Skip to content

Commit 7647057

Browse files
Merge pull request #248780 from rolyon/rolyon-rbac-roles-role-based-access-control-admin
[Azure RBAC] Role Based Access Control Administrator
2 parents ae828dd + 31d38b7 commit 7647057

File tree

1 file changed

+45
-0
lines changed

1 file changed

+45
-0
lines changed

articles/role-based-access-control/built-in-roles.md

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ The following table provides a brief description of each built-in role. Click th
2929
> | [Contributor](#contributor) | Grants full access to manage all resources, but does not allow you to assign roles in Azure RBAC, manage assignments in Azure Blueprints, or share image galleries. | b24988ac-6180-42a0-ab88-20f7382dd24c |
3030
> | [Owner](#owner) | Grants full access to manage all resources, including the ability to assign roles in Azure RBAC. | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 |
3131
> | [Reader](#reader) | View all resources, but does not allow you to make any changes. | acdd72a7-3385-48ef-bd42-f606fba81ae7 |
32+
> | [Role Based Access Control Administrator (Preview)](#role-based-access-control-administrator-preview) | Manage access to Azure resources by assigning roles using Azure RBAC. This role does not allow you to manage access using other ways, such as Azure Policy. | f58310d9-a9f6-439a-9e8d-f62e7b41a168 |
3233
> | [User Access Administrator](#user-access-administrator) | Lets you manage user access to Azure resources. | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 |
3334
> | **Compute** | | |
3435
> | [Classic Virtual Machine Contributor](#classic-virtual-machine-contributor) | Lets you manage classic virtual machines, but not access to them, and not the virtual network or storage account they're connected to. | d73bb868-a0df-4d4d-bd69-98a00b01fccb |
@@ -461,6 +462,50 @@ View all resources, but does not allow you to make any changes. [Learn more](rba
461462
"type": "Microsoft.Authorization/roleDefinitions"
462463
}
463464
```
465+
### Role Based Access Control Administrator (Preview)
466+
467+
Manage access to Azure resources by assigning roles using Azure RBAC. This role does not allow you to manage access using other ways, such as Azure Policy.
468+
469+
> [!div class="mx-tableFixed"]
470+
> | Actions | Description |
471+
> | --- | --- |
472+
> | [Microsoft.Authorization](resource-provider-operations.md#microsoftauthorization)/roleAssignments/write | Create a role assignment at the specified scope. |
473+
> | [Microsoft.Authorization](resource-provider-operations.md#microsoftauthorization)/roleAssignments/delete | Delete a role assignment at the specified scope. |
474+
> | */read | Read resources of all types, except secrets. |
475+
> | [Microsoft.Support](resource-provider-operations.md#microsoftsupport)/* | Create and update a support ticket |
476+
> | **NotActions** | |
477+
> | *none* | |
478+
> | **DataActions** | |
479+
> | *none* | |
480+
> | **NotDataActions** | |
481+
> | *none* | |
482+
483+
```json
484+
{
485+
"assignableScopes": [
486+
"/"
487+
],
488+
"description": "Manage access to Azure resources by assigning roles using Azure RBAC. This role does not allow you to manage access using other ways, such as Azure Policy.",
489+
"id": "/providers/Microsoft.Authorization/roleDefinitions/f58310d9-a9f6-439a-9e8d-f62e7b41a168",
490+
"name": "f58310d9-a9f6-439a-9e8d-f62e7b41a168",
491+
"permissions": [
492+
{
493+
"actions": [
494+
"Microsoft.Authorization/roleAssignments/write",
495+
"Microsoft.Authorization/roleAssignments/delete",
496+
"*/read",
497+
"Microsoft.Support/*"
498+
],
499+
"notActions": [],
500+
"dataActions": [],
501+
"notDataActions": []
502+
}
503+
],
504+
"roleName": "Role Based Access Control Administrator (Preview)",
505+
"roleType": "BuiltInRole",
506+
"type": "Microsoft.Authorization/roleDefinitions"
507+
}
508+
```
464509

465510
### User Access Administrator
466511

0 commit comments

Comments
 (0)