Skip to content

Commit 4e31a64

Browse files
authored
Merge pull request #291598 from raboilla/roles-permissions
Firewall role-permissions (new article)
2 parents a0bb2ac + 956a366 commit 4e31a64

File tree

2 files changed

+67
-0
lines changed

2 files changed

+67
-0
lines changed
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
---
2+
title: About Azure Firewall roles and permissions
3+
titleSuffix: Azure Firewall
4+
description: Learn about roles and permissions for Azure Firewall.
5+
author: raboilla
6+
ms.service: azure-firewall
7+
ms.topic: conceptual
8+
ms.date: 12/9/2024
9+
ms.author: victorh
10+
11+
---
12+
# About roles and permissions for Azure Firewall
13+
14+
The Azure Firewall utilizes multiple resources, such as virtual networks and IP addresses, during both creation and management operations.
15+
Because of this, it's essential to verify permissions on all involved resources during these operations.
16+
17+
## Azure built-in roles
18+
19+
You can choose to assign [Azure built-in roles](../role-based-access-control/built-in-roles.md) to a user, group, service principal, or managed identity such as [Network contributor](../role-based-access-control/built-in-roles.md#network-contributor), which support all the required permissions for creating the gateway.
20+
For more information, see [Steps to assign an Azure role](../role-based-access-control/role-assignments-steps.md).
21+
22+
## Custom roles
23+
24+
If the [Azure built-in roles](../role-based-access-control/built-in-roles.md) don't meet the specific needs of your organization, you can create your own custom roles.
25+
Just like built-in roles, you can assign custom roles to users, groups, and service principals at management group, subscription, and resource group scopes.
26+
For more information, see [Steps to create a custom role](../role-based-access-control/custom-roles.md#steps-to-create-a-custom-role) .
27+
28+
To ensure proper functionality, check your custom role permissions to confirm user service principals, and managed identities operating the Azure Firewall have the necessary permissions.
29+
To add any missing permissions listed here, see [Update a custom role](../role-based-access-control/custom-roles-portal.md#update-a-custom-role).
30+
31+
## Permissions
32+
33+
Depending on whether you're creating new resources or using existing ones, add the appropriate permissions from the following list for Azure Firewall in a Hub VNET:
34+
35+
|Resource | Resource status | Required Azure permissions |
36+
|---|---|---|
37+
| Subnet | Create new| Microsoft.Network/virtualNetworks/subnets/write<br>Microsoft.Network/virtualNetworks/subnets/join/action |
38+
| Subnet | Use existing| Microsoft.Network/virtualNetworks/subnets/read<br>Microsoft.Network/virtualNetworks/subnets/join/action |
39+
| IP addresses| Create new| Microsoft.Network/publicIPAddresses/write<br>Microsoft.Network/publicIPAddresses/join/action |
40+
| IP addresses | Use existing| Microsoft.Network/publicIPAddresses/read<br>Microsoft.Network/publicIPAddresses/join/action |
41+
42+
If you are creating an Azure Firewall in Azure Virtual WAN, add the following permission:
43+
44+
|Resource | Resource status | Required Azure permissions |
45+
|---|---|---|
46+
| virtualHubs | Create new | Microsoft.Network/virtualHubs/read
47+
48+
For more information, see [Azure permissions for Networking](../role-based-access-control/permissions/networking.md) and [Virtual network permissions](../virtual-network/virtual-network-manage-subnet.md#permissions).
49+
50+
## Roles scope
51+
52+
In the process of custom role definition, you can specify a role assignment scope at four levels: management group, subscription, resource group, and resources. To grant access, you assign roles to users, groups, service principals, or managed identities at a particular scope.
53+
54+
These scopes are structured in a parent-child relationship, with each level of hierarchy making the scope more specific. You can assign roles at any of these levels of scope, and the level you select determines how widely the role is applied.
55+
56+
For example, a role assigned at the subscription level can cascade down to all resources within that subscription, while a role assigned at the resource group level will only apply to resources within that specific group. Learn more about scope level
57+
For more information, see [Scope levels](../role-based-access-control/scope-overview.md#scope-levels).
58+
59+
> [!NOTE]
60+
> Allow sufficient time for [Azure Resource Manager cache](../role-based-access-control/troubleshooting.md) to refresh after role assignment changes.
61+
62+
## Next steps
63+
64+
[What is Azure Role Based Access](../role-based-access-control/overview.md)
65+
[Azure Role Based Access Control](../role-based-access-control/role-assignments-list-portal.yml)

articles/firewall/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,8 @@ items:
9191
href: policy-rule-sets.md
9292
- name: Policy Analytics
9393
href: policy-analytics.md
94+
- name: Roles and permissions
95+
href: roles-permissions.md
9496
- name: Azure Firewall web categories
9597
href: web-categories.md
9698
- name: Infrastructure FQDNs

0 commit comments

Comments
 (0)