You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/troubleshooting.md
+37-37Lines changed: 37 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ $ras.Count
52
52
53
53
### Symptom - No more role assignments can be created at management group scope
54
54
55
-
You are unable to assign a role at management group scope.
55
+
You're unable to assign a role at management group scope.
56
56
57
57
**Cause**
58
58
@@ -69,21 +69,21 @@ Try to reduce the number of role assignments in the management group.
69
69
70
70
### Symptom - Unable to assign a role
71
71
72
-
You are unable to assign a role in the Azure portal on **Access control (IAM)** because the **Add** > **Add role assignment** option is disabled or because you get the following permissions error:
72
+
You're unable to assign a role in the Azure portal on **Access control (IAM)** because the **Add** > **Add role assignment** option is disabled or because you get the following permissions error:
73
73
74
74
`The client with object id does not have authorization to perform action`
75
75
76
76
**Cause**
77
77
78
-
You are currently signed in with a user that does not have permission to assign roles at the selected scope.
78
+
You're currently signed in with a user that doesn't have permission to assign roles at the selected scope.
79
79
80
80
**Solution**
81
81
82
-
Check that you are currently signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleAssignments/write` permission such as [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator) at the scope you are trying to assign the role.
82
+
Check that you're currently signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleAssignments/write` permission such as [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator) at the scope you're trying to assign the role.
83
83
84
84
### Symptom - Unable to assign a role using a service principal with Azure CLI
85
85
86
-
You are using a service principal to assign roles with Azure CLI and you get the following error:
86
+
You're using a service principal to assign roles with Azure CLI and you get the following error:
87
87
88
88
`Insufficient privileges to complete the operation`
89
89
@@ -96,13 +96,13 @@ az role assignment create --assignee "userupn" --role "Contributor" --scope "/s
96
96
97
97
**Cause**
98
98
99
-
It is likely Azure CLI is attempting to look up the assignee identity in Azure AD and the service principal cannot read Azure AD by default.
99
+
It's likely Azure CLI is attempting to look up the assignee identity in Azure AD and the service principal can't read Azure AD by default.
100
100
101
101
**Solution**
102
102
103
103
There are two ways to potentially resolve this error. The first way is to assign the [Directory Readers](../active-directory/roles/permissions-reference.md#directory-readers) role to the service principal so that it can read data in the directory.
104
104
105
-
The second way to resolve this error is to create the role assignment by using the `--assignee-object-id` parameter instead of `--assignee`. By using `--assignee-object-id`, Azure CLI will skip the Azure AD lookup. You will need to get the object ID of the user, group, or application that you want to assign the role to. For more information, see [Assign Azure roles using Azure CLI](role-assignments-cli.md#assign-a-role-for-a-new-service-principal-at-a-resource-group-scope).
105
+
The second way to resolve this error is to create the role assignment by using the `--assignee-object-id` parameter instead of `--assignee`. By using `--assignee-object-id`, Azure CLI will skip the Azure AD lookup. You'll need to get the object ID of the user, group, or application that you want to assign the role to. For more information, see [Assign Azure roles using Azure CLI](role-assignments-cli.md#assign-a-role-for-a-new-service-principal-at-a-resource-group-scope).
106
106
107
107
```azurecli
108
108
az role assignment create --assignee-object-id 11111111-1111-1111-1111-111111111111 --role "Contributor" --scope "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}"
@@ -123,7 +123,7 @@ The reason is likely a replication delay. The principal is created in one region
123
123
124
124
**Solution 1**
125
125
126
-
If you are creating a new user or service principal using the REST API or ARM template, set the `principalType` property when creating the role assignment using the [Role Assignments - Create](/rest/api/authorization/role-assignments/create) API.
126
+
If you're creating a new user or service principal using the REST API or ARM template, set the `principalType` property when creating the role assignment using the [Role Assignments - Create](/rest/api/authorization/role-assignments/create) API.
127
127
128
128
| principalType | apiVersion |
129
129
| --- | --- |
@@ -134,11 +134,11 @@ For more information, see [Assign Azure roles to a new service principal using t
134
134
135
135
**Solution 2**
136
136
137
-
If you are creating a new user or service principal using Azure PowerShell, set the `ObjectType` parameter to `User` or `ServicePrincipal` when creating the role assignment using [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment). The same underlying API version restrictions of Solution 1 still apply. For more information, see [Assign Azure roles using Azure PowerShell](role-assignments-powershell.md).
137
+
If you're creating a new user or service principal using Azure PowerShell, set the `ObjectType` parameter to `User` or `ServicePrincipal` when creating the role assignment using [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment). The same underlying API version restrictions of Solution 1 still apply. For more information, see [Assign Azure roles using Azure PowerShell](role-assignments-powershell.md).
138
138
139
139
**Solution 3**
140
140
141
-
If you are creating a new group, wait a few minutes before creating the role assignment.
141
+
If you're creating a new group, wait a few minutes before creating the role assignment.
142
142
143
143
### Symptom - ARM template role assignment returns BadRequest status
144
144
@@ -150,7 +150,7 @@ For example, if you create a role assignment for a managed identity, then you de
150
150
151
151
**Cause**
152
152
153
-
The role assignment `name`is not unique, and it is viewed as an update.
153
+
The role assignment `name`isn't unique, and it's viewed as an update.
154
154
155
155
Role assignments are uniquely identified by their name, which is a globally unique identifier (GUID). You can't create two role assignments with the same name, even in different Azure subscriptions. You also can't change the properties of an existing role assignment.
156
156
@@ -242,7 +242,7 @@ You deleted a security principal that had a role assignment. If you assign a rol
242
242
243
243
It isn't a problem to leave these role assignments where the security principal has been deleted. If you like, you can remove these role assignments using steps that are similar to other role assignments. For information about how to remove role assignments, see [Remove Azure role assignments](role-assignments-remove.md).
244
244
245
-
In PowerShell, if you try to remove the role assignments using the object ID and role definition name, and more than one role assignment matches your parameters, you will get the error message: `The provided information does not map to a role assignment`. The following output shows an example of the error message:
245
+
In PowerShell, if you try to remove the role assignments using the object ID and role definition name, and more than one role assignment matches your parameters, you'll get the error message: `The provided information does not map to a role assignment`. The following output shows an example of the error message:
246
246
247
247
```
248
248
PS C:\> Remove-AzRoleAssignment -ObjectId 33333333-3333-3333-3333-333333333333 -RoleDefinitionName "Storage Blob Data Contributor"
@@ -269,37 +269,37 @@ You attempt to remove the last Owner role assignment for a subscription and you
269
269
270
270
**Cause**
271
271
272
-
Removing the last Owner role assignment for a subscription is not supported to avoid orphaning the subscription.
272
+
Removing the last Owner role assignment for a subscription isn't supported to avoid orphaning the subscription.
273
273
274
274
**Solution**
275
275
276
276
If you want to cancel your subscription, see [Cancel your Azure subscription](../cost-management-billing/manage/cancel-azure-subscription.md).
277
277
278
-
You are allowed to remove the last Owner (or User Access Administrator) role assignment at subscription scope, if you are a Global Administrator for the tenant or a classic administrator (Service Administrator or Co-Administrator) for the subscription. In this case, there is no constraint for deletion. However, if the call comes from some other principal, then you won't be able to remove the last Owner role assignment at subscription scope.
278
+
You're allowed to remove the last Owner (or User Access Administrator) role assignment at subscription scope, if you're a Global Administrator for the tenant or a classic administrator (Service Administrator or Co-Administrator) for the subscription. In this case, there's no constraint for deletion. However, if the call comes from some other principal, then you won't be able to remove the last Owner role assignment at subscription scope.
279
279
280
-
### Symptom - Role assignment is not moved after moving a resource
280
+
### Symptom - Role assignment isn't moved after moving a resource
281
281
282
282
**Cause**
283
283
284
-
If you move a resource that has an Azure role assigned directly to the resource (or a child resource), the role assignment is not moved and becomes orphaned.
284
+
If you move a resource that has an Azure role assigned directly to the resource (or a child resource), the role assignment isn't moved and becomes orphaned.
285
285
286
286
**Solution**
287
287
288
-
After you move a resource, you must re-create the role assignment. Eventually, the orphaned role assignment will be automatically removed, but it is a best practice to remove the role assignment before moving the resource. For information about how to move resources, see [Move resources to a new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md).
288
+
After you move a resource, you must re-create the role assignment. Eventually, the orphaned role assignment will be automatically removed, but it's a best practice to remove the role assignment before moving the resource. For information about how to move resources, see [Move resources to a new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md).
289
289
290
-
### Symptom - Role assignment changes are not being detected
290
+
### Symptom - Role assignment changes aren't being detected
291
291
292
-
You recently added or updated a role assignment, but the changes are not being detected. You might see the message `Status: 401 (Unauthorized)`.
292
+
You recently added or updated a role assignment, but the changes aren't being detected. You might see the message `Status: 401 (Unauthorized)`.
293
293
294
294
**Cause 1**
295
295
296
296
Azure Resource Manager sometimes caches configurations and data to improve performance. When you assign roles or remove role assignments, it can take up to 30 minutes for changes to take effect.
297
297
298
298
**Solution 1**
299
299
300
-
If you are using the Azure portal, Azure PowerShell, or Azure CLI, you can force a refresh of your role assignment changes by signing out and signing in. If you are making role assignment changes with REST API calls, you can force a refresh by refreshing your access token.
300
+
If you're using the Azure portal, Azure PowerShell, or Azure CLI, you can force a refresh of your role assignment changes by signing out and signing in. If you're making role assignment changes with REST API calls, you can force a refresh by refreshing your access token.
301
301
302
-
If you are add or remove a role assignment at management group scope and the role has `DataActions`, the access on the data plane might not be updated for several hours. This applies only to management group scope and the data plane.
302
+
If you're add or remove a role assignment at management group scope and the role has `DataActions`, the access on the data plane might not be updated for several hours. This applies only to management group scope and the data plane.
303
303
304
304
**Cause 2**
305
305
@@ -317,7 +317,7 @@ You use the [Remove-AzRoleAssignment](/powershell/module/az.resources/remove-azr
The [Get-AzRoleAssignment](/powershell/module/az.resources/get-azroleassignment) command indicates that the role assignment was not removed. However, if you wait 5-10 minutes and run [Get-AzRoleAssignment](/powershell/module/az.resources/get-azroleassignment) again, the output indicates the role assignment was removed.
320
+
The [Get-AzRoleAssignment](/powershell/module/az.resources/get-azroleassignment) command indicates that the role assignment wasn't removed. However, if you wait 5-10 minutes and run [Get-AzRoleAssignment](/powershell/module/az.resources/get-azroleassignment) again, the output indicates the role assignment was removed.
You are currently signed in with a user that does not have permission to update custom roles.
348
+
You're currently signed in with a user that doesn't have permission to update custom roles.
349
349
350
350
**Solution**
351
351
352
-
Check that you are currently signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleDefinition/write` permission such as [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator).
352
+
Check that you're currently signed in with a user that is assigned a role that has the `Microsoft.Authorization/roleDefinition/write` permission such as [Owner](built-in-roles.md#owner) or [User Access Administrator](built-in-roles.md#user-access-administrator).
353
353
354
354
### Symptom - Unable to create or update a custom role
355
355
@@ -359,7 +359,7 @@ When you try to create or update a custom role, you get an error similar to foll
359
359
360
360
**Cause**
361
361
362
-
This error usually indicates that you do not have permissions to one or more of the [assignable scopes](role-definitions.md#assignablescopes) in the custom role.
362
+
This error usually indicates that you don't have permissions to one or more of the [assignable scopes](role-definitions.md#assignablescopes) in the custom role.
363
363
364
364
**Solution**
365
365
@@ -373,7 +373,7 @@ For more information, see the custom role tutorials using the [Azure portal](cus
373
373
374
374
### Symptom - Unable to delete a custom role
375
375
376
-
You are unable to delete a custom role and get the following error message:
376
+
You're unable to delete a custom role and get the following error message:
377
377
378
378
`There are existing role assignments referencing role (code: RoleDefinitionHasAssignments)`
379
379
@@ -405,7 +405,7 @@ When you try to create or update a custom role, you can't add data actions or yo
405
405
406
406
**Cause**
407
407
408
-
You are trying to create a custom role with data actions and a management group as assignable scope. Custom roles with `DataActions`cannot be assigned at the management group scope.
408
+
You're trying to create a custom role with data actions and a management group as assignable scope. Custom roles with `DataActions`can't be assigned at the management group scope.
409
409
410
410
**Solution**
411
411
@@ -435,11 +435,11 @@ When you try to create a resource, you get the following error message:
435
435
436
436
**Cause**
437
437
438
-
You are currently signed in with a user that does not have write permission to the resource at the selected scope.
438
+
You're currently signed in with a user that doesn't have write permission to the resource at the selected scope.
439
439
440
440
**Solution**
441
441
442
-
Check that you are currently signed in with a user that is assigned a role that has write permission to the resource at the selected scope. For example, to manage virtual machines in a resource group, you should have the [Virtual Machine Contributor](built-in-roles.md#virtual-machine-contributor) role on the resource group (or parent scope). For a list of the permissions for each built-in role, see [Azure built-in roles](built-in-roles.md).
442
+
Check that you're currently signed in with a user that is assigned a role that has write permission to the resource at the selected scope. For example, to manage virtual machines in a resource group, you should have the [Virtual Machine Contributor](built-in-roles.md#virtual-machine-contributor) role on the resource group (or parent scope). For a list of the permissions for each built-in role, see [Azure built-in roles](built-in-roles.md).
443
443
444
444
### Symptom - Unable to create a support request
445
445
@@ -449,11 +449,11 @@ When you try to create or update a support ticket, you get the following error m
449
449
450
450
**Cause**
451
451
452
-
You are currently signed in with a user that does not have permission to the create support requests.
452
+
You're currently signed in with a user that doesn't have permission to the create support requests.
453
453
454
454
**Solution**
455
455
456
-
Check that you are currently signed in with a user that is assigned a role that has the `Microsoft.Support/supportTickets/write` permission, such as [Support Request Contributor](built-in-roles.md#support-request-contributor).
456
+
Check that you're currently signed in with a user that is assigned a role that has the `Microsoft.Support/supportTickets/write` permission, such as [Support Request Contributor](built-in-roles.md#support-request-contributor).
457
457
458
458
## Azure features are disabled
459
459
@@ -486,7 +486,7 @@ A user has write access to a web app and some features are disabled.
486
486
487
487
**Cause**
488
488
489
-
Web apps are complicated by the presence of a few different resources that interplay. Here is a typical resource group with a couple of websites:
489
+
Web apps are complicated by the presence of a few different resources that interplay. Here's a typical resource group with a couple of websites:
@@ -545,7 +545,7 @@ A user has access to a function app and some features are disabled. For example,
545
545
546
546
**Cause**
547
547
548
-
Some features of [Azure Functions](../azure-functions/functions-overview.md) require write access. For example, if a user is assigned the [Reader](built-in-roles.md#reader) role, they will not be able to view the functions within a function app. The portal will display**(No access)**.
548
+
Some features of [Azure Functions](../azure-functions/functions-overview.md) require write access. For example, if a user is assigned the [Reader](built-in-roles.md#reader) role, they won't be able to view the functions within a function app. The portal displays**(No access)**.
549
549
550
550

551
551
@@ -559,7 +559,7 @@ Assign an [Azure built-in role](built-in-roles.md) with write permissions for th
559
559
560
560
**Cause**
561
561
562
-
When you transfer an Azure subscription to a different Azure AD directory, all role assignments are **permanently** deleted from the source Azure AD directory and are not migrated to the target Azure AD directory.
562
+
When you transfer an Azure subscription to a different Azure AD directory, all role assignments are **permanently** deleted from the source Azure AD directory and aren't migrated to the target Azure AD directory.
563
563
564
564
**Solution**
565
565
@@ -569,11 +569,11 @@ You must re-create your role assignments in the target directory. You also have
569
569
570
570
**Solution**
571
571
572
-
If you are an Azure AD Global Administrator and you don't have access to a subscription after it was transferred between directories, use the **Access management for Azure resources** toggle to temporarily [elevate your access](elevate-access-global-admin.md) to get access to the subscription.
572
+
If you're an Azure AD Global Administrator and you don't have access to a subscription after it was transferred between directories, use the **Access management for Azure resources** toggle to temporarily [elevate your access](elevate-access-global-admin.md) to get access to the subscription.
573
573
574
574
## Classic subscription administrators
575
575
576
-
### Symptom - Deleting a guest assigned the Co-Administrator role does not the remove role assignment
576
+
### Symptom - Deleting a guest assigned the Co-Administrator role doesn't the remove role assignment
0 commit comments