Skip to content

Commit 6dd4557

Browse files
authored
Merge pull request #124174 from rolyon/rolyon-rbac-troubleshoot-service-principal-fixes
[Azure RBAC] Troubleshooting update
2 parents c54e00f + d61d7bd commit 6dd4557

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/role-based-access-control/resource-provider-operations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Azure resource providers operations
2+
title: Azure resource provider operations
33
description: Lists the operations for Azure resource providers.
44
services: active-directory
55
ms.service: role-based-access-control
@@ -10,7 +10,7 @@ ms.author: rolyon
1010
ms.date: 07/16/2020
1111
---
1212

13-
# Azure resource providers operations
13+
# Azure resource provider operations
1414

1515
This section lists the operations for Azure resource providers, which are used in built-in roles. You can use these operations in your own [Azure custom roles](custom-roles.md) to provide granular access control to resources in Azure. The resource provider operations are always evolving. To get the latest operations, use [Get-AzProviderOperation](/powershell/module/az.resources/get-azprovideroperation) or [az provider operation list](/cli/azure/provider/operation#az-provider-operation-list).
1616

articles/role-based-access-control/troubleshooting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: troubleshooting
14-
ms.date: 07/24/2020
14+
ms.date: 07/28/2020
1515
ms.author: rolyon
1616
ms.reviewer: bagovind
1717
ms.custom: seohack1
@@ -55,7 +55,7 @@ $ras.Count
5555
5656
If you get the error "Insufficient privileges to complete the operation", it is likely because Azure CLI is attempting to lookup the assignee identity in Azure AD and the service principal cannot read Azure AD by default.
5757
58-
There are two ways to potentially resolve this error. The first way is to assign the [Directory Readers](../active-directory/users-groups-roles/directory-assign-admin-roles.md#directory-readers) role to the service principal so that it can read data in the directory. You could also grant the [Directory.Read.All permission](https://docs.microsoft.com/graph/permissions-reference) in Microsoft Graph.
58+
There are two ways to potentially resolve this error. The first way is to assign the [Directory Readers](../active-directory/users-groups-roles/directory-assign-admin-roles.md#directory-readers) role to the service principal so that it can read data in the directory.
5959
6060
The second way to resolve this error is to create the role assignment by using the `--assignee-object-id` parameter instead of `--assignee`. By using `--assignee-object-id`, Azure CLI will skip the Azure AD lookup. You will need to get the object ID of the user, group, or application that you want to assign the role to. For more information, see [Add or remove Azure role assignments using Azure CLI](role-assignments-cli.md#new-service-principal).
6161

0 commit comments

Comments
 (0)