Skip to content

Commit cda0fc9

Browse files
Merge pull request #292096 from siddomala/ResourceAccess
Roles and Permissions for Virtual WAN
2 parents 65dd949 + 1d61198 commit cda0fc9

File tree

5 files changed

+153
-1
lines changed

5 files changed

+153
-1
lines changed

articles/route-server/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@
4343
href: route-injection-in-spokes.md
4444
- name: IP anycast
4545
href: anycast.md
46+
- name: Roles and permissions
47+
href: roles-permissions.md
4648
- name: How-to guides
4749
items:
4850
- name: Configure and manage Route Server
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
---
2+
title: About route server roles and permissions
3+
titleSuffix: Azure Route Server
4+
description: Learn about roles and permissions for Azure Route Server
5+
author: siddomala
6+
ms.author: halkazwini
7+
ms.service: azure-route-server
8+
ms.topic: conceptual
9+
ms.date: 12/13/2024
10+
---
11+
12+
---
13+
# About roles and permissions for Azure Route Server
14+
15+
Azure Route Server utilizes multiple underlying resources during both creation and management operations.
16+
Because of this, it's essential to verify permissions on all involved resources during these operations.
17+
18+
## Azure built-in roles
19+
20+
You can choose to assign [Azure built-in roles](../role-based-access-control/built-in-roles.md) to a user, group, service principal, or managed identity such as [Network contributor](../role-based-access-control/built-in-roles.md#network-contributor), which support all the required permissions for creating the gateway.
21+
For more information, see [Steps to assign an Azure role](../role-based-access-control/role-assignments-steps.md).
22+
23+
## Custom roles
24+
25+
If the [Azure built-in roles](../role-based-access-control/built-in-roles.md) don't meet the specific needs of your organization, you can create your own custom roles.
26+
Just like built-in roles, you can assign custom roles to users, groups, and service principals at management group, subscription, and resource group scopes.
27+
For more information, see [Steps to create a custom role](../role-based-access-control/custom-roles.md#steps-to-create-a-custom-role) .
28+
29+
To ensure proper functionality, check your custom role permissions to confirm user service principals, and managed identities operating the VPN gateway have the necessary permissions.
30+
To add any missing permissions listed here, see [Update a custom role](../role-based-access-control/custom-roles-portal.md#update-a-custom-role).
31+
32+
## Permissions
33+
34+
When creating or updating the resources below, add the appropriate permissions from the following list:
35+
36+
|Resource | Required Azure permissions |
37+
|---|---|
38+
| virtualHubs/ipConfigurations | Microsoft.Network/publicIPAddresses/join/action <br>Microsoft.Network/virtualNetworks/subnets/join/action |
39+
40+
For more information, see [Azure permissions for Networking](../role-based-access-control/permissions/networking.md) and [Virtual network permissions](../virtual-network/virtual-network-manage-subnet.md#permissions).
41+
42+
## Roles scope
43+
44+
In the process of custom role definition, you can specify a role assignment scope at four levels: management group, subscription, resource group, and resources. To grant access, you assign roles to users, groups, service principals, or managed identities at a particular scope.
45+
46+
These scopes are structured in a parent-child relationship, with each level of hierarchy making the scope more specific. You can assign roles at any of these levels of scope, and the level you select determines how widely the role is applied.
47+
48+
For example, a role assigned at the subscription level can cascade down to all resources within that subscription, while a role assigned at the resource group level will only apply to resources within that specific group. Learn more about scope level
49+
For more information, see [Scope levels](../role-based-access-control/scope-overview.md#scope-levels).
50+
51+
> [!NOTE]
52+
> Allow sufficient time for [Azure Resource Manager cache](../role-based-access-control/troubleshooting.md) to refresh after role assignment changes.
53+
54+
## Next steps
55+
56+
- [What is Azure Role Based Access](../role-based-access-control/overview.md)
57+
58+
- [Azure Role Based Access Control](../role-based-access-control/role-assignments-list-portal.yml)

articles/route-server/route-server-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Yes, if you peer a virtual network hosting the Azure Route Server to another vir
4242
These public endpoints are required for Azure's underlying SDN and management platform to communicate with Azure Route Server. Because Route Server is considered part of the customer's private network, Azure's underlying platform is unable to directly access and manage Route Server via its private endpoints due to compliance requirements. Connectivity to Route Server's public endpoints is authenticated via certificates, and Azure conducts routine security audits of these public endpoints. As a result, they do not constitute a security exposure of your virtual network.
4343

4444
> [!NOTE]
45-
> Note: These certificates are signed by an internal certificate authority, so this certificate chain will appear to not be signed by a known trusted authority. As a result, this does not represent an SSL vulnerability.
45+
> These certificates are signed by an internal certificate authority, so this certificate chain will appear to not be signed by a known trusted authority. As a result, this does not represent an SSL vulnerability.
4646
>
4747
4848
### Does Azure Route Server support IPv6?

articles/virtual-wan/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -128,6 +128,8 @@
128128
href: virtual-wan-expressroute-about.md
129129
- name: Virtual hub settings
130130
href: hub-settings.md
131+
- name: Roles and permissions
132+
href: roles-permissions.md
131133
- name: Gateway settings
132134
href: gateway-settings.md
133135
- name: Apply Zero Trust principles
Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,90 @@
1+
---
2+
title: About virtual hub roles and permissions
3+
titleSuffix: Azure Virtual WAN
4+
description: Learn about roles and permissions for a Virtual WAN Hub.
5+
author: siddomala
6+
ms.service: azure-virtual-wan
7+
ms.topic: conceptual
8+
ms.date: 12/13/2024
9+
ms.author: cherylmc
10+
11+
---
12+
# About roles and permissions for Azure Virtual WAN
13+
14+
The Virtual WAN hub utilizes multiple underlying resources during both creation and management operations.
15+
Because of this, it's essential to verify permissions on all involved resources during these operations.
16+
17+
## Azure built-in roles
18+
19+
You can choose to assign [Azure built-in roles](../role-based-access-control/built-in-roles.md) to a user, group, service principal, or managed identity such as [Network contributor](../role-based-access-control/built-in-roles.md#network-contributor), which support all the required permissions for creating the gateway.
20+
For more information, see [Steps to assign an Azure role](../role-based-access-control/role-assignments-steps.md).
21+
22+
## Custom roles
23+
24+
If the [Azure built-in roles](../role-based-access-control/built-in-roles.md) don't meet the specific needs of your organization, you can create your own custom roles.
25+
Just like built-in roles, you can assign custom roles to users, groups, and service principals at management group, subscription, and resource group scopes.
26+
For more information, see [Steps to create a custom role](../role-based-access-control/custom-roles.md#steps-to-create-a-custom-role) .
27+
28+
To ensure proper functionality, check your custom role permissions to confirm user service principals, and managed identities operating the VPN gateway have the necessary permissions.
29+
To add any missing permissions listed here, see [Update a custom role](../role-based-access-control/custom-roles-portal.md#update-a-custom-role).
30+
31+
## Permissions
32+
33+
When creating or updating the resources below, add the appropriate permissions from the following list:
34+
35+
### Virtual hub resources
36+
37+
|Resource | Required Azure permissions |
38+
|---|---|
39+
| virtualHubs | Microsoft.Network/virtualNetworks/peer/action <br>Microsoft.Network/virtualWans/join/action |
40+
| virtualHubs/hubVirtualNetworkConnections | Microsoft.Network/virtualNetworks/peer/action <br>Microsoft.Network/virtualHubs/routeMaps/read <br>Microsoft.Network/virtualHubs/hubRouteTables/read |
41+
| virtualHubs/bgpConnections | Microsoft.Network/virtualHubs/hubVirtualNetworkConnections/read |
42+
| virtualHubs/hubRouteTables | Microsoft.Network/securityPartnerProviders/read <br>Microsoft.Network/virtualHubs/hubVirtualNetworkConnections/read <br>Microsoft.Network/networkVirtualAppliances/read <br>Microsoft.Network/azurefirewalls/read |
43+
| virtualHubs/routingIntent | Microsoft.Network/securityPartnerProviders/read <br>Microsoft.Network/networkVirtualAppliances/read <br>Microsoft.Network/azurefirewalls/read |
44+
45+
### ExpressRoute gateway resources
46+
47+
|Resource | Required Azure permissions |
48+
|---|---|
49+
| expressroutegateways | Microsoft.Network/virtualHubs/read <br>Microsoft.Network/virtualHubs/hubRouteTables/read <br>Microsoft.Network/virtualHubs/routeMaps/read <br>Microsoft.Network/expressRouteGateways/expressRouteConnections/read <br>Microsoft.Network/expressRouteCircuits/join/action |
50+
| expressRouteGateways/expressRouteConnections | Microsoft.Network/virtualHubs/hubRouteTables/read <br>Microsoft.Network/virtualHubs/routeMaps/read <br>Microsoft.Network/expressRouteCircuits/join/action |
51+
52+
53+
### VPN resources
54+
55+
|Resource | Required Azure permissions |
56+
|---|---|
57+
| p2svpngateways | Microsoft.Network/virtualHubs/read <br>Microsoft.Network/virtualHubs/hubRouteTables/read <br>Microsoft.Network/virtualHubs/routeMaps/read <br>Microsoft.Network/vpnServerConfigurations/read |
58+
| p2sVpnGateways/p2sConnectionConfigurations | Microsoft.Network/virtualHubs/hubRouteTables/read <br>Microsoft.Network/virtualHubs/routeMaps/read |
59+
| vpngateways | Microsoft.Network/virtualHubs/read <br>Microsoft.Network/virtualHubs/hubRouteTables/read <br>Microsoft.Network/virtualHubs/routeMaps/read <br>Microsoft.Network/vpnGateways/vpnConnections/read |
60+
| vpnsites | Microsoft.Network/virtualWans/read |
61+
62+
### NVA resources
63+
64+
NVAs (Network Virtual Appliances) in Virtual WAN are typically deployed through Azure managed applications or directly via NVA orchestration software. For more information on how to properly assign permissions to managed applications or NVA orchestration software, see instructions [here](https://aka.ms/nvadeployment).
65+
66+
|Resource | Required Azure permissions |
67+
|---|---|
68+
| networkVirtualAppliances | Microsoft.Network/virtualHubs/read |
69+
| networkVirtualAppliances/networkVirtualApplianceConnections | Microsoft.Network/virtualHubs/routeMaps/read <br>Microsoft.Network/virtualHubs/hubRouteTables/read |
70+
71+
72+
For more information, see [Azure permissions for Networking](../role-based-access-control/permissions/networking.md) and [Virtual network permissions](../virtual-network/virtual-network-manage-subnet.md#permissions).
73+
74+
## Roles scope
75+
76+
In the process of custom role definition, you can specify a role assignment scope at four levels: management group, subscription, resource group, and resources. To grant access, you assign roles to users, groups, service principals, or managed identities at a particular scope.
77+
78+
These scopes are structured in a parent-child relationship, with each level of hierarchy making the scope more specific. You can assign roles at any of these levels of scope, and the level you select determines how widely the role is applied.
79+
80+
For example, a role assigned at the subscription level can cascade down to all resources within that subscription, while a role assigned at the resource group level will only apply to resources within that specific group. Learn more about scope level
81+
For more information, see [Scope levels](../role-based-access-control/scope-overview.md#scope-levels).
82+
83+
> [!NOTE]
84+
> Allow sufficient time for [Azure Resource Manager cache](../role-based-access-control/troubleshooting.md) to refresh after role assignment changes.
85+
86+
## Next steps
87+
88+
- [What is Azure Role Based Access](../role-based-access-control/overview.md)
89+
90+
- [Azure Role Based Access Control](../role-based-access-control/role-assignments-list-portal.yml)

0 commit comments

Comments
 (0)