Skip to content

Commit c49f26f

Browse files
committed
Update roles
1 parent c8bf725 commit c49f26f

File tree

1 file changed

+107
-1
lines changed

1 file changed

+107
-1
lines changed

articles/role-based-access-control/built-in-roles.md

Lines changed: 107 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.workload: identity
88
author: rolyon
99
manager: amycolannino
1010
ms.author: rolyon
11-
ms.date: 01/30/2024
11+
ms.date: 02/07/2024
1212
ms.custom: generated
1313
---
1414

@@ -248,6 +248,7 @@ The following table provides a brief description of each built-in role. Click th
248248
> | [Attestation Contributor](#attestation-contributor) | Can read write or delete the attestation provider instance | bbf86eb8-f7b4-4cce-96e4-18cddf81d86e |
249249
> | [Attestation Reader](#attestation-reader) | Can read the attestation provider properties | fd1bd22b-8476-40bc-a0bc-69b95687b9f3 |
250250
> | [Key Vault Administrator](#key-vault-administrator) | Perform all data plane operations on a key vault and all objects in it, including certificates, keys, and secrets. Cannot manage key vault resources or manage role assignments. Only works for key vaults that use the 'Azure role-based access control' permission model. | 00482a5a-887f-4fb3-b363-3b7fe8e74483 |
251+
> | [Key Vault Certificate User](#key-vault-certificate-user) | Read certificate contents. Only works for key vaults that use the 'Azure role-based access control' permission model. | db79e9a7-68ee-4b58-9aeb-b90e7c24fcba |
251252
> | [Key Vault Certificates Officer](#key-vault-certificates-officer) | Perform any action on the certificates of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model. | a4417e6f-fecd-4de8-b567-7b0420556985 |
252253
> | [Key Vault Contributor](#key-vault-contributor) | Manage key vaults, but does not allow you to assign roles in Azure RBAC, and does not allow you to access secrets, keys, or certificates. | f25e0fa2-a7c8-4377-a976-54943a77a395 |
253254
> | [Key Vault Crypto Officer](#key-vault-crypto-officer) | Perform any action on the keys of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model. | 14b46e9e-c2b7-41b4-b07b-48a6ebf60603 |
@@ -304,6 +305,7 @@ The following table provides a brief description of each built-in role. Click th
304305
> | [Cost Management Contributor](#cost-management-contributor) | Can view costs and manage cost configuration (e.g. budgets, exports) | 434105ed-43f6-45c7-a02f-909b2ba83430 |
305306
> | [Cost Management Reader](#cost-management-reader) | Can view cost data and configuration (e.g. budgets, exports) | 72fafb9e-0641-4937-9268-a91bfd8191a3 |
306307
> | [Hierarchy Settings Administrator](#hierarchy-settings-administrator) | Allows users to edit and delete Hierarchy Settings | 350f8d15-c687-4448-8ae1-157740a3936d |
308+
> | [Kubernetes Agentless Operator](#kubernetes-agentless-operator) | Grants Microsoft Defender for Cloud access to Azure Kubernetes Services | d5a2ae44-610b-4500-93be-660a0c5f5ca6 |
307309
> | [Kubernetes Cluster - Azure Arc Onboarding](#kubernetes-cluster---azure-arc-onboarding) | Role definition to authorize any user/service to create connectedClusters resource | 34e09817-6cbe-4d01-b1a2-e0eac5743d41 |
308310
> | [Kubernetes Extension Contributor](#kubernetes-extension-contributor) | Can create, update, get, list and delete Kubernetes Extensions, and get extension async operations | 85cb6faf-e071-4c9b-8136-154b5a04f717 |
309311
> | [Managed Application Contributor Role](#managed-application-contributor-role) | Allows for creating managed application resources. | 641177b8-a67a-45b9-a033-47bc880bb21e |
@@ -12955,6 +12957,53 @@ Perform all data plane operations on a key vault and all objects in it, includin
1295512957
}
1295612958
```
1295712959

12960+
### Key Vault Certificate User
12961+
12962+
Read certificate contents. Only works for key vaults that use the 'Azure role-based access control' permission model.
12963+
12964+
[Learn more](/azure/key-vault/general/rbac-guide)
12965+
12966+
> [!div class="mx-tableFixed"]
12967+
> | Actions | Description |
12968+
> | --- | --- |
12969+
> | *none* | |
12970+
> | **NotActions** | |
12971+
> | *none* | |
12972+
> | **DataActions** | |
12973+
> | [Microsoft.KeyVault](resource-provider-operations.md#microsoftkeyvault)/vaults/certificates/read | List certificates in a specified key vault, or get information about a certificate. |
12974+
> | [Microsoft.KeyVault](resource-provider-operations.md#microsoftkeyvault)/vaults/secrets/getSecret/action | Gets the value of a secret. |
12975+
> | [Microsoft.KeyVault](resource-provider-operations.md#microsoftkeyvault)/vaults/secrets/readMetadata/action | List or view the properties of a secret, but not its value. |
12976+
> | [Microsoft.KeyVault](resource-provider-operations.md#microsoftkeyvault)/vaults/keys/read | List keys in the specified vault, or read properties and public material of a key. For asymmetric keys, this operation exposes public key and includes ability to perform public key algorithms such as encrypt and verify signature. Private keys and symmetric keys are never exposed. |
12977+
> | **NotDataActions** | |
12978+
> | *none* | |
12979+
12980+
```json
12981+
{
12982+
"assignableScopes": [
12983+
"/"
12984+
],
12985+
"description": "Read certificate contents. Only works for key vaults that use the 'Azure role-based access control' permission model.",
12986+
"id": "/providers/Microsoft.Authorization/roleDefinitions/db79e9a7-68ee-4b58-9aeb-b90e7c24fcba",
12987+
"name": "db79e9a7-68ee-4b58-9aeb-b90e7c24fcba",
12988+
"permissions": [
12989+
{
12990+
"actions": [],
12991+
"notActions": [],
12992+
"dataActions": [
12993+
"Microsoft.KeyVault/vaults/certificates/read",
12994+
"Microsoft.KeyVault/vaults/secrets/getSecret/action",
12995+
"Microsoft.KeyVault/vaults/secrets/readMetadata/action",
12996+
"Microsoft.KeyVault/vaults/keys/read"
12997+
],
12998+
"notDataActions": []
12999+
}
13000+
],
13001+
"roleName": "Key Vault Certificate User",
13002+
"roleType": "BuiltInRole",
13003+
"type": "Microsoft.Authorization/roleDefinitions"
13004+
}
13005+
```
13006+
1295813007
### Key Vault Certificates Officer
1295913008

1296013009
Perform any action on the certificates of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model.
@@ -13840,6 +13889,7 @@ Microsoft Sentinel Responder
1384013889
> | [Microsoft.SecurityInsights](resource-provider-operations.md#microsoftsecurityinsights)/automationRules/* | |
1384113890
> | [Microsoft.SecurityInsights](resource-provider-operations.md#microsoftsecurityinsights)/cases/* | |
1384213891
> | [Microsoft.SecurityInsights](resource-provider-operations.md#microsoftsecurityinsights)/incidents/* | |
13892+
> | [Microsoft.SecurityInsights](resource-provider-operations.md#microsoftsecurityinsights)/entities/runPlaybook/action | Run playbook on entity |
1384313893
> | [Microsoft.SecurityInsights](resource-provider-operations.md#microsoftsecurityinsights)/threatIntelligence/indicators/appendTags/action | Append tags to Threat Intelligence Indicator |
1384413894
> | [Microsoft.SecurityInsights](resource-provider-operations.md#microsoftsecurityinsights)/threatIntelligence/indicators/query/action | Query Threat Intelligence Indicators |
1384513895
> | [Microsoft.SecurityInsights](resource-provider-operations.md#microsoftsecurityinsights)/threatIntelligence/bulkTag/action | Bulk Tags Threat Intelligence |
@@ -13888,6 +13938,7 @@ Microsoft Sentinel Responder
1388813938
"Microsoft.SecurityInsights/automationRules/*",
1388913939
"Microsoft.SecurityInsights/cases/*",
1389013940
"Microsoft.SecurityInsights/incidents/*",
13941+
"Microsoft.SecurityInsights/entities/runPlaybook/action",
1389113942
"Microsoft.SecurityInsights/threatIntelligence/indicators/appendTags/action",
1389213943
"Microsoft.SecurityInsights/threatIntelligence/indicators/query/action",
1389313944
"Microsoft.SecurityInsights/threatIntelligence/bulkTag/action",
@@ -16435,6 +16486,61 @@ Allows users to edit and delete Hierarchy Settings
1643516486
}
1643616487
```
1643716488

16489+
### Kubernetes Agentless Operator
16490+
16491+
Grants Microsoft Defender for Cloud access to Azure Kubernetes Services
16492+
16493+
[Learn more](/azure/defender-for-cloud/defender-for-containers-architecture)
16494+
16495+
> [!div class="mx-tableFixed"]
16496+
> | Actions | Description |
16497+
> | --- | --- |
16498+
> | [Microsoft.ContainerService](resource-provider-operations.md#microsoftcontainerservice)/managedClusters/trustedAccessRoleBindings/write | Create or update trusted access role bindings for managed cluster |
16499+
> | [Microsoft.ContainerService](resource-provider-operations.md#microsoftcontainerservice)/managedClusters/trustedAccessRoleBindings/read | Get trusted access role bindings for managed cluster |
16500+
> | [Microsoft.ContainerService](resource-provider-operations.md#microsoftcontainerservice)/managedClusters/trustedAccessRoleBindings/delete | Delete trusted access role bindings for managed cluster |
16501+
> | [Microsoft.ContainerService](resource-provider-operations.md#microsoftcontainerservice)/managedClusters/read | Get a managed cluster |
16502+
> | [Microsoft.Features](resource-provider-operations.md#microsoftfeatures)/features/read | Gets the features of a subscription. |
16503+
> | [Microsoft.Features](resource-provider-operations.md#microsoftfeatures)/providers/features/read | Gets the feature of a subscription in a given resource provider. |
16504+
> | [Microsoft.Features](resource-provider-operations.md#microsoftfeatures)/providers/features/register/action | Registers the feature for a subscription in a given resource provider. |
16505+
> | [Microsoft.Security](resource-provider-operations.md#microsoftsecurity)/pricings/securityoperators/read | Gets the security operators for the scope |
16506+
> | **NotActions** | |
16507+
> | *none* | |
16508+
> | **DataActions** | |
16509+
> | *none* | |
16510+
> | **NotDataActions** | |
16511+
> | *none* | |
16512+
16513+
```json
16514+
{
16515+
"assignableScopes": [
16516+
"/"
16517+
],
16518+
"description": "Grants Microsoft Defender for Cloud access to Azure Kubernetes Services",
16519+
"id": "/providers/Microsoft.Authorization/roleDefinitions/d5a2ae44-610b-4500-93be-660a0c5f5ca6",
16520+
"name": "d5a2ae44-610b-4500-93be-660a0c5f5ca6",
16521+
"permissions": [
16522+
{
16523+
"actions": [
16524+
"Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/write",
16525+
"Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/read",
16526+
"Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/delete",
16527+
"Microsoft.ContainerService/managedClusters/read",
16528+
"Microsoft.Features/features/read",
16529+
"Microsoft.Features/providers/features/read",
16530+
"Microsoft.Features/providers/features/register/action",
16531+
"Microsoft.Security/pricings/securityoperators/read"
16532+
],
16533+
"notActions": [],
16534+
"dataActions": [],
16535+
"notDataActions": []
16536+
}
16537+
],
16538+
"roleName": "Kubernetes Agentless Operator",
16539+
"roleType": "BuiltInRole",
16540+
"type": "Microsoft.Authorization/roleDefinitions"
16541+
}
16542+
```
16543+
1643816544
### Kubernetes Cluster - Azure Arc Onboarding
1643916545

1644016546
Role definition to authorize any user/service to create connectedClusters resource

0 commit comments

Comments
 (0)