Skip to content

Commit cba73df

Browse files
Merge pull request #256029 from rolyon/rolyon-rbac-roles-virtual-machine-data-access-admin
[Azure RBAC] Virtual Machine Data Access Administrator
2 parents b1685a0 + a44b20a commit cba73df

File tree

1 file changed

+75
-4
lines changed

1 file changed

+75
-4
lines changed

articles/role-based-access-control/built-in-roles.md

Lines changed: 75 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ The following table provides a brief description of each built-in role. Click th
4040
> | [Disk Snapshot Contributor](#disk-snapshot-contributor) | Provides permission to backup vault to manage disk snapshots. | 7efff54f-a5b4-42b5-a1c5-5411624893ce |
4141
> | [Virtual Machine Administrator Login](#virtual-machine-administrator-login) | View Virtual Machines in the portal and login as administrator | 1c0163c0-47e6-4577-8991-ea5c82e286e4 |
4242
> | [Virtual Machine Contributor](#virtual-machine-contributor) | Create and manage virtual machines, manage disks, install and run software, reset password of the root user of the virtual machine using VM extensions, and manage local user accounts using VM extensions. This role does not grant you management access to the virtual network or storage account the virtual machines are connected to. This role does not allow you to assign roles in Azure RBAC. | 9980e02c-c2be-4d73-94e8-173b1dc7cf3c |
43+
> | [Virtual Machine Data Access Administrator (preview)](#virtual-machine-data-access-administrator-preview) | Add or remove virtual machine data plane role assignments. Includes an ABAC condition to constrain role assignments. | 66f75aeb-eabe-4b70-9f1e-c350c4c9ad04 |
4344
> | [Virtual Machine User Login](#virtual-machine-user-login) | View Virtual Machines in the portal and login as a regular user. | fb879df8-f326-4884-b1cf-06f3ad86be52 |
4445
> | [Windows Admin Center Administrator Login](#windows-admin-center-administrator-login) | Let's you manage the OS of your resource via Windows Admin Center as an administrator. | a6333a3e-0164-44c3-b281-7a577aff287f |
4546
> | **Networking** | | |
@@ -235,7 +236,7 @@ The following table provides a brief description of each built-in role. Click th
235236
> | [Key Vault Crypto Officer](#key-vault-crypto-officer) | Perform any action on the keys of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model. | 14b46e9e-c2b7-41b4-b07b-48a6ebf60603 |
236237
> | [Key Vault Crypto Service Encryption User](#key-vault-crypto-service-encryption-user) | Read metadata of keys and perform wrap/unwrap operations. Only works for key vaults that use the 'Azure role-based access control' permission model. | e147488a-f6f5-4113-8e2d-b22465e65bf6 |
237238
> | [Key Vault Crypto User](#key-vault-crypto-user) | Perform cryptographic operations using keys. Only works for key vaults that use the 'Azure role-based access control' permission model. | 12338af0-0e69-4776-bea7-57ae8d297424 |
238-
> | [Key Vault Data Access Administrator (preview)](#key-vault-data-access-administrator-preview) | Add or remove key vault data plane role assignments and read resources of all types, except secrets. Includes an ABAC condition to constrain role assignments. | 8b54135c-b56d-4d72-a534-26097cfdc8d8 |
239+
> | [Key Vault Data Access Administrator (preview)](#key-vault-data-access-administrator-preview) | Manage access to Azure Key Vault by adding or removing role assignments for the Key Vault Administrator, Key Vault Certificates Officer, Key Vault Crypto Officer, Key Vault Crypto Service Encryption User, Key Vault Crypto User, Key Vault Reader, Key Vault Secrets Officer, or Key Vault Secrets User roles. Includes an ABAC condition to constrain role assignments. | 8b54135c-b56d-4d72-a534-26097cfdc8d8 |
239240
> | [Key Vault Reader](#key-vault-reader) | Read metadata of key vaults and its certificates, keys, and secrets. Cannot read sensitive values such as secret contents or key material. Only works for key vaults that use the 'Azure role-based access control' permission model. | 21090545-7ca7-4776-b22c-e363652d74d2 |
240241
> | [Key Vault Secrets Officer](#key-vault-secrets-officer) | Perform any action on the secrets of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model. | b86a8fe4-44ce-4948-aee5-eccb2c155cd7 |
241242
> | [Key Vault Secrets User](#key-vault-secrets-user) | Read secret contents. Only works for key vaults that use the 'Azure role-based access control' permission model. | 4633458b-17de-408a-b874-0445c86b69e6 |
@@ -1052,6 +1053,74 @@ Create and manage virtual machines, manage disks, install and run software, rese
10521053
}
10531054
```
10541055

1056+
### Virtual Machine Data Access Administrator (preview)
1057+
1058+
Add or remove virtual machine data plane role assignments. Includes an ABAC condition to constrain role assignments.
1059+
1060+
> [!div class="mx-tableFixed"]
1061+
> | Actions | Description |
1062+
> | --- | --- |
1063+
> | [Microsoft.Authorization](resource-provider-operations.md#microsoftauthorization)/roleAssignments/write | |
1064+
> | [Microsoft.Authorization](resource-provider-operations.md#microsoftauthorization)/roleAssignments/delete | |
1065+
> | [Microsoft.Authorization](resource-provider-operations.md#microsoftauthorization)/*/read | Read roles and role assignments |
1066+
> | [Microsoft.Resources](resource-provider-operations.md#microsoftresources)/subscriptions/resourceGroups/read | Gets or lists resource groups. |
1067+
> | [Microsoft.Resources](resource-provider-operations.md#microsoftresources)/subscriptions/read | |
1068+
> | [Microsoft.Management](resource-provider-operations.md#microsoftmanagement)/managementGroups/read | List management groups for the authenticated user. |
1069+
> | [Microsoft.Network](resource-provider-operations.md#microsoftnetwork)/publicIPAddresses/read | Gets a public ip address definition. |
1070+
> | [Microsoft.Network](resource-provider-operations.md#microsoftnetwork)/virtualNetworks/read | Get the virtual network definition |
1071+
> | [Microsoft.Network](resource-provider-operations.md#microsoftnetwork)/loadBalancers/read | Gets a load balancer definition |
1072+
> | [Microsoft.Network](resource-provider-operations.md#microsoftnetwork)/networkInterfaces/read | Gets a network interface definition. |
1073+
> | [Microsoft.Compute](resource-provider-operations.md#microsoftcompute)/virtualMachines/*/read | |
1074+
> | [Microsoft.HybridCompute](resource-provider-operations.md#microsofthybridcompute)/machines/*/read | |
1075+
> | [Microsoft.Resources](resource-provider-operations.md#microsoftresources)/deployments/* | Create and manage a deployment |
1076+
> | [Microsoft.Support](resource-provider-operations.md#microsoftsupport)/* | Create and update a support ticket |
1077+
> | **NotActions** | |
1078+
> | *none* | |
1079+
> | **DataActions** | |
1080+
> | *none* | |
1081+
> | **NotDataActions** | |
1082+
> | *none* | |
1083+
> | **Condition** | |
1084+
> | ((!(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{1c0163c0-47e6-4577-8991-ea5c82e286e4, fb879df8-f326-4884-b1cf-06f3ad86be52})) AND ((!(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{1c0163c0-47e6-4577-8991-ea5c82e286e4, fb879df8-f326-4884-b1cf-06f3ad86be52})) | Add or remove role assignments for the following roles:<br/>Virtual Machine Administrator Login<br/>Virtual Machine User Login |
1085+
1086+
```json
1087+
{
1088+
"id": "/providers/Microsoft.Authorization/roleDefinitions/66f75aeb-eabe-4b70-9f1e-c350c4c9ad04",
1089+
"properties": {
1090+
"roleName": "Virtual Machine Data Access Administrator (preview)",
1091+
"description": "Add or remove virtual machine data plane role assignments. Includes an ABAC condition to constrain role assignments.",
1092+
"assignableScopes": [
1093+
"/"
1094+
],
1095+
"permissions": [
1096+
{
1097+
"actions": [
1098+
"Microsoft.Authorization/roleAssignments/write",
1099+
"Microsoft.Authorization/roleAssignments/delete",
1100+
"Microsoft.Authorization/*/read",
1101+
"Microsoft.Resources/subscriptions/resourceGroups/read",
1102+
"Microsoft.Resources/subscriptions/read",
1103+
"Microsoft.Management/managementGroups/read",
1104+
"Microsoft.Network/publicIPAddresses/read",
1105+
"Microsoft.Network/virtualNetworks/read",
1106+
"Microsoft.Network/loadBalancers/read",
1107+
"Microsoft.Network/networkInterfaces/read",
1108+
"Microsoft.Compute/virtualMachines/*/read",
1109+
"Microsoft.HybridCompute/machines/*/read",
1110+
"Microsoft.Resources/deployments/*",
1111+
"Microsoft.Support/*"
1112+
],
1113+
"notActions": [],
1114+
"dataActions": [],
1115+
"notDataActions": [],
1116+
"conditionVersion": "2.0",
1117+
"condition": "((!(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{1c0163c0-47e6-4577-8991-ea5c82e286e4, fb879df8-f326-4884-b1cf-06f3ad86be52})) AND ((!(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{1c0163c0-47e6-4577-8991-ea5c82e286e4, fb879df8-f326-4884-b1cf-06f3ad86be52}))"
1118+
}
1119+
]
1120+
}
1121+
}
1122+
```
1123+
10551124
### Virtual Machine User Login
10561125

10571126
View Virtual Machines in the portal and login as a regular user. [Learn more](../active-directory/devices/howto-vm-sign-in-azure-ad-windows.md)
@@ -11581,7 +11650,7 @@ Perform cryptographic operations using keys. Only works for key vaults that use
1158111650

1158211651
### Key Vault Data Access Administrator (preview)
1158311652

11584-
Add or remove key vault data plane role assignments and read resources of all types, except secrets. Includes an ABAC condition to constrain role assignments.
11653+
Manage access to Azure Key Vault by adding or removing role assignments for the Key Vault Administrator, Key Vault Certificates Officer, Key Vault Crypto Officer, Key Vault Crypto Service Encryption User, Key Vault Crypto User, Key Vault Reader, Key Vault Secrets Officer, or Key Vault Secrets User roles. Includes an ABAC condition to constrain role assignments.
1158511654

1158611655
> [!div class="mx-tableFixed"]
1158711656
> | Actions | Description |
@@ -11596,6 +11665,7 @@ Add or remove key vault data plane role assignments and read resources of all ty
1159611665
> | [Microsoft.Management](resource-provider-operations.md#microsoftmanagement)/managementGroups/read | List management groups for the authenticated user. |
1159711666
> | [Microsoft.Resources](resource-provider-operations.md#microsoftresources)/deployments/* | Create and manage a deployment |
1159811667
> | [Microsoft.Support](resource-provider-operations.md#microsoftsupport)/* | Create and update a support ticket |
11668+
> | [Microsoft.KeyVault](resource-provider-operations.md#microsoftkeyvault)/vaults/*/read | |
1159911669
> | **NotActions** | |
1160011670
> | *none* | |
1160111671
> | **DataActions** | |
@@ -11610,7 +11680,7 @@ Add or remove key vault data plane role assignments and read resources of all ty
1161011680
"id": "/providers/Microsoft.Authorization/roleDefinitions/8b54135c-b56d-4d72-a534-26097cfdc8d8",
1161111681
"properties": {
1161211682
"roleName": "Key Vault Data Access Administrator (preview)",
11613-
"description": "Add or remove key vault data plane role assignments and read resources of all types, except secrets. Includes an ABAC condition to constrain role assignments.",
11683+
"description": "Manage access to Azure Key Vault by adding or removing role assignments for the Key Vault Administrator, Key Vault Certificates Officer, Key Vault Crypto Officer, Key Vault Crypto Service Encryption User, Key Vault Crypto User, Key Vault Reader, Key Vault Secrets Officer, or Key Vault Secrets User roles. Includes an ABAC condition to constrain role assignments.",
1161411684
"assignableScopes": [
1161511685
"/"
1161611686
],
@@ -11625,7 +11695,8 @@ Add or remove key vault data plane role assignments and read resources of all ty
1162511695
"Microsoft.Resources/subscriptions/read",
1162611696
"Microsoft.Management/managementGroups/read",
1162711697
"Microsoft.Resources/deployments/*",
11628-
"Microsoft.Support/*"
11698+
"Microsoft.Support/*",
11699+
"Microsoft.KeyVault/vaults/*/read"
1162911700
],
1163011701
"notActions": [],
1163111702
"dataActions": [],

0 commit comments

Comments
 (0)