Skip to content

Commit 400a92c

Browse files
Merge pull request #302043 from jenniferf-skc/KubernetesFleetManagerRole
Adding Azure Kubernetes Fleet Manager Hub role
2 parents 82da759 + 60bbf1b commit 400a92c

File tree

2 files changed

+59
-8
lines changed

2 files changed

+59
-8
lines changed

articles/role-based-access-control/built-in-roles.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ description: This article describes the Azure built-in roles for Azure role-base
44
ms.service: role-based-access-control
55
ms.topic: generated-reference
66
ms.workload: identity
7-
author: rolyon
8-
manager: femila
9-
ms.author: rolyon
10-
ms.date: 05/25/2025
7+
author: jenniferf-skc
8+
manager: pmwongera
9+
ms.author: jfields
10+
ms.date: 06/30/2025
1111
ms.custom: generated
1212
---
1313

@@ -198,6 +198,7 @@ The following table provides a brief description of each built-in role. Click th
198198
> | <a name='azure-container-storage-operator'></a>[Azure Container Storage Operator](./built-in-roles/containers.md#azure-container-storage-operator) | Enable a managed identity to perform Azure Container Storage operations, such as manage virtual machines and manage virtual networks. | 08d4c71a-cc63-4ce4-a9c8-5dd251b4d619 |
199199
> | <a name='azure-container-storage-owner'></a>[Azure Container Storage Owner](./built-in-roles/containers.md#azure-container-storage-owner) | Install Azure Container Storage, grant access to its storage resources, and configure Azure Elastic storage area network (SAN). Includes an ABAC condition to constrain role assignments. | 95de85bd-744d-4664-9dde-11430bc34793 |
200200
> | <a name='azure-kubernetes-fleet-manager-contributor-role'></a>[Azure Kubernetes Fleet Manager Contributor Role](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-contributor-role) | Grants read/write access to Azure resources provided by Azure Kubernetes Fleet Manager, including fleets, fleet members, fleet update strategies, fleet update runs, etc. | 63bb64ad-9799-4770-b5c3-24ed299a07bf |
201+
> | <a name='azure-kubernetes-fleet-manager-hub-agent-role'></a>[Azure Kubernetes Fleet Manager Hub Agent Role](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-hub-agent-role) | Grants access to Azure resources needed by Azure Kubernetes Fleet Manager hub agents. | de2b316d-7a2c-4143-b4cd-c148f6a355a1 |
201202
> | <a name='azure-kubernetes-fleet-manager-rbac-admin'></a>[Azure Kubernetes Fleet Manager RBAC Admin](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-admin) | Grants read/write access to Kubernetes resources within a namespace in the fleet-managed hub cluster - provides write permissions on most objects within a namespace, with the exception of ResourceQuota object and the namespace object itself. Applying this role at cluster scope will give access across all namespaces. | 434fb43a-c01c-447e-9f67-c3ad923cfaba |
202203
> | <a name='azure-kubernetes-fleet-manager-rbac-cluster-admin'></a>[Azure Kubernetes Fleet Manager RBAC Cluster Admin](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-cluster-admin) | Grants read/write access to all Kubernetes resources in the fleet-managed hub cluster. | 18ab4d3d-a1bf-4477-8ad9-8359bc988f69 |
203204
> | <a name='azure-kubernetes-fleet-manager-rbac-reader'></a>[Azure Kubernetes Fleet Manager RBAC Reader](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-reader) | Grants read-only access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces. | 30b27cfc-9c84-438e-b0ce-70e35255df80 |

articles/role-based-access-control/built-in-roles/containers.md

Lines changed: 54 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ description: This article lists the Azure built-in roles for Azure role-based ac
44
ms.service: role-based-access-control
55
ms.topic: generated-reference
66
ms.workload: identity
7-
author: rolyon
8-
manager: femila
9-
ms.author: rolyon
10-
ms.date: 05/25/2025
7+
author: jenniferf-skc
8+
manager: pmwongera
9+
ms.author: jfields
10+
ms.date: 06/30/2025
1111
ms.custom: generated
1212
---
1313

@@ -1008,6 +1008,56 @@ Grants read/write access to Azure resources provided by Azure Kubernetes Fleet M
10081008
"type": "Microsoft.Authorization/roleDefinitions"
10091009
}
10101010
```
1011+
## Azure Kubernetes Fleet Manager Hub Agent Role
1012+
1013+
Grants access to Azure resources needed by Azure Kubernetes Fleet Manager hub agents.
1014+
1015+
> [!div class="mx-tableFixed"]
1016+
> | Actions | Description |
1017+
> | --- | --- |
1018+
> | [Microsoft.Network](../permissions/networking.md#microsoftnetwork)/publicIPAddresses/read | Gets a public IP address definition. |
1019+
> | [Microsoft.Network](../permissions/networking.md#microsoftnetwork)/trafficManagerProfiles/read | Get the Traffic Manager profile configuration. This includes DNS settings, traffic routing settings, endpoint monitoring settings, and the list of endpoints routed by this Traffic Manager profile. |
1020+
> | [Microsoft.Network](../permissions/networking.md#microsoftnetwork)/trafficManagerProfiles/write | Create a Traffic Manager profile, or modify the configuration of an existing Traffic Manager profile. This includes enabling or disabling a profile and modifying DNS settings, traffic routing settings, or endpoint monitoring settings. Endpoints routed by the Traffic Manager profile can be added, removed, enabled or disabled. |
1021+
> | [Microsoft.Network](../permissions/networking.md#microsoftnetwork)/trafficManagerProfiles/delete | Delete the Traffic Manager profile. All settings associated with the Traffic Manager profile will be lost, and the profile can no longer be used to route traffic. |
1022+
> | [Microsoft.Network](../permissions/networking.md#microsoftnetwork)/trafficManagerProfiles/azureEndpoints/read | Gets an Azure Endpoint which belongs to a Traffic Manager Profile, including all the properties of that Azure Endpoint. |
1023+
> | [Microsoft.Network](../permissions/networking.md#microsoftnetwork)/trafficManagerProfiles/azureEndpoints/write | Add a new Azure Endpoint in an existing Traffic Manager Profile or update the properties of an existing Azure Endpoint in that Traffic Manager Profile. |
1024+
> | [Microsoft.Network](../permissions/networking.md#microsoftnetwork)/trafficManagerProfiles/azureEndpoints/delete | Deletes an Azure Endpoint from an existing Traffic Manager Profile. Traffic Manager will stop routing traffic to the deleted Azure Endpoint. |
1025+
> | **NotActions** | |
1026+
> | *none* | |
1027+
> | **DataActions** | |
1028+
> | *none* | |
1029+
> | **NotDataActions** | |
1030+
> | *none* | |
1031+
1032+
```json
1033+
{
1034+
"assignableScopes": [
1035+
"/"
1036+
],
1037+
"description": "Grants access to Azure resources needed by Azure Kubernetes Fleet Manager hub agents.",
1038+
"id": "/providers/Microsoft.Authorization/roleDefinitions/de2b316d-7a2c-4143-b4cd-c148f6a355a1",
1039+
"name": "de2b316d-7a2c-4143-b4cd-c148f6a355a1",
1040+
"permissions": [
1041+
{
1042+
"actions": [
1043+
"Microsoft.Network/publicIPAddresses/read",
1044+
"Microsoft.Network/trafficManagerProfiles/read",
1045+
"Microsoft.Network/trafficManagerProfiles/write",
1046+
"Microsoft.Network/trafficManagerProfiles/delete",
1047+
"Microsoft.Network/trafficManagerProfiles/azureEndpoints/read",
1048+
"Microsoft.Network/trafficManagerProfiles/azureEndpoints/write",
1049+
"Microsoft.Network/trafficManagerProfiles/azureEndpoints/delete"
1050+
],
1051+
"notActions": [],
1052+
"dataActions": [],
1053+
"notDataActions": []
1054+
}
1055+
],
1056+
"roleName": "Azure Kubernetes Fleet Manager Hub Agent Role",
1057+
"roleType": "BuiltInRole",
1058+
"type": "Microsoft.Authorization/roleDefinitions"
1059+
}
1060+
```
10111061

10121062
## Azure Kubernetes Fleet Manager RBAC Admin
10131063

0 commit comments

Comments
 (0)