Skip to content

Commit 73ebd98

Browse files
authored
Merge pull request #190750 from SGSneha/07Mar-RemoveCustomContributorRole
Removed the custom Azure Automation Contributor role section
2 parents 550a673 + b5d9ba0 commit 73ebd98

File tree

3 files changed

+2
-81
lines changed

3 files changed

+2
-81
lines changed

articles/automation/automation-role-based-access-control.md

Lines changed: 0 additions & 78 deletions
Original file line numberDiff line numberDiff line change
@@ -296,83 +296,6 @@ The following sections describe the minimum required permissions needed for enab
296296
|Create / edit saved search | Microsoft.OperationalInsights/workspaces/write | Workspace |
297297
|Create / edit scope config | Microsoft.OperationalInsights/workspaces/write | Workspace|
298298

299-
## Custom Azure Automation Contributor role
300-
301-
Microsoft intends to remove the Automation account rights from the Log Analytics Contributor role. Currently, the built-in [Log Analytics Contributor](#log-analytics-contributor) role described above can escalate privileges to the subscription [Contributor](./../role-based-access-control/built-in-roles.md#contributor) role. Since Automation account Run As accounts are initially configured with Contributor rights on the subscription, it can be used by an attacker to create new runbooks and execute code as a Contributor on the subscription.
302-
303-
As a result of this security risk, we recommend you don't use the Log Analytics Contributor role to execute Automation jobs. Instead, create the Azure Automation Contributor custom role and use it for actions related to the Automation account. Perform the following steps to create this custom role.
304-
305-
### Create using the Azure portal
306-
307-
Perform the following steps to create the Azure Automation custom role in the Azure portal. If you would like to learn more, see [Azure custom roles](./../role-based-access-control/custom-roles.md).
308-
309-
1. Copy and paste the following JSON syntax into a file. Save the file on your local machine or in an Azure storage account. In the JSON file, replace the value for the **assignableScopes** property with the subscription GUID.
310-
311-
```json
312-
{
313-
"properties": {
314-
"roleName": "Automation Account Contributor (Custom)",
315-
"description": "Allows access to manage Azure Automation and its resources",
316-
"assignableScopes": [
317-
"/subscriptions/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXX"
318-
],
319-
"permissions": [
320-
{
321-
"actions": [
322-
"Microsoft.Authorization/*/read",
323-
"Microsoft.Insights/alertRules/*",
324-
"Microsoft.Insights/metrics/read",
325-
"Microsoft.Insights/diagnosticSettings/*",
326-
"Microsoft.Resources/deployments/*",
327-
"Microsoft.Resources/subscriptions/resourceGroups/read",
328-
"Microsoft.Support/*"
329-
],
330-
"notActions": [],
331-
"dataActions": [],
332-
"notDataActions": []
333-
}
334-
]
335-
}
336-
}
337-
```
338-
339-
1. Complete the remaining steps as outlined in [Create or update Azure custom roles using the Azure portal](../role-based-access-control/custom-roles-portal.md#start-from-json). For [Step 3:Basics](../role-based-access-control/custom-roles-portal.md#step-3-basics), note the following:
340-
341-
- In the **Custom role name** field, enter **Automation account Contributor (custom)** or a name matching your naming standards.
342-
- For **Baseline permissions**, select **Start from JSON**. Then select the custom JSON file you saved earlier.
343-
344-
1. Complete the remaining steps, and then review and create the custom role. It can take a few minutes for your custom role to appear everywhere.
345-
346-
### Create using PowerShell
347-
348-
Perform the following steps to create the Azure Automation custom role with PowerShell. If you would like to learn more, see [Azure custom roles](./../role-based-access-control/custom-roles.md).
349-
350-
1. Copy and paste the following JSON syntax into a file. Save the file on your local machine or in an Azure storage account. In the JSON file, replace the value for the **AssignableScopes** property with the subscription GUID.
351-
352-
```json
353-
{
354-
"Name": "Automation account Contributor (custom)",
355-
"Id": "",
356-
"IsCustom": true,
357-
"Description": "Allows access to manage Azure Automation and its resources",
358-
"Actions": [
359-
"Microsoft.Authorization/*/read",
360-
"Microsoft.Insights/alertRules/*",
361-
"Microsoft.Insights/metrics/read",
362-
"Microsoft.Insights/diagnosticSettings/*",
363-
"Microsoft.Resources/deployments/*",
364-
"Microsoft.Resources/subscriptions/resourceGroups/read",
365-
"Microsoft.Support/*"
366-
],
367-
"NotActions": [],
368-
"AssignableScopes": [
369-
"/subscriptions/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXX"
370-
]
371-
}
372-
```
373-
374-
1. Complete the remaining steps as outlined in [Create or update Azure custom roles using Azure PowerShell](./../role-based-access-control/custom-roles-powershell.md#create-a-custom-role-with-json-template). It can take a few minutes for your custom role to appear everywhere.
375-
376299
## Manage Role permissions for Hybrid Worker Groups and Hybrid Workers
377300

378301
You can create [Azure custom roles](/azure/role-based-access-control/custom-roles) in Automation and grant the following permissions to Hybrid Worker Groups and Hybrid Workers:
@@ -388,7 +311,6 @@ Update Management can be used to assess and schedule update deployments to machi
388311

389312
|**Resource** |**Role** |**Scope** |
390313
|---------|---------|---------|
391-
|Automation account |[Custom Azure Automation Contributor role](#custom-azure-automation-contributor-role) |Automation account |
392314
|Automation account |Virtual Machine Contributor |Resource Group for the account |
393315
|Log Analytics workspace | Log Analytics Contributor|Log Analytics workspace |
394316
|Log Analytics workspace |Log Analytics Reader|Subscription|

articles/automation/automation-security-overview.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,6 @@ To be able to create or update the Automation account, you need to be a member o
9292

9393
- [Owner](./automation-role-based-access-control.md#owner)
9494
- [Contributor](./automation-role-based-access-control.md#contributor)
95-
- [Custom Azure Automation Contributor](./automation-role-based-access-control.md#custom-azure-automation-contributor-role)
9695

9796
To learn more about the Azure Resource Manager and Classic deployment models, see [Resource Manager and classic deployment](../azure-resource-manager/management/deployment-models.md).
9897

@@ -171,7 +170,7 @@ Role-based access control is available with Azure Resource Manager to grant perm
171170
If you have strict security controls for permission assignment in resource groups, you need to assign the Run As account membership to the **Contributor** role in the resource group.
172171

173172
> [!NOTE]
174-
> We recommend you don't use the **Log Analytics Contributor** role to execute Automation jobs. Instead, create the Azure Automation Contributor custom role and use it for actions related to the Automation account. For more information, see [Custom Azure Automation Contributor role](./automation-role-based-access-control.md#custom-azure-automation-contributor-role).
173+
> We recommend you don't use the **Log Analytics Contributor** role to execute Automation jobs. Instead, create the Azure Automation Contributor custom role and use it for actions related to the Automation account.
175174
176175
## Runbook authentication with Hybrid Runbook Worker
177176

articles/automation/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ For more information, see [Use of customer-managed keys](automation-secure-asset
126126

127127
Microsoft intends to remove the Automation account rights from the Log Analytics Contributor role. Currently, the built-in [Log Analytics Contributor](./automation-role-based-access-control.md#log-analytics-contributor) role can escalate privileges to the subscription [Contributor](./../role-based-access-control/built-in-roles.md#contributor) role. Since Automation account Run As accounts are initially configured with Contributor rights on the subscription, it can be used by an attacker to create new runbooks and execute code as a Contributor on the subscription.
128128

129-
As a result of this security risk, we recommend you don't use the Log Analytics Contributor role to execute Automation jobs. Instead, create the Azure Automation Contributor custom role and use it for actions related to the Automation account. For implementation steps, see [Custom Azure Automation Contributor role](./automation-role-based-access-control.md#custom-azure-automation-contributor-role).
129+
As a result of this security risk, we recommend you don't use the Log Analytics Contributor role to execute Automation jobs. Instead, create the Azure Automation Contributor custom role and use it for actions related to the Automation account.
130130

131131
### Support for Automation and State Configuration available in West US 3
132132

0 commit comments

Comments
 (0)