You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/built-in-roles.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.workload: identity
7
7
author: rolyon
8
8
manager: amycolannino
9
9
ms.author: rolyon
10
-
ms.date: 05/07/2024
10
+
ms.date: 09/20/2024
11
11
ms.custom: generated
12
12
---
13
13
@@ -78,7 +78,7 @@ The following table provides a brief description of each built-in role. Click th
78
78
> | <aname='cdn-profile-reader'></a>[CDN Profile Reader](./built-in-roles/networking.md#cdn-profile-reader)| Can view CDN profiles and their endpoints, but can't make changes. | 8f96442b-4075-438f-813d-ad51ab4019af |
79
79
> | <aname='classic-network-contributor'></a>[Classic Network Contributor](./built-in-roles/networking.md#classic-network-contributor)| Lets you manage classic networks, but not access to them. | b34d265f-36f7-4a0d-a4d4-e158ca92e90f |
80
80
> | <aname='dns-zone-contributor'></a>[DNS Zone Contributor](./built-in-roles/networking.md#dns-zone-contributor)| Lets you manage DNS zones and record sets in Azure DNS, but does not let you control who has access to them. | befefa01-2a29-4197-83a8-272ff33ce314 |
81
-
> | <aname='network-contributor'></a>[Network Contributor](./built-in-roles/networking.md#network-contributor)| Lets you manage networks, but not access to them. | 4d97b98b-1d4f-4787-a291-c67834d212e7 |
81
+
> | <aname='network-contributor'></a>[Network Contributor](./built-in-roles/networking.md#network-contributor)| Lets you manage networks, but not access to them. This role does not grant you permission to deploy or manage Virtual Machines. | 4d97b98b-1d4f-4787-a291-c67834d212e7 |
82
82
> | <aname='private-dns-zone-contributor'></a>[Private DNS Zone Contributor](./built-in-roles/networking.md#private-dns-zone-contributor)| Lets you manage private DNS zone resources, but not the virtual networks they are linked to. | b12aa53e-6015-4669-85d0-8515ebb3ae7f |
83
83
> | <aname='traffic-manager-contributor'></a>[Traffic Manager Contributor](./built-in-roles/networking.md#traffic-manager-contributor)| Lets you manage Traffic Manager profiles, but does not let you control who has access to them. | a4b10055-b0c7-44c2-b00f-c7b5b3550cf7 |
84
84
@@ -171,6 +171,9 @@ The following table provides a brief description of each built-in role. Click th
171
171
> | <aname='azure-kubernetes-fleet-manager-rbac-cluster-admin'></a>[Azure Kubernetes Fleet Manager RBAC Cluster Admin](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-cluster-admin)| Grants read/write access to all Kubernetes resources in the fleet-managed hub cluster. | 18ab4d3d-a1bf-4477-8ad9-8359bc988f69 |
172
172
> | <aname='azure-kubernetes-fleet-manager-rbac-reader'></a>[Azure Kubernetes Fleet Manager RBAC Reader](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-reader)| Grants read-only access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces. | 30b27cfc-9c84-438e-b0ce-70e35255df80 |
173
173
> | <aname='azure-kubernetes-fleet-manager-rbac-writer'></a>[Azure Kubernetes Fleet Manager RBAC Writer](./built-in-roles/containers.md#azure-kubernetes-fleet-manager-rbac-writer)| Grants read/write access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces. | 5af6afb3-c06c-4fa4-8848-71a8aee05683 |
174
+
> | <aname='azure-kubernetes-service-arc-cluster-admin-role'></a>[Azure Kubernetes Service Arc Cluster Admin Role](./built-in-roles/containers.md#azure-kubernetes-service-arc-cluster-admin-role)| List cluster admin credential action. | b29efa5f-7782-4dc3-9537-4d5bc70a5e9f |
175
+
> | <aname='azure-kubernetes-service-arc-cluster-user-role'></a>[Azure Kubernetes Service Arc Cluster User Role](./built-in-roles/containers.md#azure-kubernetes-service-arc-cluster-user-role)| List cluster user credential action. | 233ca253-b031-42ff-9fba-87ef12d6b55f |
176
+
> | <aname='azure-kubernetes-service-arc-contributor-role'></a>[Azure Kubernetes Service Arc Contributor Role](./built-in-roles/containers.md#azure-kubernetes-service-arc-contributor-role)| Grants access to read and write Azure Kubernetes Services hybrid clusters | 5d3f1697-4507-4d08-bb4a-477695db5f82 |
174
177
> | <aname='azure-kubernetes-service-cluster-admin-role'></a>[Azure Kubernetes Service Cluster Admin Role](./built-in-roles/containers.md#azure-kubernetes-service-cluster-admin-role)| List cluster admin credential action. | 0ab0b1a8-8aac-4efd-b8c2-3ee1fb270be8 |
175
178
> | <aname='azure-kubernetes-service-cluster-monitoring-user'></a>[Azure Kubernetes Service Cluster Monitoring User](./built-in-roles/containers.md#azure-kubernetes-service-cluster-monitoring-user)| List cluster monitoring user credential action. | 1afdec4b-e479-420e-99e7-f82237c7c5e6 |
176
179
> | <aname='azure-kubernetes-service-cluster-user-role'></a>[Azure Kubernetes Service Cluster User Role](./built-in-roles/containers.md#azure-kubernetes-service-cluster-user-role)| List cluster user credential action. | 4abbcc35-e782-43d8-92c5-2d3f1bd2253f |
@@ -393,10 +396,10 @@ The following table provides a brief description of each built-in role. Click th
> | <aname='application-insights-snapshot-debugger'></a>[Application Insights Snapshot Debugger](./built-in-roles/monitor.md#application-insights-snapshot-debugger)| Gives user permission to view and download debug snapshots collected with the Application Insights Snapshot Debugger. Note that these permissions are not included in the [Owner](/azure/role-based-access-control/built-in-roles#owner) or [Contributor](/azure/role-based-access-control/built-in-roles#contributor) roles. When giving users the Application Insights Snapshot Debugger role, you must grant the role directly to the user. The role is not recognized when it is added to a custom role. | 08954f03-6346-4c2e-81c0-ec3a5cfae23b |
396
-
> | <aname='grafana-admin'></a>[Grafana Admin](./built-in-roles/monitor.md#grafana-admin)|Perform all Grafana operations, including the ability to manage data sources, create dashboards, and manage role assignments within Grafana. | 22926164-76b3-42b3-bc55-97df8dab3e41 |
397
-
> | <aname='grafana-editor'></a>[Grafana Editor](./built-in-roles/monitor.md#grafana-editor)|View and edit a Grafana instance, including its dashboards and alerts. | a79a5197-3a5c-4973-a920-486035ffd60f |
399
+
> | <aname='grafana-admin'></a>[Grafana Admin](./built-in-roles/monitor.md#grafana-admin)|Manage server-wide settings and manage access to resources such as organizations, users, and licenses. | 22926164-76b3-42b3-bc55-97df8dab3e41 |
400
+
> | <aname='grafana-editor'></a>[Grafana Editor](./built-in-roles/monitor.md#grafana-editor)|Create, edit, delete, or view dashboards; create, edit, or delete folders; and edit or view playlists. | a79a5197-3a5c-4973-a920-486035ffd60f |
> | <aname='grafana-viewer'></a>[Grafana Viewer](./built-in-roles/monitor.md#grafana-viewer)| View a Grafana instance, including its dashboards and alerts. | 60921a7e-fef1-4a43-9b16-a26c52ad4769 |
402
+
> | <aname='grafana-viewer'></a>[Grafana Viewer](./built-in-roles/monitor.md#grafana-viewer)| View dashboards, playlists, and query data sources. | 60921a7e-fef1-4a43-9b16-a26c52ad4769 |
400
403
> | <aname='monitoring-contributor'></a>[Monitoring Contributor](./built-in-roles/monitor.md#monitoring-contributor)| Can read all monitoring data and edit monitoring settings. See also [Get started with roles, permissions, and security with Azure Monitor](/azure/azure-monitor/roles-permissions-security#built-in-monitoring-roles). | 749f88d5-cbae-40b8-bcfc-e573ddc772fa |
> | <aname='monitoring-reader'></a>[Monitoring Reader](./built-in-roles/monitor.md#monitoring-reader)| Can read all monitoring data (metrics, logs, etc.). See also [Get started with roles, permissions, and security with Azure Monitor](/azure/azure-monitor/roles-permissions-security#built-in-monitoring-roles). | 43d0d8ad-25c7-4714-9337-8ba259a9fe05 |
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/listCredentials/action |Gets the endpoint access credentials to the resource. |
1031
+
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/listCredentials/action |List the endpoint access credentials to the resource. |
1032
1032
> |**NotActions**||
1033
1033
> |*none*||
1034
1034
> |**DataActions**||
@@ -1278,7 +1278,7 @@ View Virtual Machines in the portal and login as a local user configured on the
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/listCredentials/action |Gets the endpoint access credentials to the resource. |
1281
+
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/listCredentials/action |List the endpoint access credentials to the resource. |
1282
1282
> |**NotActions**||
1283
1283
> |*none*||
1284
1284
> |**DataActions**||
@@ -1326,7 +1326,7 @@ View Virtual Machines in the portal and login as a regular user.
1326
1326
> |[Microsoft.Network](../permissions/networking.md#microsoftnetwork)/networkInterfaces/read | Gets a network interface definition. |
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/listCredentials/action |Gets the endpoint access credentials to the resource. |
1329
+
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/listCredentials/action |List the endpoint access credentials to the resource. |
1330
1330
> |**NotActions**||
1331
1331
> |*none*||
1332
1332
> |**DataActions**||
@@ -1390,11 +1390,11 @@ Let's you manage the OS of your resource via Windows Admin Center as an administ
1390
1390
> |[Microsoft.Network](../permissions/networking.md#microsoftnetwork)/networkWatchers/securityGroupView/action | View the configured and effective network security group rules applied on a VM. |
1391
1391
> |[Microsoft.Network](../permissions/networking.md#microsoftnetwork)/networkSecurityGroups/securityRules/read | Gets a security rule definition |
1392
1392
> |[Microsoft.Network](../permissions/networking.md#microsoftnetwork)/networkSecurityGroups/securityRules/write | Creates a security rule or updates an existing security rule |
1393
-
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/write |Update the endpoint to the target resource. |
1394
-
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/read |Gets the endpoint to the resource. |
1395
-
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/serviceConfigurations/write |Update the service details in the service configurations of the target resource. |
1396
-
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/serviceConfigurations/read |Gets the details about the service to the resource. |
1397
-
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/listManagedProxyDetails/action |Fetches the managed proxy details |
1393
+
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/write |Create or update the endpoint to the target resource. |
1394
+
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/read |Get or list of endpoints to the target resource. |
1395
+
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/serviceConfigurations/write |Create or update the serviceConfigurations to the endpoints resource. |
1396
+
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/serviceConfigurations/read |Get or list of serviceConfigurations to the endpoints resource. |
1397
+
> |[Microsoft.HybridConnectivity](../permissions/hybrid-multicloud.md#microsofthybridconnectivity)/endpoints/listManagedProxyDetails/action |List the managed proxy details to the resource.|
1398
1398
> |[Microsoft.Compute](../permissions/compute.md#microsoftcompute)/virtualMachines/read | Get the properties of a virtual machine |
1399
1399
> |[Microsoft.Compute](../permissions/compute.md#microsoftcompute)/virtualMachines/patchAssessmentResults/latest/read | Retrieves the summary of the latest patch assessment operation |
1400
1400
> |[Microsoft.Compute](../permissions/compute.md#microsoftcompute)/virtualMachines/patchAssessmentResults/latest/softwarePatches/read | Retrieves list of patches assessed during the last patch assessment operation |
0 commit comments