Skip to content

Commit 324e7c6

Browse files
authored
Merge pull request #273749 from rolyon/rolyon-rbac-roles-april2024
[Azure RBAC] Roles and permissions updates for April 2024
2 parents 3a28c12 + 48bad1f commit 324e7c6

39 files changed

+788
-497
lines changed

articles/role-based-access-control/built-in-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.workload: identity
77
author: rolyon
88
manager: amycolannino
99
ms.author: rolyon
10-
ms.date: 04/13/2024
10+
ms.date: 04/25/2024
1111
ms.custom: generated
1212
---
1313

@@ -311,7 +311,7 @@ The following table provides a brief description of each built-in role. Click th
311311
> | <a name='logic-app-operator'></a>[Logic App Operator](./built-in-roles/integration.md#logic-app-operator) | Lets you read, enable, and disable logic apps, but not edit or update them. | 515c2055-d9d4-4321-b1b9-bd0c9a0f79fe |
312312
> | <a name='logic-apps-standard-contributor-preview'></a>[Logic Apps Standard Contributor (Preview)](./built-in-roles/integration.md#logic-apps-standard-contributor-preview) | You can manage all aspects of a Standard logic app and workflows. You can't change access or ownership. | ad710c24-b039-4e85-a019-deb4a06e8570 |
313313
> | <a name='logic-apps-standard-developer-preview'></a>[Logic Apps Standard Developer (Preview)](./built-in-roles/integration.md#logic-apps-standard-developer-preview) | You can create and edit workflows, connections, and settings for a Standard logic app. You can't make changes outside the workflow scope. | 523776ba-4eb2-4600-a3c8-f2dc93da4bdb |
314-
> | <a name='logic-apps-standard-operator-preview'></a>[Logic Apps Standard Operator (Preview)](./built-in-roles/integration.md#logic-apps-standard-operator-preview) | You can enable, resubmit, and disable workflows as well as create connections. You can't edit workflows or settings. | b70c96e9-66fe-4c09-b6e7-c98e69c98555 |
314+
> | <a name='logic-apps-standard-operator-preview'></a>[Logic Apps Standard Operator (Preview)](./built-in-roles/integration.md#logic-apps-standard-operator-preview) | You can enable and disable the logic app, resubmit workflow runs, as well as create connections. You can't edit workflows or settings. | b70c96e9-66fe-4c09-b6e7-c98e69c98555 |
315315
> | <a name='logic-apps-standard-reader-preview'></a>[Logic Apps Standard Reader (Preview)](./built-in-roles/integration.md#logic-apps-standard-reader-preview) | You have read-only access to all resources in a Standard logic app and workflows, including the workflow runs and their history. | 4accf36b-2c05-432f-91c8-5c532dff4c73 |
316316
> | <a name='scheduler-job-collections-contributor'></a>[Scheduler Job Collections Contributor](./built-in-roles/integration.md#scheduler-job-collections-contributor) | Lets you manage Scheduler job collections, but not access to them. | 188a0f2f-5c9e-469b-ae67-2aa5ce574b94 |
317317
> | <a name='services-hub-operator'></a>[Services Hub Operator](./built-in-roles/integration.md#services-hub-operator) | Services Hub Operator allows you to perform all read, write, and deletion operations related to Services Hub Connectors. | 82200a5b-e217-47a5-b665-6d8765ee745b |

articles/role-based-access-control/built-in-roles/ai-machine-learning.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.workload: identity
77
author: rolyon
88
manager: amycolannino
99
ms.author: rolyon
10-
ms.date: 03/01/2024
10+
ms.date: 04/25/2024
1111
ms.custom: generated
1212
---
1313

@@ -679,6 +679,7 @@ Read access to view files, models, deployments. The ability to create completion
679679
> | [Microsoft.CognitiveServices](../permissions/ai-machine-learning.md#microsoftcognitiveservices)/accounts/OpenAI/engines/completions/action | Create a completion from a chosen model |
680680
> | [Microsoft.CognitiveServices](../permissions/ai-machine-learning.md#microsoftcognitiveservices)/accounts/OpenAI/engines/search/action | Search for the most relevant documents using the current engine. |
681681
> | [Microsoft.CognitiveServices](../permissions/ai-machine-learning.md#microsoftcognitiveservices)/accounts/OpenAI/engines/generate/action | (Intended for browsers only.) Stream generated text from the model via GET request. This method is provided because the browser-native EventSource method can only send GET requests. It supports a more limited set of configuration options than the POST variant. |
682+
> | [Microsoft.CognitiveServices](../permissions/ai-machine-learning.md#microsoftcognitiveservices)/accounts/OpenAI/deployments/audio/action | Return the transcript or translation for a given audio file. |
682683
> | [Microsoft.CognitiveServices](../permissions/ai-machine-learning.md#microsoftcognitiveservices)/accounts/OpenAI/deployments/search/action | Search for the most relevant documents using the current engine. |
683684
> | [Microsoft.CognitiveServices](../permissions/ai-machine-learning.md#microsoftcognitiveservices)/accounts/OpenAI/deployments/completions/action | Create a completion from a chosen model. |
684685
> | [Microsoft.CognitiveServices](../permissions/ai-machine-learning.md#microsoftcognitiveservices)/accounts/OpenAI/deployments/chat/completions/action | Creates a completion for the chat message |
@@ -693,7 +694,7 @@ Read access to view files, models, deployments. The ability to create completion
693694
"assignableScopes": [
694695
"/"
695696
],
696-
"description": "Ability to view files, models, deployments. Readers are able to call inference operations such as chat completions and image generation.",
697+
"description": "Ability to view files, models, deployments. Readers can't make any changes They can inference and create images",
697698
"id": "/providers/Microsoft.Authorization/roleDefinitions/5e0bd9bd-7b93-4f28-af87-19fc36ad61bd",
698699
"name": "5e0bd9bd-7b93-4f28-af87-19fc36ad61bd",
699700
"permissions": [
@@ -709,6 +710,7 @@ Read access to view files, models, deployments. The ability to create completion
709710
"Microsoft.CognitiveServices/accounts/OpenAI/engines/completions/action",
710711
"Microsoft.CognitiveServices/accounts/OpenAI/engines/search/action",
711712
"Microsoft.CognitiveServices/accounts/OpenAI/engines/generate/action",
713+
"Microsoft.CognitiveServices/accounts/OpenAI/deployments/audio/action",
712714
"Microsoft.CognitiveServices/accounts/OpenAI/deployments/search/action",
713715
"Microsoft.CognitiveServices/accounts/OpenAI/deployments/completions/action",
714716
"Microsoft.CognitiveServices/accounts/OpenAI/deployments/chat/completions/action",
@@ -1170,4 +1172,4 @@ Lets you manage Search services, but not access to them.
11701172

11711173
## Next steps
11721174

1173-
- [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal)
1175+
- [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal)

articles/role-based-access-control/built-in-roles/analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.workload: identity
77
author: rolyon
88
manager: amycolannino
99
ms.author: rolyon
10-
ms.date: 03/01/2024
10+
ms.date: 04/25/2024
1111
ms.custom: generated
1212
---
1313

articles/role-based-access-control/built-in-roles/compute.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.workload: identity
77
author: rolyon
88
manager: amycolannino
99
ms.author: rolyon
10-
ms.date: 03/01/2024
10+
ms.date: 04/25/2024
1111
ms.custom: generated
1212
---
1313

articles/role-based-access-control/built-in-roles/containers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.workload: identity
77
author: rolyon
88
manager: amycolannino
99
ms.author: rolyon
10-
ms.date: 03/01/2024
10+
ms.date: 04/25/2024
1111
ms.custom: generated
1212
---
1313

articles/role-based-access-control/built-in-roles/databases.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.workload: identity
77
author: rolyon
88
manager: amycolannino
99
ms.author: rolyon
10-
ms.date: 03/01/2024
10+
ms.date: 04/25/2024
1111
ms.custom: generated
1212
---
1313

articles/role-based-access-control/built-in-roles/devops.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.workload: identity
77
author: rolyon
88
manager: amycolannino
99
ms.author: rolyon
10-
ms.date: 03/01/2024
10+
ms.date: 04/25/2024
1111
ms.custom: generated
1212
---
1313

articles/role-based-access-control/built-in-roles/general.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.workload: identity
77
author: rolyon
88
manager: amycolannino
99
ms.author: rolyon
10-
ms.date: 03/01/2024
10+
ms.date: 04/25/2024
1111
ms.custom: generated
1212
---
1313

articles/role-based-access-control/built-in-roles/hybrid-multicloud.md

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.workload: identity
77
author: rolyon
88
manager: amycolannino
99
ms.author: rolyon
10-
ms.date: 03/01/2024
10+
ms.date: 04/25/2024
1111
ms.custom: generated
1212
---
1313

@@ -597,6 +597,17 @@ Grants permissions to view VMs
597597
> | [Microsoft.AzureStackHCI](../permissions/hybrid-multicloud.md#microsoftazurestackhci)/StorageContainers/Read | Gets/Lists storage containers resource |
598598
> | [Microsoft.AzureStackHCI](../permissions/hybrid-multicloud.md#microsoftazurestackhci)/GalleryImages/Read | Gets/Lists gallery images resource |
599599
> | [Microsoft.AzureStackHCI](../permissions/hybrid-multicloud.md#microsoftazurestackhci)/MarketplaceGalleryImages/Read | Gets/Lists market place gallery images resource |
600+
> | [Microsoft.HybridCompute](../permissions/hybrid-multicloud.md#microsofthybridcompute)/licenses/read | Reads any Azure Arc licenses |
601+
> | [Microsoft.HybridCompute](../permissions/hybrid-multicloud.md#microsofthybridcompute)/machines/extensions/read | Reads any Azure Arc extensions |
602+
> | [Microsoft.HybridCompute](../permissions/hybrid-multicloud.md#microsofthybridcompute)/machines/licenseProfiles/read | Reads any Azure Arc licenseProfiles |
603+
> | [Microsoft.HybridCompute](../permissions/hybrid-multicloud.md#microsofthybridcompute)/machines/patchAssessmentResults/read | Reads any Azure Arc patchAssessmentResults |
604+
> | [Microsoft.HybridCompute](../permissions/hybrid-multicloud.md#microsofthybridcompute)/machines/patchAssessmentResults/softwarePatches/read | Reads any Azure Arc patchAssessmentResults/softwarePatches |
605+
> | [Microsoft.HybridCompute](../permissions/hybrid-multicloud.md#microsofthybridcompute)/machines/patchInstallationResults/read | Reads any Azure Arc patchInstallationResults |
606+
> | [Microsoft.HybridCompute](../permissions/hybrid-multicloud.md#microsofthybridcompute)/machines/patchInstallationResults/softwarePatches/read | Reads any Azure Arc patchInstallationResults/softwarePatches |
607+
> | [Microsoft.HybridCompute](../permissions/hybrid-multicloud.md#microsofthybridcompute)/machines/read | Read any Azure Arc machines |
608+
> | [Microsoft.HybridCompute](../permissions/hybrid-multicloud.md#microsofthybridcompute)/privateLinkScopes/networkSecurityPerimeterConfigurations/read | Reads any Azure Arc networkSecurityPerimeterConfigurations |
609+
> | [Microsoft.HybridCompute](../permissions/hybrid-multicloud.md#microsofthybridcompute)/privateLinkScopes/privateEndpointConnections/read | Read any Azure Arc privateEndpointConnections |
610+
> | [Microsoft.HybridCompute](../permissions/hybrid-multicloud.md#microsofthybridcompute)/privateLinkScopes/read | Read any Azure Arc privateLinkScopes |
600611
> | [Microsoft.Insights](../permissions/monitor.md#microsoftinsights)/AlertRules/Write | Create or update a classic metric alert |
601612
> | [Microsoft.Insights](../permissions/monitor.md#microsoftinsights)/AlertRules/Delete | Delete a classic metric alert |
602613
> | [Microsoft.Insights](../permissions/monitor.md#microsoftinsights)/AlertRules/Read | Read a classic metric alert |
@@ -644,6 +655,17 @@ Grants permissions to view VMs
644655
"Microsoft.AzureStackHCI/StorageContainers/Read",
645656
"Microsoft.AzureStackHCI/GalleryImages/Read",
646657
"Microsoft.AzureStackHCI/MarketplaceGalleryImages/Read",
658+
"Microsoft.HybridCompute/licenses/read",
659+
"Microsoft.HybridCompute/machines/extensions/read",
660+
"Microsoft.HybridCompute/machines/licenseProfiles/read",
661+
"Microsoft.HybridCompute/machines/patchAssessmentResults/read",
662+
"Microsoft.HybridCompute/machines/patchAssessmentResults/softwarePatches/read",
663+
"Microsoft.HybridCompute/machines/patchInstallationResults/read",
664+
"Microsoft.HybridCompute/machines/patchInstallationResults/softwarePatches/read",
665+
"Microsoft.HybridCompute/machines/read",
666+
"Microsoft.HybridCompute/privateLinkScopes/networkSecurityPerimeterConfigurations/read",
667+
"Microsoft.HybridCompute/privateLinkScopes/privateEndpointConnections/read",
668+
"Microsoft.HybridCompute/privateLinkScopes/read",
647669
"Microsoft.Insights/AlertRules/Write",
648670
"Microsoft.Insights/AlertRules/Delete",
649671
"Microsoft.Insights/AlertRules/Read",

articles/role-based-access-control/built-in-roles/identity.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.workload: identity
77
author: rolyon
88
manager: amycolannino
99
ms.author: rolyon
10-
ms.date: 03/01/2024
10+
ms.date: 04/25/2024
1111
ms.custom: generated
1212
---
1313

@@ -298,6 +298,10 @@ Create, Read, Update, and Delete User Assigned Identity
298298
> | [Microsoft.ManagedIdentity](../permissions/identity.md#microsoftmanagedidentity)/userAssignedIdentities/read | Gets an existing user assigned identity |
299299
> | [Microsoft.ManagedIdentity](../permissions/identity.md#microsoftmanagedidentity)/userAssignedIdentities/write | Creates a new user assigned identity or updates the tags associated with an existing user assigned identity |
300300
> | [Microsoft.ManagedIdentity](../permissions/identity.md#microsoftmanagedidentity)/userAssignedIdentities/delete | Deletes an existing user assigned identity |
301+
> | [Microsoft.ManagedIdentity](../permissions/identity.md#microsoftmanagedidentity)/userAssignedIdentities/federatedIdentityCredentials/read | Get or list Federated Identity Credentials |
302+
> | [Microsoft.ManagedIdentity](../permissions/identity.md#microsoftmanagedidentity)/userAssignedIdentities/federatedIdentityCredentials/write | Add or update a Federated Identity Credential |
303+
> | [Microsoft.ManagedIdentity](../permissions/identity.md#microsoftmanagedidentity)/userAssignedIdentities/federatedIdentityCredentials/delete | Delete a Federated Identity Credential |
304+
> | [Microsoft.ManagedIdentity](../permissions/identity.md#microsoftmanagedidentity)/userAssignedIdentities/revokeTokens/action | Revoked all the existing tokens on a user assigned identity |
301305
> | [Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/*/read | Read roles and role assignments |
302306
> | [Microsoft.Insights](../permissions/monitor.md#microsoftinsights)/alertRules/* | Create and manage a classic metric alert |
303307
> | [Microsoft.Resources](../permissions/management-and-governance.md#microsoftresources)/subscriptions/resourceGroups/read | Gets or lists resource groups. |
@@ -324,6 +328,10 @@ Create, Read, Update, and Delete User Assigned Identity
324328
"Microsoft.ManagedIdentity/userAssignedIdentities/read",
325329
"Microsoft.ManagedIdentity/userAssignedIdentities/write",
326330
"Microsoft.ManagedIdentity/userAssignedIdentities/delete",
331+
"Microsoft.ManagedIdentity/userAssignedIdentities/federatedIdentityCredentials/read",
332+
"Microsoft.ManagedIdentity/userAssignedIdentities/federatedIdentityCredentials/write",
333+
"Microsoft.ManagedIdentity/userAssignedIdentities/federatedIdentityCredentials/delete",
334+
"Microsoft.ManagedIdentity/userAssignedIdentities/revokeTokens/action",
327335
"Microsoft.Authorization/*/read",
328336
"Microsoft.Insights/alertRules/*",
329337
"Microsoft.Resources/subscriptions/resourceGroups/read",

0 commit comments

Comments
 (0)