Skip to content

Commit 521c0ab

Browse files
committed
Update role descriptions with read permissions
1 parent ac36db7 commit 521c0ab

File tree

7 files changed

+36
-14
lines changed

7 files changed

+36
-14
lines changed

articles/role-based-access-control/built-in-roles/analytics.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -563,12 +563,14 @@ Can read, create, modify and delete HDInsight on AKS cluster pools and create cl
563563

564564
Log Analytics Contributor can read all monitoring data and edit monitoring settings. Editing monitoring settings includes adding the VM extension to VMs; reading storage account keys to be able to configure collection of logs from Azure Storage; adding solutions; and configuring Azure diagnostics on all Azure resources.
565565

566+
[!INCLUDE [role-read-permissions.md](../includes/role-read-permissions.md)]
567+
566568
[Learn more](/azure/azure-monitor/logs/manage-access)
567569

568570
> [!div class="mx-tableFixed"]
569571
> | Actions | Description |
570572
> | --- | --- |
571-
> | */read | Read resources of all types, except secrets. |
573+
> | */read | Read control plane information for all Azure resources. |
572574
> | [Microsoft.ClassicCompute](../permissions/compute.md#microsoftclassiccompute)/virtualMachines/extensions/* | |
573575
> | [Microsoft.ClassicStorage](../permissions/storage.md#microsoftclassicstorage)/storageAccounts/listKeys/action | Lists the access keys for the storage accounts. |
574576
> | [Microsoft.Compute](../permissions/compute.md#microsoftcompute)/virtualMachines/extensions/* | |
@@ -628,12 +630,14 @@ Log Analytics Contributor can read all monitoring data and edit monitoring setti
628630

629631
Log Analytics Reader can view and search all monitoring data as well as and view monitoring settings, including viewing the configuration of Azure diagnostics on all Azure resources.
630632

633+
[!INCLUDE [role-read-permissions.md](../includes/role-read-permissions.md)]
634+
631635
[Learn more](/azure/azure-monitor/logs/manage-access)
632636

633637
> [!div class="mx-tableFixed"]
634638
> | Actions | Description |
635639
> | --- | --- |
636-
> | */read | Read resources of all types, except secrets. |
640+
> | */read | Read control plane information for all Azure resources. |
637641
> | [Microsoft.OperationalInsights](../permissions/monitor.md#microsoftoperationalinsights)/workspaces/analytics/query/action | Search using new engine. |
638642
> | [Microsoft.OperationalInsights](../permissions/monitor.md#microsoftoperationalinsights)/workspaces/search/action | Executes a search query |
639643
> | [Microsoft.Support](../permissions/general.md#microsoftsupport)/* | Create and update a support ticket |

articles/role-based-access-control/built-in-roles/general.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,14 @@ This article lists the Azure built-in roles in the General category.
2020

2121
View all resources, but does not allow you to make any changes.
2222

23+
[!INCLUDE [role-read-permissions.md](../includes/role-read-permissions.md)]
24+
2325
[Learn more](/azure/role-based-access-control/rbac-and-directory-admin-roles)
2426

2527
> [!div class="mx-tableFixed"]
2628
> | Actions | Description |
2729
> | --- | --- |
28-
> | */read | Read resources of all types, except secrets. |
30+
> | */read | Read control plane information for all Azure resources. |
2931
> | **NotActions** | |
3032
> | *none* | |
3133
> | **DataActions** | |

articles/role-based-access-control/built-in-roles/management-and-governance.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1463,10 +1463,12 @@ Allows users to edit and delete Hierarchy Settings
14631463

14641464
Allows for creating managed application resources.
14651465

1466+
[!INCLUDE [role-read-permissions.md](../includes/role-read-permissions.md)]
1467+
14661468
> [!div class="mx-tableFixed"]
14671469
> | Actions | Description |
14681470
> | --- | --- |
1469-
> | */read | Read resources of all types, except secrets. |
1471+
> | */read | Read control plane information for all Azure resources. |
14701472
> | [Microsoft.Solutions](../permissions/management-and-governance.md#microsoftsolutions)/applications/* | |
14711473
> | [Microsoft.Solutions](../permissions/management-and-governance.md#microsoftsolutions)/register/action | Register the subscription for Microsoft.Solutions |
14721474
> | [Microsoft.Resources](../permissions/management-and-governance.md#microsoftresources)/subscriptions/resourceGroups/* | |
@@ -1510,10 +1512,12 @@ Allows for creating managed application resources.
15101512

15111513
Lets you read and perform actions on Managed Application resources
15121514

1515+
[!INCLUDE [role-read-permissions.md](../includes/role-read-permissions.md)]
1516+
15131517
> [!div class="mx-tableFixed"]
15141518
> | Actions | Description |
15151519
> | --- | --- |
1516-
> | */read | Read resources of all types, except secrets. |
1520+
> | */read | Read control plane information for all Azure resources. |
15171521
> | [Microsoft.Solutions](../permissions/management-and-governance.md#microsoftsolutions)/applications/read | Lists all the applications within a subscription. |
15181522
> | [Microsoft.Solutions](../permissions/management-and-governance.md#microsoftsolutions)/*/action | |
15191523
> | **NotActions** | |
@@ -1553,10 +1557,12 @@ Lets you read and perform actions on Managed Application resources
15531557

15541558
Lets you read resources in a managed app and request JIT access.
15551559

1560+
[!INCLUDE [role-read-permissions.md](../includes/role-read-permissions.md)]
1561+
15561562
> [!div class="mx-tableFixed"]
15571563
> | Actions | Description |
15581564
> | --- | --- |
1559-
> | */read | Read resources of all types, except secrets. |
1565+
> | */read | Read control plane information for all Azure resources. |
15601566
> | [Microsoft.Resources](../permissions/management-and-governance.md#microsoftresources)/deployments/* | Create and manage a deployment |
15611567
> | [Microsoft.Solutions](../permissions/management-and-governance.md#microsoftsolutions)/jitRequests/* | |
15621568
> | **NotActions** | |
@@ -2010,12 +2016,14 @@ Lets one read all the reservations in a tenant
20102016

20112017
Users with rights to create/modify resource policy, create support ticket and read resources/hierarchy.
20122018

2019+
[!INCLUDE [role-read-permissions.md](../includes/role-read-permissions.md)]
2020+
20132021
[Learn more](/azure/governance/policy/overview)
20142022

20152023
> [!div class="mx-tableFixed"]
20162024
> | Actions | Description |
20172025
> | --- | --- |
2018-
> | */read | Read resources of all types, except secrets. |
2026+
> | */read | Read control plane information for all Azure resources. |
20192027
> | [Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/policyassignments/* | Create and manage policy assignments |
20202028
> | [Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/policydefinitions/* | Create and manage policy definitions |
20212029
> | [Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/policyexemptions/* | Create and manage policy exemptions |

articles/role-based-access-control/built-in-roles/monitor.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -397,12 +397,14 @@ View dashboards, playlists, and query data sources.
397397

398398
Can read all monitoring data and edit monitoring settings. See also [Get started with roles, permissions, and security with Azure Monitor](/azure/azure-monitor/roles-permissions-security#built-in-monitoring-roles).
399399

400+
[!INCLUDE [role-read-permissions.md](../includes/role-read-permissions.md)]
401+
400402
[Learn more](/azure/azure-monitor/roles-permissions-security)
401403

402404
> [!div class="mx-tableFixed"]
403405
> | Actions | Description |
404406
> | --- | --- |
405-
> | */read | Read resources of all types, except secrets. |
407+
> | */read | Read control plane information for all Azure resources. |
406408
> | [Microsoft.AlertsManagement](../permissions/monitor.md#microsoftalertsmanagement)/alerts/* | |
407409
> | [Microsoft.AlertsManagement](../permissions/monitor.md#microsoftalertsmanagement)/alertsSummary/* | |
408410
> | [Microsoft.Insights](../permissions/monitor.md#microsoftinsights)/actiongroups/* | |
@@ -571,12 +573,14 @@ Enables publishing metrics against Azure resources
571573

572574
Can read all monitoring data (metrics, logs, etc.). See also [Get started with roles, permissions, and security with Azure Monitor](/azure/azure-monitor/roles-permissions-security#built-in-monitoring-roles).
573575

576+
[!INCLUDE [role-read-permissions.md](../includes/role-read-permissions.md)]
577+
574578
[Learn more](/azure/azure-monitor/roles-permissions-security)
575579

576580
> [!div class="mx-tableFixed"]
577581
> | Actions | Description |
578582
> | --- | --- |
579-
> | */read | Read resources of all types, except secrets. |
583+
> | */read | Read control plane information for all Azure resources. |
580584
> | [Microsoft.OperationalInsights](../permissions/monitor.md#microsoftoperationalinsights)/workspaces/search/action | Executes a search query |
581585
> | [Microsoft.Support](../permissions/general.md#microsoftsupport)/* | Create and update a support ticket |
582586
> | **NotActions** | |

articles/role-based-access-control/built-in-roles/privileged.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ Manage access to Azure resources by assigning roles using Azure RBAC. This role
184184
> | --- | --- |
185185
> | [Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/roleAssignments/write | Create a role assignment at the specified scope. |
186186
> | [Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/roleAssignments/delete | Delete a role assignment at the specified scope. |
187-
> | */read | Global read of all Azure resources and all types, except for secrets. |
187+
> | */read | Read control plane information for all Azure resources. |
188188
> | [Microsoft.Support](../permissions/general.md#microsoftsupport)/* | Create and update a support ticket |
189189
> | **NotActions** | |
190190
> | *none* | |
@@ -231,7 +231,7 @@ Lets you manage user access to Azure resources.
231231
> [!div class="mx-tableFixed"]
232232
> | Actions | Description |
233233
> | --- | --- |
234-
> | */read | Global read of all Azure resources and all types, except for secrets. |
234+
> | */read | Read control plane information for all Azure resources. |
235235
> | [Microsoft.Authorization](../permissions/management-and-governance.md#microsoftauthorization)/* | Manage authorization |
236236
> | [Microsoft.Support](../permissions/general.md#microsoftsupport)/* | Create and update a support ticket |
237237
> | **NotActions** | |

articles/role-based-access-control/built-in-roles/security.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ This article lists the Azure built-in roles in the Security category.
2020

2121
Create, read, download, modify and delete reports objects and related other resource objects.
2222

23+
[!INCLUDE [role-read-permissions.md](../includes/role-read-permissions.md)]
24+
2325
[Learn more](/microsoft-365-app-certification/docs/automate-certification-with-acat)
2426

2527
> [!div class="mx-tableFixed"]
@@ -52,7 +54,7 @@ Create, read, download, modify and delete reports objects and related other reso
5254
> | [Microsoft.Security](../permissions/security.md#microsoftsecurity)/automations/write | Creates or updates the automation for the scope |
5355
> | [Microsoft.Security](../permissions/security.md#microsoftsecurity)/register/action | Registers the subscription for Azure Security Center |
5456
> | [Microsoft.Security](../permissions/security.md#microsoftsecurity)/unregister/action | Unregisters the subscription from Azure Security Center |
55-
> | */read | Read resources of all types, except secrets. |
57+
> | */read | Read control plane information for all Azure resources. |
5658
> | **NotActions** | |
5759
> | *none* | |
5860
> | **DataActions** | |
@@ -115,12 +117,14 @@ Create, read, download, modify and delete reports objects and related other reso
115117

116118
Read, download the reports objects and related other resource objects.
117119

120+
[!INCLUDE [role-read-permissions.md](../includes/role-read-permissions.md)]
121+
118122
[Learn more](/microsoft-365-app-certification/docs/automate-certification-with-acat)
119123

120124
> [!div class="mx-tableFixed"]
121125
> | Actions | Description |
122126
> | --- | --- |
123-
> | */read | Read resources of all types, except secrets. |
127+
> | */read | Read control plane information for all Azure resources. |
124128
> | **NotActions** | |
125129
> | *none* | |
126130
> | **DataActions** | |

articles/role-based-access-control/includes/role-read-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@ ms.date: 01/31/2025
66
ms.author: rolyon
77
---
88

9-
This role includes global read permissions with the `*/read` action. Users that are assigned this role can read all Azure resources of all types, except for secrets.
9+
This role includes the `*/read` action for the control plane. Users that are assigned this role can read [control plane](/azure/role-based-access-control/role-definitions#control-and-data-actions) information for all Azure resources.

0 commit comments

Comments
 (0)