Skip to content

Commit e0a85e7

Browse files
Merge pull request #213382 from AbbyMSFT/patch-19
Clarify information about RBAC and built in roles.
2 parents c4b5206 + d6d8410 commit e0a85e7

File tree

1 file changed

+8
-4
lines changed

1 file changed

+8
-4
lines changed

articles/azure-monitor/alerts/alerts-overview.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -63,13 +63,17 @@ If you don't have alert rules defined for the selected resource, you can [enable
6363
## Azure role-based access control (Azure RBAC) for alerts
6464

6565
You can only access, create, or manage alerts for resources for which you have permissions.
66-
To create an alert rule, you need to have the following permissions:
66+
67+
To create an alert rule, you need to have:
6768
- Read permission on the target resource of the alert rule
6869
- Write permission on the resource group in which the alert rule is created (if you’re creating the alert rule from the Azure portal, the alert rule is created by default in the same resource group in which the target resource resides)
69-
- Read permission on any action group associated to the alert rule (if applicable)
70+
- Read permission on any action group associated with the alert rule (if applicable)
71+
7072
These built-in Azure roles, supported at all Azure Resource Manager scopes, have permissions to and access alerts information and create alert rules:
71-
- monitoring contributor
72-
- monitoring reader
73+
- **Monitoring contributor**: can create alerts and use resources within their scope
74+
- **Monitoring reader**: can view alerts and read resources within their scope
75+
76+
If the target action group or rule location is in a different scope than the two built-in roles, you need to create a user with the appropriate permissions.
7377

7478
## Alerts and State
7579

0 commit comments

Comments
 (0)