You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/built-in-roles.md
+11-5Lines changed: 11 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,16 +20,23 @@ This article lists the Azure built-in roles. If you are looking for administrato
20
20
The following table provides a brief description of each built-in role. Click the role name to see the list of `Actions`, `NotActions`, `DataActions`, and `NotDataActions` for each role. For information about what these actions mean and how they apply to the control and data planes, see [Understand Azure role definitions](/azure/role-based-access-control/role-definitions).
21
21
22
22
23
+
## Privileged
24
+
25
+
> [!div class="mx-tableFixed"]
26
+
> | Built-in role | Description | ID |
27
+
> | --- | --- | --- |
28
+
> | <aname='contributor'></a>[Contributor](./built-in-roles/privileged.md#contributor)| Grants full access to manage all resources, but does not allow you to assign roles in Azure RBAC, manage assignments in Azure Blueprints, or share image galleries. | b24988ac-6180-42a0-ab88-20f7382dd24c |
29
+
> | <aname='owner'></a>[Owner](./built-in-roles/privileged.md#owner)| Grants full access to manage all resources, including the ability to assign roles in Azure RBAC. | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 |
30
+
> | <aname='reservations-administrator'></a>[Reservations Administrator](./built-in-roles/privileged.md#reservations-administrator)| Lets one read and manage all the reservations in a tenant | a8889054-8d42-49c9-bc1c-52486c10e7cd |
31
+
> | <aname='role-based-access-control-administrator'></a>[Role Based Access Control Administrator](./built-in-roles/privileged.md#role-based-access-control-administrator)| Manage access to Azure resources by assigning roles using Azure RBAC. This role does not allow you to manage access using other ways, such as Azure Policy. | f58310d9-a9f6-439a-9e8d-f62e7b41a168 |
32
+
> | <aname='user-access-administrator'></a>[User Access Administrator](./built-in-roles/privileged.md#user-access-administrator)| Lets you manage user access to Azure resources. | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 |
33
+
23
34
## General
24
35
25
36
> [!div class="mx-tableFixed"]
26
37
> | Built-in role | Description | ID |
27
38
> | --- | --- | --- |
28
-
> | <aname='contributor'></a>[Contributor](./built-in-roles/general.md#contributor)| Grants full access to manage all resources, but does not allow you to assign roles in Azure RBAC, manage assignments in Azure Blueprints, or share image galleries. | b24988ac-6180-42a0-ab88-20f7382dd24c |
29
-
> | <aname='owner'></a>[Owner](./built-in-roles/general.md#owner)| Grants full access to manage all resources, including the ability to assign roles in Azure RBAC. | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 |
30
39
> | <aname='reader'></a>[Reader](./built-in-roles/general.md#reader)| View all resources, but does not allow you to make any changes. | acdd72a7-3385-48ef-bd42-f606fba81ae7 |
31
-
> | <aname='role-based-access-control-administrator'></a>[Role Based Access Control Administrator](./built-in-roles/general.md#role-based-access-control-administrator)| Manage access to Azure resources by assigning roles using Azure RBAC. This role does not allow you to manage access using other ways, such as Azure Policy. | f58310d9-a9f6-439a-9e8d-f62e7b41a168 |
32
-
> | <aname='user-access-administrator'></a>[User Access Administrator](./built-in-roles/general.md#user-access-administrator)| Lets you manage user access to Azure resources. | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 |
33
40
34
41
## Compute
35
42
@@ -502,7 +509,6 @@ The following table provides a brief description of each built-in role. Click th
502
509
> | <aname='policy-insights-data-writer-preview'></a>[Policy Insights Data Writer (Preview)](./built-in-roles/management-and-governance.md#policy-insights-data-writer-preview)| Allows read access to resource policies and write access to resource component policy events. | 66bb4e9e-b016-4a94-8249-4c0511c2be84 |
503
510
> | <aname='quota-request-operator'></a>[Quota Request Operator](./built-in-roles/management-and-governance.md#quota-request-operator)| Read and create quota requests, get quota request status, and create support tickets. | 0e5f05e5-9ab9-446b-b98d-1e2157c94125 |
> | <aname='reservations-administrator'></a>[Reservations Administrator](./built-in-roles/management-and-governance.md#reservations-administrator)| Lets one read and manage all the reservations in a tenant | a8889054-8d42-49c9-bc1c-52486c10e7cd |
506
512
> | <aname='reservations-reader'></a>[Reservations Reader](./built-in-roles/management-and-governance.md#reservations-reader)| Lets one read all the reservations in a tenant | 582fc458-8989-419f-a480-75249bc5db7e |
507
513
> | <aname='resource-policy-contributor'></a>[Resource Policy Contributor](./built-in-roles/management-and-governance.md#resource-policy-contributor)| Users with rights to create/modify resource policy, create support ticket and read resources/hierarchy. | 36243c78-bf99-498c-9df9-86d9f8d28608 |
508
514
> | <aname='savings-plan-purchaser'></a>[Savings plan Purchaser](./built-in-roles/management-and-governance.md#savings-plan-purchaser)| Lets you purchase savings plans | 3d24a3a0-c154-4f6f-a5ed-adc8e01ddb74 |
Copy file name to clipboardExpand all lines: articles/role-based-access-control/built-in-roles/general.md
-190Lines changed: 0 additions & 190 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,106 +16,6 @@ ms.custom: generated
16
16
This article lists the Azure built-in roles in the General category.
17
17
18
18
19
-
## Contributor
20
-
21
-
Grants full access to manage all resources, but does not allow you to assign roles in Azure RBAC, manage assignments in Azure Blueprints, or share image galleries.
> | * | Create and manage resources of all types |
29
-
> |**NotActions**||
30
-
> |[Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/*/Delete | Delete roles, policy assignments, policy definitions and policy set definitions |
31
-
> |[Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/*/Write | Create roles, role assignments, policy assignments, policy definitions and policy set definitions |
32
-
> |[Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/elevateAccess/Action | Grants the caller User Access Administrator access at the tenant scope |
33
-
> |[Microsoft.Blueprint](../permissions/management-and-governance.md#microsoftblueprint)/blueprintAssignments/write | Create or update any blueprint assignments |
34
-
> |[Microsoft.Blueprint](../permissions/management-and-governance.md#microsoftblueprint)/blueprintAssignments/delete | Delete any blueprint assignments |
35
-
> |[Microsoft.Compute](../permissions/compute.md#microsoftcompute)/galleries/share/action | Shares a Gallery to different scopes |
36
-
> |[Microsoft.Purview](../permissions/analytics.md#microsoftpurview)/consents/write | Create or Update a Consent Resource. |
37
-
> |[Microsoft.Purview](../permissions/analytics.md#microsoftpurview)/consents/delete | Delete the Consent Resource. |
38
-
> |[Microsoft.Resources](../permissions/management-and-governance.md#microsoftresources)/deploymentStacks/manageDenySetting/action | Manage the denySettings property of a deployment stack. |
39
-
> |**DataActions**||
40
-
> |*none*||
41
-
> |**NotDataActions**||
42
-
> |*none*||
43
-
44
-
```json
45
-
{
46
-
"assignableScopes": [
47
-
"/"
48
-
],
49
-
"description": "Grants full access to manage all resources, but does not allow you to assign roles in Azure RBAC, manage assignments in Azure Blueprints, or share image galleries.",
View all resources, but does not allow you to make any changes.
@@ -157,96 +57,6 @@ View all resources, but does not allow you to make any changes.
157
57
}
158
58
```
159
59
160
-
## Role Based Access Control Administrator
161
-
162
-
Manage access to Azure resources by assigning roles using Azure RBAC. This role does not allow you to manage access using other ways, such as Azure Policy.
163
-
164
-
> [!div class="mx-tableFixed"]
165
-
> | Actions | Description |
166
-
> | --- | --- |
167
-
> |[Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/roleAssignments/write | Create a role assignment at the specified scope. |
168
-
> |[Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/roleAssignments/delete | Delete a role assignment at the specified scope. |
169
-
> |*/read | Read resources of all types, except secrets. |
170
-
> |[Microsoft.Support](../permissions/general.md#microsoftsupport)/*| Create and update a support ticket |
171
-
> |**NotActions**||
172
-
> |*none*||
173
-
> |**DataActions**||
174
-
> |*none*||
175
-
> |**NotDataActions**||
176
-
> |*none*||
177
-
178
-
```json
179
-
{
180
-
"assignableScopes": [
181
-
"/"
182
-
],
183
-
"description": "Manage access to Azure resources by assigning roles using Azure RBAC. This role does not allow you to manage access using other ways, such as Azure Policy.",
> |[Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/roleAssignments/read | Get information about a role assignment. |
1979
-
> |[Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/roleDefinitions/read | Get information about a role definition. |
1980
-
> |[Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/roleAssignments/write | Create a role assignment at the specified scope. |
1981
-
> |[Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/roleAssignments/delete | Delete a role assignment at the specified scope. |
1982
-
> |**NotActions**||
1983
-
> |*none*||
1984
-
> |**DataActions**||
1985
-
> |*none*||
1986
-
> |**NotDataActions**||
1987
-
> |*none*||
1988
-
1989
-
```json
1990
-
{
1991
-
"assignableScopes": [
1992
-
"/providers/Microsoft.Capacity"
1993
-
],
1994
-
"description": "Lets one read and manage all the reservations in a tenant",
0 commit comments