You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/built-in-roles.md
+29-4Lines changed: 29 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.devlang:
12
12
ms.topic: reference
13
13
ms.tgt_pltfrm:
14
14
ms.workload: identity
15
-
ms.date: 10/28/2019
15
+
ms.date: 12/02/2019
16
16
ms.author: rolyon
17
17
ms.reviewer: bagovind
18
18
@@ -119,9 +119,10 @@ The following table provides a brief description of each built-in role. Click th
119
119
> |[Monitoring Reader](#monitoring-reader)| Can read all monitoring data (metrics, logs, etc.). See also [Get started with roles, permissions, and security with Azure Monitor](../azure-monitor/platform/roles-permissions-security.md#built-in-monitoring-roles). | 43d0d8ad-25c7-4714-9337-8ba259a9fe05 |
120
120
> |[Network Contributor](#network-contributor)| Lets you manage networks, but not access to them. | 4d97b98b-1d4f-4787-a291-c67834d212e7 |
121
121
> |[New Relic APM Account Contributor](#new-relic-apm-account-contributor)| Lets you manage New Relic Application Performance Management accounts and applications, but not access to them. | 5d28c62d-5b37-4476-8438-e587778df237 |
122
+
> |[Policy Insights Data Writer (Preview)](#policy-insights-data-writer-preview)| Allows read access to resource policies and write access to resource component policy events. | 66bb4e9e-b016-4a94-8249-4c0511c2be84 |
122
123
> |[Reader and Data Access](#reader-and-data-access)| Lets you view everything but will not let you delete or create a storage account or contained resource. It will also allow read/write access to all data contained in a storage account via access to storage account keys. | c12c1c16-33a1-487b-954d-41c89c60f349 |
123
124
> |[Redis Cache Contributor](#redis-cache-contributor)| Lets you manage Redis caches, but not access to them. | e0f68234-74aa-48ed-b826-c38b57376e17 |
124
-
> |[Resource Policy Contributor (Preview)](#resource-policy-contributor-preview)|(Preview) Backfilled users from EA, with rights to create/modify resource policy, create support ticket and read resources/hierarchy. | 36243c78-bf99-498c-9df9-86d9f8d28608 |
125
+
> |[Resource Policy Contributor](#resource-policy-contributor)|Users with rights to create/modify resource policy, create support ticket and read resources/hierarchy. | 36243c78-bf99-498c-9df9-86d9f8d28608 |
125
126
> |[Scheduler Job Collections Contributor](#scheduler-job-collections-contributor)| Lets you manage Scheduler job collections, but not access to them. | 188a0f2f-5c9e-469b-ae67-2aa5ce574b94 |
126
127
> |[Search Service Contributor](#search-service-contributor)| Lets you manage Search services, but not access to them. | 7ca78c08-252a-4471-8644-bb5ff32d4ba0 |
127
128
> |[Security Admin](#security-admin)| In Security Center only: Can view security policies, view security states, edit security policies, view alerts and recommendations, dismiss alerts and recommendations | fb1c8493-542b-48eb-b624-b4c8fea62acd |
@@ -662,6 +663,7 @@ The following table provides a brief description of each built-in role. Click th
> | Microsoft.OperationalInsights/workspaces/dataSources/read | Get datasources under a workspace. |
722
726
> | Microsoft.Insights/workbooks/read | Read a workbook |
723
727
> | Microsoft.Authorization/*/read | Read roles and role assignments |
@@ -1357,6 +1361,7 @@ The following table provides a brief description of each built-in role. Click th
1357
1361
> | Microsoft.Resources/deployments/*| Create and manage resource group deployments |
1358
1362
> | Microsoft.Resources/subscriptions/resourceGroups/read | Gets or lists resource groups. |
1359
1363
> | Microsoft.Support/*| Create and manage support tickets |
1364
+
> | Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action | Joins resource such as storage account or SQL database to a subnet. Not alertable. |
@@ -1627,6 +1632,7 @@ The following table provides a brief description of each built-in role. Click th
1627
1632
> | Microsoft.Resources/deployments/*| Create and manage resource group deployments |
1628
1633
> | Microsoft.Resources/subscriptions/resourceGroups/read | Gets or lists resource groups. |
1629
1634
> | Microsoft.Support/*| Create and manage support tickets |
1635
+
> | Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action | Joins resource such as storage account or SQL database to a subnet. Not alertable. |
1630
1636
> |**NotActions**||
1631
1637
> |*none*||
1632
1638
> |**DataActions**||
@@ -2135,6 +2141,24 @@ The following table provides a brief description of each built-in role. Click th
2135
2141
> |**NotDataActions**||
2136
2142
> |*none*||
2137
2143
2144
+
## Policy Insights Data Writer (Preview)
2145
+
> [!div class="mx-tableFixed"]
2146
+
> |||
2147
+
> | --- | --- |
2148
+
> |**Description**| Allows read access to resource policies and write access to resource component policy events. |
2149
+
> |**Id**| 66bb4e9e-b016-4a94-8249-4c0511c2be84 |
2150
+
> |**Actions**||
2151
+
> | Microsoft.Authorization/policyassignments/read | Get information about a policy assignment. |
2152
+
> | Microsoft.Authorization/policydefinitions/read | Get information about a policy definition. |
2153
+
> | Microsoft.Authorization/policysetdefinitions/read | Get information about a policy set definition. |
2154
+
> |**NotActions**||
2155
+
> |*none*||
2156
+
> |**DataActions**||
2157
+
> | Microsoft.PolicyInsights/checkDataPolicyCompliance/action | Check the compliance status of a given component against data policies. |
@@ -2173,11 +2197,11 @@ The following table provides a brief description of each built-in role. Click th
2173
2197
> |**NotDataActions**||
2174
2198
> |*none*||
2175
2199
2176
-
## Resource Policy Contributor (Preview)
2200
+
## Resource Policy Contributor
2177
2201
> [!div class="mx-tableFixed"]
2178
2202
> |||
2179
2203
> | --- | --- |
2180
-
> |**Description**|(Preview) Backfilled users from EA, with rights to create/modify resource policy, create support ticket and read resources/hierarchy. |
2204
+
> |**Description**|Users with rights to create/modify resource policy, create support ticket and read resources/hierarchy. |
2181
2205
> |**Id**| 36243c78-bf99-498c-9df9-86d9f8d28608 |
2182
2206
> |**Actions**||
2183
2207
> |*/read | Read resources of all types, except secrets. |
@@ -2339,6 +2363,7 @@ The following table provides a brief description of each built-in role. Click th
2339
2363
> | Microsoft.Resources/deployments/*| Create and manage resource group deployments |
2340
2364
> | Microsoft.Resources/subscriptions/resourceGroups/read | Gets or lists resource groups. |
2341
2365
> | Microsoft.Storage/storageAccounts/read | Returns the list of storage accounts or gets the properties for the specified storage account. |
2366
+
> | Microsoft.RecoveryServices/vaults/replicationOperationStatus/read | Read any Vault Replication Operation Status |
2342
2367
> | Microsoft.Support/*| Create and manage support tickets |
0 commit comments