Skip to content

Commit 947bd04

Browse files
Merge pull request #270732 from rolyon/rolyon-rbac-roles-azure-kubernetes-fleet-manager
[Azure RBAC] Azure Kubernetes Fleet Manager
2 parents 0527f57 + 229d6ad commit 947bd04

File tree

4 files changed

+71
-14
lines changed

4 files changed

+71
-14
lines changed

articles/role-based-access-control/built-in-roles.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -161,10 +161,11 @@ The following table provides a brief description of each built-in role. Click th
161161
> | <a name='azure-arc-kubernetes-cluster-admin'></a>[Azure Arc Kubernetes Cluster Admin](./built-in-roles/containers.md#azure-arc-kubernetes-cluster-admin) | Lets you manage all resources in the cluster. | 8393591c-06b9-48a2-a542-1bd6b377f6a2 |
162162
> | <a name='azure-arc-kubernetes-viewer'></a>[Azure Arc Kubernetes Viewer](./built-in-roles/containers.md#azure-arc-kubernetes-viewer) | Lets you view all resources in cluster/namespace, except secrets. | 63f0a09d-1495-4db4-a681-037d84835eb4 |
163163
> | <a name='azure-arc-kubernetes-writer'></a>[Azure Arc Kubernetes Writer](./built-in-roles/containers.md#azure-arc-kubernetes-writer) | Lets you update everything in cluster/namespace, except (cluster)roles and (cluster)role bindings. | 5b999177-9696-4545-85c7-50de3797e5a1 |
164-
> | <a name='azure-kubernetes-fleet-manager-rbac-admin'></a>[Azure Kubernetes Fleet Manager RBAC Admin](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-admin) | This role grants admin access - provides write permissions on most objects within a namespace, with the exception of ResourceQuota object and the namespace object itself. Applying this role at cluster scope will give access across all namespaces. | 434fb43a-c01c-447e-9f67-c3ad923cfaba |
165-
> | <a name='azure-kubernetes-fleet-manager-rbac-cluster-admin'></a>[Azure Kubernetes Fleet Manager RBAC Cluster Admin](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-cluster-admin) | Lets you manage all resources in the fleet manager cluster. | 18ab4d3d-a1bf-4477-8ad9-8359bc988f69 |
166-
> | <a name='azure-kubernetes-fleet-manager-rbac-reader'></a>[Azure Kubernetes Fleet Manager RBAC Reader](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-reader) | Allows read-only access to see most objects in a namespace. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces. | 30b27cfc-9c84-438e-b0ce-70e35255df80 |
167-
> | <a name='azure-kubernetes-fleet-manager-rbac-writer'></a>[Azure Kubernetes Fleet Manager RBAC Writer](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-writer) | Allows read/write access to most objects in a namespace. This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces. | 5af6afb3-c06c-4fa4-8848-71a8aee05683 |
164+
> | <a name='azure-kubernetes-fleet-manager-contributor-role'></a>[Azure Kubernetes Fleet Manager Contributor Role](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-contributor-role) | Grants read/write access to Azure resources provided by Azure Kubernetes Fleet Manager, including fleets, fleet members, fleet update strategies, fleet update runs, etc. | 63bb64ad-9799-4770-b5c3-24ed299a07bf |
165+
> | <a name='azure-kubernetes-fleet-manager-rbac-admin'></a>[Azure Kubernetes Fleet Manager RBAC Admin](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-admin) | Grants read/write access to Kubernetes resources within a namespace in the fleet-managed hub cluster - provides write permissions on most objects within a namespace, with the exception of ResourceQuota object and the namespace object itself. Applying this role at cluster scope will give access across all namespaces. | 434fb43a-c01c-447e-9f67-c3ad923cfaba |
166+
> | <a name='azure-kubernetes-fleet-manager-rbac-cluster-admin'></a>[Azure Kubernetes Fleet Manager RBAC Cluster Admin](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-cluster-admin) | Grants read/write access to all Kubernetes resources in the fleet-managed hub cluster. | 18ab4d3d-a1bf-4477-8ad9-8359bc988f69 |
167+
> | <a name='azure-kubernetes-fleet-manager-rbac-reader'></a>[Azure Kubernetes Fleet Manager RBAC Reader](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-reader) | Grants read-only access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces. | 30b27cfc-9c84-438e-b0ce-70e35255df80 |
168+
> | <a name='azure-kubernetes-fleet-manager-rbac-writer'></a>[Azure Kubernetes Fleet Manager RBAC Writer](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-writer) | Grants read/write access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace.  Applying this role at cluster scope will give access across all namespaces. | 5af6afb3-c06c-4fa4-8848-71a8aee05683 |
168169
> | <a name='azure-kubernetes-service-cluster-admin-role'></a>[Azure Kubernetes Service Cluster Admin Role](./built-in-roles/containers.md#azure-kubernetes-service-cluster-admin-role) | List cluster admin credential action. | 0ab0b1a8-8aac-4efd-b8c2-3ee1fb270be8 |
169170
> | <a name='azure-kubernetes-service-cluster-monitoring-user'></a>[Azure Kubernetes Service Cluster Monitoring User](./built-in-roles/containers.md#azure-kubernetes-service-cluster-monitoring-user) | List cluster monitoring user credential action. | 1afdec4b-e479-420e-99e7-f82237c7c5e6 |
170171
> | <a name='azure-kubernetes-service-cluster-user-role'></a>[Azure Kubernetes Service Cluster User Role](./built-in-roles/containers.md#azure-kubernetes-service-cluster-user-role) | List cluster user credential action. | 4abbcc35-e782-43d8-92c5-2d3f1bd2253f |

articles/role-based-access-control/built-in-roles/containers.md

Lines changed: 57 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -727,9 +727,52 @@ Lets you update everything in cluster/namespace, except (cluster)roles and (clus
727727
}
728728
```
729729

730+
## Azure Kubernetes Fleet Manager Contributor Role
731+
732+
Grants read/write access to Azure resources provided by Azure Kubernetes Fleet Manager, including fleets, fleet members, fleet update strategies, fleet update runs, etc.
733+
734+
> [!div class="mx-tableFixed"]
735+
> | Actions | Description |
736+
> | --- | --- |
737+
> | [Microsoft.ContainerService](../permissions/containers.md#microsoftcontainerservice)/fleets/* | |
738+
> | [Microsoft.Resources](../permissions/management-and-governance.md#microsoftresources)/deployments/* | Create and manage a deployment |
739+
> | **NotActions** | |
740+
> | *none* | |
741+
> | **DataActions** | |
742+
> | *none* | |
743+
> | **NotDataActions** | |
744+
> | *none* | |
745+
746+
```json
747+
{
748+
"assignableScopes": [
749+
"/"
750+
],
751+
"description": "Grants read/write access to Azure resources provided by Azure Kubernetes Fleet Manager, including fleets, fleet members, fleet update strategies, fleet update runs, etc.",
752+
"id": "/providers/Microsoft.Authorization/roleDefinitions/63bb64ad-9799-4770-b5c3-24ed299a07bf",
753+
"name": "63bb64ad-9799-4770-b5c3-24ed299a07bf",
754+
"permissions": [
755+
{
756+
"actions": [
757+
"Microsoft.ContainerService/fleets/*",
758+
"Microsoft.Resources/deployments/*"
759+
],
760+
"notActions": [],
761+
"dataActions": [],
762+
"notDataActions": []
763+
}
764+
],
765+
"roleName": "Azure Kubernetes Fleet Manager Contributor Role",
766+
"roleType": "BuiltInRole",
767+
"type": "Microsoft.Authorization/roleDefinitions"
768+
}
769+
```
770+
730771
## Azure Kubernetes Fleet Manager RBAC Admin
731772

732-
This role grants admin access - provides write permissions on most objects within a namespace, with the exception of ResourceQuota object and the namespace object itself. Applying this role at cluster scope will give access across all namespaces.
773+
Grants read/write access to Kubernetes resources within a namespace in the fleet-managed hub cluster - provides write permissions on most objects within a namespace, with the exception of ResourceQuota object and the namespace object itself. Applying this role at cluster scope will give access across all namespaces.
774+
775+
[Learn more](/azure/kubernetes-fleet/access-fleet-kubernetes-api)
733776

734777
> [!div class="mx-tableFixed"]
735778
> | Actions | Description |
@@ -781,7 +824,7 @@ This role grants admin access - provides write permissions on most objects withi
781824
"assignableScopes": [
782825
"/"
783826
],
784-
"description": "This role grants admin access - provides write permissions on most objects within a a namespace, with the exception of ResourceQuota object and the namespace object itself. Applying this role at cluster scope will give access across all namespaces.",
827+
"description": "Grants read/write access to Kubernetes resources within a namespace in the fleet-managed hub cluster - provides write permissions on most objects within a a namespace, with the exception of ResourceQuota object and the namespace object itself. Applying this role at cluster scope will give access across all namespaces.",
785828
"id": "/providers/Microsoft.Authorization/roleDefinitions/434fb43a-c01c-447e-9f67-c3ad923cfaba",
786829
"name": "434fb43a-c01c-447e-9f67-c3ad923cfaba",
787830
"permissions": [
@@ -838,7 +881,9 @@ This role grants admin access - provides write permissions on most objects withi
838881

839882
## Azure Kubernetes Fleet Manager RBAC Cluster Admin
840883

841-
Lets you manage all resources in the fleet manager cluster.
884+
Grants read/write access to all Kubernetes resources in the fleet-managed hub cluster.
885+
886+
[Learn more](/azure/kubernetes-fleet/access-fleet-kubernetes-api)
842887

843888
> [!div class="mx-tableFixed"]
844889
> | Actions | Description |
@@ -861,7 +906,7 @@ Lets you manage all resources in the fleet manager cluster.
861906
"assignableScopes": [
862907
"/"
863908
],
864-
"description": "Lets you manage all resources in the fleet manager cluster.",
909+
"description": "Grants read/write access to all Kubernetes resources in the fleet-managed hub cluster.",
865910
"id": "/providers/Microsoft.Authorization/roleDefinitions/18ab4d3d-a1bf-4477-8ad9-8359bc988f69",
866911
"name": "18ab4d3d-a1bf-4477-8ad9-8359bc988f69",
867912
"permissions": [
@@ -889,7 +934,9 @@ Lets you manage all resources in the fleet manager cluster.
889934

890935
## Azure Kubernetes Fleet Manager RBAC Reader
891936

892-
Allows read-only access to see most objects in a namespace. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces.
937+
Grants read-only access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces.
938+
939+
[Learn more](/azure/kubernetes-fleet/access-fleet-kubernetes-api)
893940

894941
> [!div class="mx-tableFixed"]
895942
> | Actions | Description |
@@ -937,7 +984,7 @@ Allows read-only access to see most objects in a namespace. It does not allow vi
937984
"assignableScopes": [
938985
"/"
939986
],
940-
"description": "Allows read-only access to see most objects in a namespace. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces.",
987+
"description": "Grants read-only access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces.",
941988
"id": "/providers/Microsoft.Authorization/roleDefinitions/30b27cfc-9c84-438e-b0ce-70e35255df80",
942989
"name": "30b27cfc-9c84-438e-b0ce-70e35255df80",
943990
"permissions": [
@@ -990,7 +1037,9 @@ Allows read-only access to see most objects in a namespace. It does not allow vi
9901037

9911038
## Azure Kubernetes Fleet Manager RBAC Writer
9921039

993-
Allows read/write access to most objects in a namespace. This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces.
1040+
Grants read/write access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace.  Applying this role at cluster scope will give access across all namespaces.
1041+
1042+
[Learn more](/azure/kubernetes-fleet/access-fleet-kubernetes-api)
9941043

9951044
> [!div class="mx-tableFixed"]
9961045
> | Actions | Description |
@@ -1039,7 +1088,7 @@ Allows read/write access to most objects in a namespace. This role does not allo
10391088
"assignableScopes": [
10401089
"/"
10411090
],
1042-
"description": "Allows read/write access to most objects in a namespace.This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces.",
1091+
"description": "Grants read/write access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace.  Applying this role at cluster scope will give access across all namespaces.",
10431092
"id": "/providers/Microsoft.Authorization/roleDefinitions/5af6afb3-c06c-4fa4-8848-71a8aee05683",
10441093
"name": "5af6afb3-c06c-4fa4-8848-71a8aee05683",
10451094
"permissions": [

articles/role-based-access-control/permissions/containers.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -215,7 +215,7 @@ Azure service: [Container Registry](/azure/container-registry/)
215215

216216
Accelerate your containerized application development without compromising security.
217217

218-
Azure service: [Azure Kubernetes Service (AKS)](/azure/aks/)
218+
Azure service: [Azure Kubernetes Service (AKS)](/azure/aks/intro-kubernetes)
219219

220220
> [!div class="mx-tableFixed"]
221221
> | Action | Description |
@@ -233,6 +233,9 @@ Azure service: [Azure Kubernetes Service (AKS)](/azure/aks/)
233233
> | Microsoft.ContainerService/fleets/write | Create or Update a fleet |
234234
> | Microsoft.ContainerService/fleets/delete | Delete a fleet |
235235
> | Microsoft.ContainerService/fleets/listCredentials/action | List fleet credentials |
236+
> | Microsoft.ContainerService/fleets/autoUpgradeProfiles/read | Get a fleet auto upgrade profile |
237+
> | Microsoft.ContainerService/fleets/autoUpgradeProfiles/write | Create or Update a fleet auto upgrade profile |
238+
> | Microsoft.ContainerService/fleets/autoUpgradeProfiles/delete | Delete a fleet auto upgrade profile |
236239
> | Microsoft.ContainerService/fleets/members/read | Get a fleet member |
237240
> | Microsoft.ContainerService/fleets/members/write | Create or Update a fleet member |
238241
> | Microsoft.ContainerService/fleets/members/delete | Delete a fleet member |
@@ -247,6 +250,7 @@ Azure service: [Azure Kubernetes Service (AKS)](/azure/aks/)
247250
> | Microsoft.ContainerService/locations/guardrailsVersions/read | Get Guardrails Versions |
248251
> | Microsoft.ContainerService/locations/kubernetesversions/read | List available Kubernetes versions in the region. |
249252
> | Microsoft.ContainerService/locations/meshRevisionProfiles/read | Read service mesh revision profiles in a location |
253+
> | Microsoft.ContainerService/locations/nodeimageversions/read | List available Node Image versions in the region. |
250254
> | Microsoft.ContainerService/locations/operationresults/read | Gets the status of an asynchronous operation result |
251255
> | Microsoft.ContainerService/locations/operations/read | Gets the status of an asynchronous operation |
252256
> | Microsoft.ContainerService/locations/orchestrators/read | Lists the supported orchestrators |
@@ -288,6 +292,9 @@ Azure service: [Azure Kubernetes Service (AKS)](/azure/aks/)
288292
> | Microsoft.ContainerService/managedClusters/extensionaddons/read | Gets an extension addon |
289293
> | Microsoft.ContainerService/managedClusters/extensionaddons/write | Creates a new extension addon or updates an existing one |
290294
> | Microsoft.ContainerService/managedClusters/extensionaddons/delete | Deletes an extension addon |
295+
> | Microsoft.ContainerService/managedClusters/loadBalancers/read | Gets a load balancer configuration |
296+
> | Microsoft.ContainerService/managedClusters/loadBalancers/write | Creates a new LoadBalancerConfiguration or updates an existing one |
297+
> | Microsoft.ContainerService/managedClusters/loadBalancers/delete | Deletes a load balancer configuration |
291298
> | Microsoft.ContainerService/managedClusters/maintenanceConfigurations/read | Gets a maintenance configuration |
292299
> | Microsoft.ContainerService/managedClusters/maintenanceConfigurations/write | Creates a new MaintenanceConfiguration or updates an existing one |
293300
> | Microsoft.ContainerService/managedClusters/maintenanceConfigurations/delete | Deletes a maintenance configuration |

articles/role-based-access-control/resource-provider-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Click the resource provider name in the following list to see the list of permis
102102
> | --- | --- | --- |
103103
> | [Microsoft.ContainerInstance](./permissions/containers.md#microsoftcontainerinstance) | Easily run containers on Azure without managing servers. | [Container Instances](/azure/container-instances/) |
104104
> | [Microsoft.ContainerRegistry](./permissions/containers.md#microsoftcontainerregistry) | Store and manage container images across all types of Azure deployments. | [Container Registry](/azure/container-registry/) |
105-
> | [Microsoft.ContainerService](./permissions/containers.md#microsoftcontainerservice) | Accelerate your containerized application development without compromising security. | [Azure Kubernetes Service (AKS)](/azure/aks/) |
105+
> | [Microsoft.ContainerService](./permissions/containers.md#microsoftcontainerservice) | Accelerate your containerized application development without compromising security. | [Azure Kubernetes Service (AKS)](/azure/aks/intro-kubernetes) |
106106
> | [Microsoft.RedHatOpenShift](./permissions/containers.md#microsoftredhatopenshift) | | [Azure Red Hat OpenShift](/azure/openshift/) |
107107
108108
<a name='microsoftdocumentdb'></a>

0 commit comments

Comments
 (0)