You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/built-in-roles.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,10 +4,10 @@ description: This article describes the Azure built-in roles for Azure role-base
4
4
ms.service: role-based-access-control
5
5
ms.topic: generated-reference
6
6
ms.workload: identity
7
-
author: rolyon
8
-
manager: femila
9
-
ms.author: rolyon
10
-
ms.date: 05/25/2025
7
+
author: jenniferf-skc
8
+
manager: pmwongera
9
+
ms.author: jfields
10
+
ms.date: 06/30/2025
11
11
ms.custom: generated
12
12
---
13
13
@@ -198,6 +198,7 @@ The following table provides a brief description of each built-in role. Click th
198
198
> | <aname='azure-container-storage-operator'></a>[Azure Container Storage Operator](./built-in-roles/containers.md#azure-container-storage-operator)| Enable a managed identity to perform Azure Container Storage operations, such as manage virtual machines and manage virtual networks. | 08d4c71a-cc63-4ce4-a9c8-5dd251b4d619 |
199
199
> | <aname='azure-container-storage-owner'></a>[Azure Container Storage Owner](./built-in-roles/containers.md#azure-container-storage-owner)| Install Azure Container Storage, grant access to its storage resources, and configure Azure Elastic storage area network (SAN). Includes an ABAC condition to constrain role assignments. | 95de85bd-744d-4664-9dde-11430bc34793 |
200
200
> | <aname='azure-kubernetes-fleet-manager-contributor-role'></a>[Azure Kubernetes Fleet Manager Contributor Role](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-contributor-role)| Grants read/write access to Azure resources provided by Azure Kubernetes Fleet Manager, including fleets, fleet members, fleet update strategies, fleet update runs, etc. | 63bb64ad-9799-4770-b5c3-24ed299a07bf |
> | <aname='azure-kubernetes-fleet-manager-rbac-admin'></a>[Azure Kubernetes Fleet Manager RBAC Admin](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-admin)| Grants read/write access to Kubernetes resources within a namespace in the fleet-managed hub cluster - provides write permissions on most objects within a namespace, with the exception of ResourceQuota object and the namespace object itself. Applying this role at cluster scope will give access across all namespaces. | 434fb43a-c01c-447e-9f67-c3ad923cfaba |
202
203
> | <aname='azure-kubernetes-fleet-manager-rbac-cluster-admin'></a>[Azure Kubernetes Fleet Manager RBAC Cluster Admin](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-cluster-admin)| Grants read/write access to all Kubernetes resources in the fleet-managed hub cluster. | 18ab4d3d-a1bf-4477-8ad9-8359bc988f69 |
203
204
> | <aname='azure-kubernetes-fleet-manager-rbac-reader'></a>[Azure Kubernetes Fleet Manager RBAC Reader](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-reader)| Grants read-only access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces. | 30b27cfc-9c84-438e-b0ce-70e35255df80 |
Copy file name to clipboardExpand all lines: articles/role-based-access-control/built-in-roles/containers.md
+54-4Lines changed: 54 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,10 +4,10 @@ description: This article lists the Azure built-in roles for Azure role-based ac
4
4
ms.service: role-based-access-control
5
5
ms.topic: generated-reference
6
6
ms.workload: identity
7
-
author: rolyon
8
-
manager: femila
9
-
ms.author: rolyon
10
-
ms.date: 05/25/2025
7
+
author: jenniferf-skc
8
+
manager: pmwongera
9
+
ms.author: jfields
10
+
ms.date: 06/30/2025
11
11
ms.custom: generated
12
12
---
13
13
@@ -1008,6 +1008,56 @@ Grants read/write access to Azure resources provided by Azure Kubernetes Fleet M
1008
1008
"type": "Microsoft.Authorization/roleDefinitions"
1009
1009
}
1010
1010
```
1011
+
## Azure Kubernetes Fleet Manager Hub Agent Role
1012
+
1013
+
Grants access to Azure resources needed by Azure Kubernetes Fleet Manager hub agents.
1014
+
1015
+
> [!div class="mx-tableFixed"]
1016
+
> | Actions | Description |
1017
+
> | --- | --- |
1018
+
> |[Microsoft.Network](../permissions/networking.md#microsoftnetwork)/publicIPAddresses/read | Gets a public IP address definition. |
1019
+
> |[Microsoft.Network](../permissions/networking.md#microsoftnetwork)/trafficManagerProfiles/read | Get the Traffic Manager profile configuration. This includes DNS settings, traffic routing settings, endpoint monitoring settings, and the list of endpoints routed by this Traffic Manager profile. |
1020
+
> |[Microsoft.Network](../permissions/networking.md#microsoftnetwork)/trafficManagerProfiles/write | Create a Traffic Manager profile, or modify the configuration of an existing Traffic Manager profile. This includes enabling or disabling a profile and modifying DNS settings, traffic routing settings, or endpoint monitoring settings. Endpoints routed by the Traffic Manager profile can be added, removed, enabled or disabled. |
1021
+
> |[Microsoft.Network](../permissions/networking.md#microsoftnetwork)/trafficManagerProfiles/delete | Delete the Traffic Manager profile. All settings associated with the Traffic Manager profile will be lost, and the profile can no longer be used to route traffic. |
1022
+
> |[Microsoft.Network](../permissions/networking.md#microsoftnetwork)/trafficManagerProfiles/azureEndpoints/read | Gets an Azure Endpoint which belongs to a Traffic Manager Profile, including all the properties of that Azure Endpoint. |
1023
+
> |[Microsoft.Network](../permissions/networking.md#microsoftnetwork)/trafficManagerProfiles/azureEndpoints/write | Add a new Azure Endpoint in an existing Traffic Manager Profile or update the properties of an existing Azure Endpoint in that Traffic Manager Profile. |
1024
+
> |[Microsoft.Network](../permissions/networking.md#microsoftnetwork)/trafficManagerProfiles/azureEndpoints/delete | Deletes an Azure Endpoint from an existing Traffic Manager Profile. Traffic Manager will stop routing traffic to the deleted Azure Endpoint. |
1025
+
> |**NotActions**||
1026
+
> |*none*||
1027
+
> |**DataActions**||
1028
+
> |*none*||
1029
+
> |**NotDataActions**||
1030
+
> |*none*||
1031
+
1032
+
```json
1033
+
{
1034
+
"assignableScopes": [
1035
+
"/"
1036
+
],
1037
+
"description": "Grants access to Azure resources needed by Azure Kubernetes Fleet Manager hub agents.",
0 commit comments