Skip to content

Commit e10c086

Browse files
authored
Merge pull request #101010 from laurenhughes/rbac
Add job submitter info
2 parents cdb029c + eeac209 commit e10c086

File tree

1 file changed

+62
-1
lines changed

1 file changed

+62
-1
lines changed

articles/batch/batch-aad-auth.md

Lines changed: 62 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.service: batch
1313
ms.topic: article
1414
ms.tgt_pltfrm:
1515
ms.workload: big-compute
16-
ms.date: 08/15/2019
16+
ms.date: 01/28/2020
1717
ms.author: jushiman
1818
---
1919

@@ -140,6 +140,67 @@ Your application should now appear in your access control settings with an RBAC
140140

141141
![Assign an RBAC role to your application](./media/batch-aad-auth/app-rbac-role.png)
142142

143+
### Assign a custom role
144+
145+
A custom role grants granular permission to a user for submitting jobs, tasks, and more. This provides the ability to prevent users from performing operations that affect cost, such as creating pools or modifying nodes.
146+
147+
You can use a custom role to grant permissions to an Azure AD user, group, or service principal for the following RBAC operations:
148+
149+
- Microsoft.Batch/batchAccounts/pools/write
150+
- Microsoft.Batch/batchAccounts/pools/delete
151+
- Microsoft.Batch/batchAccounts/pools/read
152+
- Microsoft.Batch/batchAccounts/jobSchedules/write
153+
- Microsoft.Batch/batchAccounts/jobSchedules/delete
154+
- Microsoft.Batch/batchAccounts/jobSchedules/read
155+
- Microsoft.Batch/batchAccounts/jobs/write
156+
- Microsoft.Batch/batchAccounts/jobs/delete
157+
- Microsoft.Batch/batchAccounts/jobs/read
158+
- Microsoft.Batch/batchAccounts/certificates/write
159+
- Microsoft.Batch/batchAccounts/certificates/delete
160+
- Microsoft.Batch/batchAccounts/certificates/read
161+
- Microsoft.Batch/batchAccounts/read (for any read operation)
162+
- Microsoft.Batch/batchAccounts/listKeys/action (for any operation)
163+
164+
Custom roles are for users authenticated by Azure AD, not the Batch account credentials (shared key). Note that the Batch account credentials give full permission to the Batch account. Also note that jobs using autopool require pool-level permissions.
165+
166+
Here's an example of a custom role definition:
167+
168+
```json
169+
{
170+
"properties":{
171+
"roleName":"Azure Batch Custom Job Submitter",
172+
"type":"CustomRole",
173+
"description":"Allows a user to submit jobs to Azure Batch but not manage pools",
174+
"assignableScopes":[
175+
"/subscriptions/88888888-8888-8888-8888-888888888888"
176+
],
177+
"permissions":[
178+
{
179+
"actions":[
180+
"Microsoft.Batch/*/read",
181+
"Microsoft.Authorization/*/read",
182+
"Microsoft.Resources/subscriptions/resourceGroups/read",
183+
"Microsoft.Support/*",
184+
"Microsoft.Insights/alertRules/*"
185+
],
186+
"notActions":[
187+
188+
],
189+
"dataActions":[
190+
"Microsoft.Batch/batchAccounts/jobs/*",
191+
"Microsoft.Batch/batchAccounts/jobSchedules/*"
192+
],
193+
"notDataActions":[
194+
195+
]
196+
}
197+
]
198+
}
199+
}
200+
```
201+
202+
For more general information on creating a custom role, see [Custom roles for Azure resources](../role-based-access-control/custom-roles.md).
203+
143204
### Get the tenant ID for your Azure Active Directory
144205

145206
The tenant ID identifies the Azure AD tenant that provides authentication services to your application. To get the tenant ID, follow these steps:

0 commit comments

Comments
 (0)