b00-f706-48f5-a6fe-d0ca12fb668d |
118118
> | <a name='data-box-contributor'></a>[Data Box Contributor](./built-in-roles/storage.md#data-box-contributor) | Lets you manage everything under Data Box Service except giving access to others. | add466c9-e687-43fc-8d98-dfcf8d720be5 |
119119
> | <a name='data-box-reader'></a>[Data Box Reader](./built-in-roles/storage.md#data-box-reader) | Lets you manage Data Box Service except creating order or editing order details and giving access to others. | 028f4ed7-e2a9-465e-a8f4-9c0ffdfdc027 |
120120
> | <a name='data-lake-analytics-developer'></a>[Data Lake Analytics Developer](./built-in-roles/storage.md#data-lake-analytics-developer) | Lets you submit, monitor, and manage your own jobs but not create or delete Data Lake Analytics accounts. | 47b7735b-770e-4598-a7da-8b91488b4c88 |
121121
> | <a name='defender-for-storage-data-scanner'></a>[Defender for Storage Data Scanner](./built-in-roles/storage.md#defender-for-storage-data-scanner) | Grants access to read blobs and update index tags. This role is used by the data scanner of Defender for Storage. | 1e7ca9b1-60d1-4db8-a914-f2ca1ff27c40 |
122-
> | <a name='elastic-san-network-admin'></a>[Elastic SAN Network Admin](./built-in-roles/storage.md#elastic-san-network-admin) | Allows access to create Private Endpoints on SAN resources, and to read SAN resources | fa6cecf6-5db3-4c43-8470-c540bcb4eafa |
123-
> | <a name='elastic-san-owner'></a>[Elastic SAN Owner](./built-in-roles/storage.md#elastic-san-owner) | Allows for full access to all resources under Azure Elastic SAN including changing network security policies to unblock data path access | 80dcbedb-47ef-405d-95bd-188a1b4ac406 |
124-
> | <a name='elastic-san-reader'></a>[Elastic SAN Reader](./built-in-roles/storage.md#elastic-san-reader) | Allows for control path read access to Azure Elastic SAN | af6a70f8-3c9f-4105-acf1-d719e9fca4ca |
125-
> | <a name='elastic-san-volume-group-owner'></a>[Elastic SAN Volume Group Owner](./built-in-roles/storage.md#elastic-san-volume-group-owner) | Allows for full access to a volume group in Azure Elastic SAN including changing network security policies to unblock data path access | a8281131-f312-4f34-8d98-ae12be9f0d23 |
122+
> | <a name='elastic-san-network-admin'></a>[Elastic SAN Network Admin](./built-in-roles/storage.md#elastic-san-network-admin) | Allows access to create Private Endpoints on SAN resources, and to read SAN resources. | fa6cecf6-5db3-4c43-8470-c540bcb4eafa |
123+
> | <a name='elastic-san-owner'></a>[Elastic SAN Owner](./built-in-roles/storage.md#elastic-san-owner) | Allows for full access to all resources under Azure Elastic SAN including changing network security policies to unblock data path access. | 80dcbedb-47ef-405d-95bd-188a1b4ac406 |
124+
> | <a name='elastic-san-reader'></a>[Elastic SAN Reader](./built-in-roles/storage.md#elastic-san-reader) | Allows for control path read access to Azure Elastic SAN. | af6a70f8-3c9f-4105-acf1-d719e9fca4ca |
125+
> | <a name='elastic-san-volume-group-owner'></a>[Elastic SAN Volume Group Owner](./built-in-roles/storage.md#elastic-san-volume-group-owner) | Allows for full access to a volume group in Azure Elastic SAN including changing network security policies to unblock data path access. | a8281131-f312-4f34-8d98-ae12be9f0d23 |
126126
> | <a name='reader-and-data-access'></a>[Reader and Data Access](./built-in-roles/storage.md#reader-and-data-access) | Lets you view everything but will not let you delete or create a storage account or contained resource. It will also allow read/write access to all data contained in a storage account via access to storage account keys. | c12c1c16-33a1-487b-954d-41c89c60f349 |
127127
> | <a name='storage-account-backup-contributor'></a>[Storage Account Backup Contributor](./built-in-roles/storage.md#storage-account-backup-contributor) | Lets you perform backup and restore operations using Azure Backup on the storage account. | e5e2a7ff-d759-4cd2-bb51-3152d37e2eb1 |
128128
> | <a name='storage-account-contributor'></a>[Storage Account Contributor](./built-in-roles/storage.md#storage-account-contributor) | Permits management of storage accounts. Provides access to the account key, which can be used to access data via Shared Key authorization. | 17d1049b-9a84-46fb-8f53-869881c3d3ab |
@@ -193,7 +193,7 @@ The following table provides a brief description of each built-in role. Click th
193193
> | <a name='azure-arc-kubernetes-admin'></a>[Azure Arc Kubernetes Admin](./built-in-roles/containers.md#azure-arc-kubernetes-admin) | Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces. | dffb1e0c-446f-4dde-a09f-99eb5cc68b96 |
194194
> | <a name='azure-arc-kubernetes-cluster-admin'></a>[Azure Arc Kubernetes Cluster Admin](./built-in-roles/containers.md#azure-arc-kubernetes-cluster-admin) | Lets you manage all resources in the cluster. | 8393591c-06b9-48a2-a542-1bd6b377f6a2 |
195195
> | <a name='azure-arc-kubernetes-viewer'></a>[Azure Arc Kubernetes Viewer](./built-in-roles/containers.md#azure-arc-kubernetes-viewer) | Lets you view all resources in cluster/namespace, except secrets. | 63f0a09d-1495-4db4-a681-037d84835eb4 |
196-
> | <a name='azure-arc-kubernetes-writer'></a>[Azure Arc Kubernetes Writer](./built-in-roles/containers.md#azure-arc-kubernetes-writer) | Lets you update everything in cluster/namespace, except (cluster)roles and (cluster)role bindings. | 5b999177-9696-4545-85c7-50de3797e5a1 |
196+
> | <a name='azure-arc-kubernetes-writer'></a>[Azure Arc Kubernetes Writer](./built-in-roles/containers.md#azure-arc-kubernetes-writer) | Lets you update everything in cluster/namespace, except (cluster) roles and (cluster)role bindings. | 5b999177-9696-4545-85c7-50de3797e5a1 |
197197
> | <a name='azure-container-storage-contributor'></a>[Azure Container Storage Contributor](./built-in-roles/containers.md#azure-container-storage-contributor) | Install Azure Container Storage and manage its storage resources. Includes an ABAC condition to constrain role assignments. | 95dd08a6-00bd-4661-84bf-f6726f83a4d0 |
198198
> | <a name='azure-container-storage-operator'></a>[Azure Container Storage Operator](./built-in-roles/containers.md#azure-container-storage-operator) | Enable a managed identity to perform Azure Container Storage operations, such as manage virtual machines and manage virtual networks. | 08d4c71a-cc63-4ce4-a9c8-5dd251b4d619 |
199199
> | <a name='azure-container-storage-owner'></a>[Azure Container Storage Owner](./built-in-roles/containers.md#azure-container-storage-owner) | Install Azure Container Storage, grant access to its storage resources, and configure Azure Elastic storage area network (SAN). Includes an ABAC condition to constrain role assignments. | 95de85bd-744d-4664-9dde-11430bc34793 |

articles/role-based-access-control/built-in-roles/management-and-governance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ View assessment recommendations, accepted review recommendations, and manage the
5757
],
5858
"roleName": "Advisor Recommendations Contributor (Assessments and Reviews)",
5959
"roleType": "BuiltInRole",
60-
"type": "Microsoft.Authorization/roleDefinitions"
60+
"type": "Microsoft.Authorization/roleDefinitions"S
6161
}
6262
```
6363

0 commit comments

Comments
 (0)