Skip to content

Commit 68febf7

Browse files
committed
Acrolinx fixes
1 parent f7cf2ca commit 68febf7

File tree

1 file changed

+37
-37
lines changed

1 file changed

+37
-37
lines changed

articles/role-based-access-control/troubleshooting.md

Lines changed: 37 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ $ras.Count
5252

5353
### Symptom - No more role assignments can be created at management group scope
5454

55-
You are unable to assign a role at management group scope.
55+
You're unable to assign a role at management group scope.
5656

5757
**Cause**
5858

@@ -69,21 +69,21 @@ Try to reduce the number of role assignments in the management group.
6969

7070
### Symptom - Unable to assign a role
7171

72-
You are unable to assign a role in the Azure portal on **Access control (IAM)** because the **Add** > **Add role assignment** option is disabled or because you get the following permissions error:
72+
You're unable to assign a role in the Azure portal on **Access control (IAM)** because the **Add** > **Add role assignment** option is disabled or because you get the following permissions error:
7373

7474
`The client with object id does not have authorization to perform action`
7575

7676
**Cause**
7777

78-
You are currently signed in with a user that does not have permission to assign roles at the selected scope.
78+
You're currently signed in with a user that doesn't have permission to assign roles at the selected scope.
7979

8080
**Solution**
8181

82-
Check that you are currently signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleAssignments/write` permission such as [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator) at the scope you are trying to assign the role.
82+
Check that you're currently signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleAssignments/write` permission such as [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator) at the scope you're trying to assign the role.
8383

8484
### Symptom - Unable to assign a role using a service principal with Azure CLI
8585

86-
You are using a service principal to assign roles with Azure CLI and you get the following error:
86+
You're using a service principal to assign roles with Azure CLI and you get the following error:
8787

8888
`Insufficient privileges to complete the operation`
8989

@@ -96,13 +96,13 @@ az role assignment create --assignee "userupn" --role "Contributor" --scope "/s
9696

9797
**Cause**
9898

99-
It is likely Azure CLI is attempting to look up the assignee identity in Azure AD and the service principal cannot read Azure AD by default.
99+
It's likely Azure CLI is attempting to look up the assignee identity in Azure AD and the service principal can't read Azure AD by default.
100100

101101
**Solution**
102102

103103
There are two ways to potentially resolve this error. The first way is to assign the [Directory Readers](../active-directory/roles/permissions-reference.md#directory-readers) role to the service principal so that it can read data in the directory.
104104

105-
The second way to resolve this error is to create the role assignment by using the `--assignee-object-id` parameter instead of `--assignee`. By using `--assignee-object-id`, Azure CLI will skip the Azure AD lookup. You will need to get the object ID of the user, group, or application that you want to assign the role to. For more information, see [Assign Azure roles using Azure CLI](role-assignments-cli.md#assign-a-role-for-a-new-service-principal-at-a-resource-group-scope).
105+
The second way to resolve this error is to create the role assignment by using the `--assignee-object-id` parameter instead of `--assignee`. By using `--assignee-object-id`, Azure CLI will skip the Azure AD lookup. You'll need to get the object ID of the user, group, or application that you want to assign the role to. For more information, see [Assign Azure roles using Azure CLI](role-assignments-cli.md#assign-a-role-for-a-new-service-principal-at-a-resource-group-scope).
106106

107107
```azurecli
108108
az role assignment create --assignee-object-id 11111111-1111-1111-1111-111111111111 --role "Contributor" --scope "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}"
@@ -123,7 +123,7 @@ The reason is likely a replication delay. The principal is created in one region
123123

124124
**Solution 1**
125125

126-
If you are creating a new user or service principal using the REST API or ARM template, set the `principalType` property when creating the role assignment using the [Role Assignments - Create](/rest/api/authorization/role-assignments/create) API.
126+
If you're creating a new user or service principal using the REST API or ARM template, set the `principalType` property when creating the role assignment using the [Role Assignments - Create](/rest/api/authorization/role-assignments/create) API.
127127

128128
| principalType | apiVersion |
129129
| --- | --- |
@@ -134,11 +134,11 @@ For more information, see [Assign Azure roles to a new service principal using t
134134

135135
**Solution 2**
136136

137-
If you are creating a new user or service principal using Azure PowerShell, set the `ObjectType` parameter to `User` or `ServicePrincipal` when creating the role assignment using [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment). The same underlying API version restrictions of Solution 1 still apply. For more information, see [Assign Azure roles using Azure PowerShell](role-assignments-powershell.md).
137+
If you're creating a new user or service principal using Azure PowerShell, set the `ObjectType` parameter to `User` or `ServicePrincipal` when creating the role assignment using [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment). The same underlying API version restrictions of Solution 1 still apply. For more information, see [Assign Azure roles using Azure PowerShell](role-assignments-powershell.md).
138138

139139
**Solution 3**
140140

141-
If you are creating a new group, wait a few minutes before creating the role assignment.
141+
If you're creating a new group, wait a few minutes before creating the role assignment.
142142

143143
### Symptom - ARM template role assignment returns BadRequest status
144144

@@ -150,7 +150,7 @@ For example, if you create a role assignment for a managed identity, then you de
150150

151151
**Cause**
152152

153-
The role assignment `name` is not unique, and it is viewed as an update.
153+
The role assignment `name` isn't unique, and it's viewed as an update.
154154

155155
Role assignments are uniquely identified by their name, which is a globally unique identifier (GUID). You can't create two role assignments with the same name, even in different Azure subscriptions. You also can't change the properties of an existing role assignment.
156156

@@ -242,7 +242,7 @@ You deleted a security principal that had a role assignment. If you assign a rol
242242

243243
It isn't a problem to leave these role assignments where the security principal has been deleted. If you like, you can remove these role assignments using steps that are similar to other role assignments. For information about how to remove role assignments, see [Remove Azure role assignments](role-assignments-remove.md).
244244

245-
In PowerShell, if you try to remove the role assignments using the object ID and role definition name, and more than one role assignment matches your parameters, you will get the error message: `The provided information does not map to a role assignment`. The following output shows an example of the error message:
245+
In PowerShell, if you try to remove the role assignments using the object ID and role definition name, and more than one role assignment matches your parameters, you'll get the error message: `The provided information does not map to a role assignment`. The following output shows an example of the error message:
246246

247247
```
248248
PS C:\> Remove-AzRoleAssignment -ObjectId 33333333-3333-3333-3333-333333333333 -RoleDefinitionName "Storage Blob Data Contributor"
@@ -269,37 +269,37 @@ You attempt to remove the last Owner role assignment for a subscription and you
269269

270270
**Cause**
271271

272-
Removing the last Owner role assignment for a subscription is not supported to avoid orphaning the subscription.
272+
Removing the last Owner role assignment for a subscription isn't supported to avoid orphaning the subscription.
273273

274274
**Solution**
275275

276276
If you want to cancel your subscription, see [Cancel your Azure subscription](../cost-management-billing/manage/cancel-azure-subscription.md).
277277

278-
You are allowed to remove the last Owner (or User Access Administrator) role assignment at subscription scope, if you are a Global Administrator for the tenant or a classic administrator (Service Administrator or Co-Administrator) for the subscription. In this case, there is no constraint for deletion. However, if the call comes from some other principal, then you won't be able to remove the last Owner role assignment at subscription scope.
278+
You're allowed to remove the last Owner (or User Access Administrator) role assignment at subscription scope, if you're a Global Administrator for the tenant or a classic administrator (Service Administrator or Co-Administrator) for the subscription. In this case, there's no constraint for deletion. However, if the call comes from some other principal, then you won't be able to remove the last Owner role assignment at subscription scope.
279279

280-
### Symptom - Role assignment is not moved after moving a resource
280+
### Symptom - Role assignment isn't moved after moving a resource
281281

282282
**Cause**
283283

284-
If you move a resource that has an Azure role assigned directly to the resource (or a child resource), the role assignment is not moved and becomes orphaned.
284+
If you move a resource that has an Azure role assigned directly to the resource (or a child resource), the role assignment isn't moved and becomes orphaned.
285285

286286
**Solution**
287287

288-
After you move a resource, you must re-create the role assignment. Eventually, the orphaned role assignment will be automatically removed, but it is a best practice to remove the role assignment before moving the resource. For information about how to move resources, see [Move resources to a new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md).
288+
After you move a resource, you must re-create the role assignment. Eventually, the orphaned role assignment will be automatically removed, but it's a best practice to remove the role assignment before moving the resource. For information about how to move resources, see [Move resources to a new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md).
289289

290-
### Symptom - Role assignment changes are not being detected
290+
### Symptom - Role assignment changes aren't being detected
291291

292-
You recently added or updated a role assignment, but the changes are not being detected. You might see the message `Status: 401 (Unauthorized)`.
292+
You recently added or updated a role assignment, but the changes aren't being detected. You might see the message `Status: 401 (Unauthorized)`.
293293

294294
**Cause 1**
295295

296296
Azure Resource Manager sometimes caches configurations and data to improve performance. When you assign roles or remove role assignments, it can take up to 30 minutes for changes to take effect.
297297

298298
**Solution 1**
299299

300-
If you are using the Azure portal, Azure PowerShell, or Azure CLI, you can force a refresh of your role assignment changes by signing out and signing in. If you are making role assignment changes with REST API calls, you can force a refresh by refreshing your access token.
300+
If you're using the Azure portal, Azure PowerShell, or Azure CLI, you can force a refresh of your role assignment changes by signing out and signing in. If you're making role assignment changes with REST API calls, you can force a refresh by refreshing your access token.
301301

302-
If you are add or remove a role assignment at management group scope and the role has `DataActions`, the access on the data plane might not be updated for several hours. This applies only to management group scope and the data plane.
302+
If you're add or remove a role assignment at management group scope and the role has `DataActions`, the access on the data plane might not be updated for several hours. This applies only to management group scope and the data plane.
303303

304304
**Cause 2**
305305

@@ -317,7 +317,7 @@ You use the [Remove-AzRoleAssignment](/powershell/module/az.resources/remove-azr
317317
Get-AzRoleAssignment -ObjectId $securityPrincipalObject.Id
318318
```
319319

320-
The [Get-AzRoleAssignment](/powershell/module/az.resources/get-azroleassignment) command indicates that the role assignment was not removed. However, if you wait 5-10 minutes and run [Get-AzRoleAssignment](/powershell/module/az.resources/get-azroleassignment) again, the output indicates the role assignment was removed.
320+
The [Get-AzRoleAssignment](/powershell/module/az.resources/get-azroleassignment) command indicates that the role assignment wasn't removed. However, if you wait 5-10 minutes and run [Get-AzRoleAssignment](/powershell/module/az.resources/get-azroleassignment) again, the output indicates the role assignment was removed.
321321

322322
**Cause**
323323

@@ -341,15 +341,15 @@ $validateRemovedRoles = Get-AzRoleAssignment -Scope /subscriptions/$subId | Wher
341341

342342
### Symptom - Unable to update a custom role
343343

344-
You are unable to update an existing custom role.
344+
You're unable to update an existing custom role.
345345

346346
**Cause**
347347

348-
You are currently signed in with a user that does not have permission to update custom roles.
348+
You're currently signed in with a user that doesn't have permission to update custom roles.
349349

350350
**Solution**
351351

352-
Check that you are currently signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleDefinition/write` permission such as [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator).
352+
Check that you're currently signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleDefinition/write` permission such as [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator).
353353

354354
### Symptom - Unable to create or update a custom role
355355

@@ -359,7 +359,7 @@ When you try to create or update a custom role, you get an error similar to foll
359359

360360
**Cause**
361361

362-
This error usually indicates that you do not have permissions to one or more of the [assignable scopes](role-definitions.md#assignablescopes) in the custom role.
362+
This error usually indicates that you don't have permissions to one or more of the [assignable scopes](role-definitions.md#assignablescopes) in the custom role.
363363

364364
**Solution**
365365

@@ -373,7 +373,7 @@ For more information, see the custom role tutorials using the [Azure portal](cus
373373

374374
### Symptom - Unable to delete a custom role
375375

376-
You are unable to delete a custom role and get the following error message:
376+
You're unable to delete a custom role and get the following error message:
377377

378378
`There are existing role assignments referencing role (code: RoleDefinitionHasAssignments)`
379379

@@ -405,7 +405,7 @@ When you try to create or update a custom role, you can't add data actions or yo
405405

406406
**Cause**
407407

408-
You are trying to create a custom role with data actions and a management group as assignable scope. Custom roles with `DataActions` cannot be assigned at the management group scope.
408+
You're trying to create a custom role with data actions and a management group as assignable scope. Custom roles with `DataActions` can't be assigned at the management group scope.
409409

410410
**Solution**
411411

@@ -435,11 +435,11 @@ When you try to create a resource, you get the following error message:
435435

436436
**Cause**
437437

438-
You are currently signed in with a user that does not have write permission to the resource at the selected scope.
438+
You're currently signed in with a user that doesn't have write permission to the resource at the selected scope.
439439

440440
**Solution**
441441

442-
Check that you are currently signed in with a user that is assigned a role that has write permission to the resource at the selected scope. For example, to manage virtual machines in a resource group, you should have the [Virtual Machine Contributor](built-in-roles.md#virtual-machine-contributor) role on the resource group (or parent scope). For a list of the permissions for each built-in role, see [Azure built-in roles](built-in-roles.md).
442+
Check that you're currently signed in with a user that is assigned a role that has write permission to the resource at the selected scope. For example, to manage virtual machines in a resource group, you should have the [Virtual Machine Contributor](built-in-roles.md#virtual-machine-contributor) role on the resource group (or parent scope). For a list of the permissions for each built-in role, see [Azure built-in roles](built-in-roles.md).
443443

444444
### Symptom - Unable to create a support request
445445

@@ -449,11 +449,11 @@ When you try to create or update a support ticket, you get the following error m
449449

450450
**Cause**
451451

452-
You are currently signed in with a user that does not have permission to the create support requests.
452+
You're currently signed in with a user that doesn't have permission to the create support requests.
453453

454454
**Solution**
455455

456-
Check that you are currently signed in with a user that is assigned a role that has the `Microsoft.Support/supportTickets/write` permission, such as [Support Request Contributor](built-in-roles.md#support-request-contributor).
456+
Check that you're currently signed in with a user that is assigned a role that has the `Microsoft.Support/supportTickets/write` permission, such as [Support Request Contributor](built-in-roles.md#support-request-contributor).
457457

458458
## Azure features are disabled
459459

@@ -486,7 +486,7 @@ A user has write access to a web app and some features are disabled.
486486

487487
**Cause**
488488

489-
Web apps are complicated by the presence of a few different resources that interplay. Here is a typical resource group with a couple of websites:
489+
Web apps are complicated by the presence of a few different resources that interplay. Here's a typical resource group with a couple of websites:
490490

491491
![Web app resource group](./media/troubleshooting/website-resource-model.png)
492492

@@ -545,7 +545,7 @@ A user has access to a function app and some features are disabled. For example,
545545

546546
**Cause**
547547

548-
Some features of [Azure Functions](../azure-functions/functions-overview.md) require write access. For example, if a user is assigned the [Reader](built-in-roles.md#reader) role, they will not be able to view the functions within a function app. The portal will display **(No access)**.
548+
Some features of [Azure Functions](../azure-functions/functions-overview.md) require write access. For example, if a user is assigned the [Reader](built-in-roles.md#reader) role, they won't be able to view the functions within a function app. The portal displays **(No access)**.
549549

550550
![Function apps no access](./media/troubleshooting/functionapps-noaccess.png)
551551

@@ -559,7 +559,7 @@ Assign an [Azure built-in role](built-in-roles.md) with write permissions for th
559559

560560
**Cause**
561561

562-
When you transfer an Azure subscription to a different Azure AD directory, all role assignments are **permanently** deleted from the source Azure AD directory and are not migrated to the target Azure AD directory.
562+
When you transfer an Azure subscription to a different Azure AD directory, all role assignments are **permanently** deleted from the source Azure AD directory and aren't migrated to the target Azure AD directory.
563563

564564
**Solution**
565565

@@ -569,11 +569,11 @@ You must re-create your role assignments in the target directory. You also have
569569

570570
**Solution**
571571

572-
If you are an Azure AD Global Administrator and you don't have access to a subscription after it was transferred between directories, use the **Access management for Azure resources** toggle to temporarily [elevate your access](elevate-access-global-admin.md) to get access to the subscription.
572+
If you're an Azure AD Global Administrator and you don't have access to a subscription after it was transferred between directories, use the **Access management for Azure resources** toggle to temporarily [elevate your access](elevate-access-global-admin.md) to get access to the subscription.
573573

574574
## Classic subscription administrators
575575

576-
### Symptom - Deleting a guest assigned the Co-Administrator role does not the remove role assignment
576+
### Symptom - Deleting a guest assigned the Co-Administrator role doesn't the remove role assignment
577577

578578
Consider the following scenario:
579579

0 commit comments

Comments
 (0)