|
1 | 1 | ---
|
2 |
| -title: Built-in roles Azure Virtual Desktop - Azure |
3 |
| -description: An overview of built-in roles for Azure Virtual Desktop available for Azure RBAC. |
| 2 | +title: Built-in Azure RBAC roles Azure Virtual Desktop |
| 3 | +description: An overview of built-in Azure RBAC roles for Azure Virtual Desktop available. |
4 | 4 | services: virtual-desktop
|
5 | 5 | author: Heidilohr
|
6 |
| - |
7 | 6 | ms.service: virtual-desktop
|
8 | 7 | ms.topic: conceptual
|
9 |
| -ms.date: 12/15/2020 |
| 8 | +ms.date: 03/22/2022 |
10 | 9 | ms.author: helohr
|
11 | 10 | manager: femila
|
12 | 11 | ---
|
13 |
| -# Built-in roles for Azure Virtual Desktop |
| 12 | +# Built-in Azure RBAC roles for Azure Virtual Desktop |
14 | 13 |
|
15 |
| -Azure Virtual Desktop uses Azure role-based access controls (RBAC) to assign roles to users and admins. These roles give admins permission to carry out certain tasks. To learn more about built-in roles for Azure RBAC, see [Azure built-in roles](../role-based-access-control/built-in-roles.md). |
| 14 | +Azure Virtual Desktop uses Azure role-based access control (RBAC) to control access to resources. There are a number of built-in roles for use with Azure Virtual Desktop which is a collection of permissions. You assign roles to users and admins and these roles give permission to carry out certain tasks. To learn more about Azure RBAC, see [What is Azure RBAC?](../role-based-access-control/overview.md). |
16 | 15 |
|
17 |
| -The standard built-in roles for Azure are Owner, Contributor, and Reader. However, Azure Virtual Desktop has additional roles that let you separate management roles for host pools, app groups, and workspaces. This separation lets you have more granular control over administrative tasks. These roles are named in compliance with Azure's standard roles and least-privilege methodology. |
| 16 | +The standard built-in roles for Azure are Owner, Contributor, and Reader. However, Azure Virtual Desktop has additional roles that let you separate management roles for host pools, application groups, and workspaces. This separation lets you have more granular control over administrative tasks. These roles are named in compliance with Azure's standard roles and least-privilege methodology. |
18 | 17 |
|
19 |
| -Azure Virtual Desktop doesn't have a specific Owner role. However, you can use a standard Owner role for the service objects. |
| 18 | +Azure Virtual Desktop doesn't have a specific Owner role. However, you can use the general Owner role for the service objects. |
20 | 19 |
|
21 |
| -## Desktop Virtualization Contributor |
| 20 | +The built-in roles for Azure Virtual Desktop and the permissions for each one are detailed below. The assignable scope for all built-in roles are set to the root scope ("/"). The root scope indicates that the role is available for assignment in all scopes, for example management groups, subscriptions, or resource groups. For more information, see [Understand Azure role definitions](../role-based-access-control/role-definitions.md). |
22 | 21 |
|
23 |
| -The Desktop Virtualization Contributor role lets you manage all aspects of the deployment. However, it doesn't grant you access to compute resources. You'll also need the User Access Administrator role to publish app groups to users or user groups. |
| 22 | +## Desktop Virtualization Contributor |
24 | 23 |
|
| 24 | +The Desktop Virtualization Contributor role allows users to manage all aspects of the deployment. However, it doesn't grant users access to compute resources. You'll also need the *User Access Administrator* role to publish application groups to users or user groups. |
25 | 25 |
|
26 |
| -- Microsoft.DesktopVirtualization/\* |
27 |
| -- Microsoft.Resources/subscriptions/resourceGroups/read |
28 |
| -- Microsoft.Resources/deployments/\* |
29 |
| -- Microsoft.Authorization/\*/read |
30 |
| -- Microsoft.Insights/alertRules/\* |
31 |
| -- Microsoft.Support/\* |
| 26 | +| Action type | Permissions | |
| 27 | +|--|--| |
| 28 | +| actions | <ul><li>Microsoft.DesktopVirtualization/\*</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/\*</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/\*</li><li>Microsoft.Support/\*</li></ul> | |
| 29 | +| notActions | None | |
| 30 | +| dataActions | None | |
| 31 | +| notDataActions | None | |
32 | 32 |
|
33 | 33 | ## Desktop Virtualization Reader
|
34 | 34 |
|
35 |
| -The Desktop Virtualization Reader role lets you view everything in the deployment but doesn't let you make any changes. |
| 35 | +The Desktop Virtualization Reader role allows users to view everything in the deployment, but doesn't let them make any changes. |
36 | 36 |
|
37 |
| -- Microsoft.DesktopVirtualization/\*/read |
38 |
| -- Microsoft.Resources/subscriptions/resourceGroups/read |
39 |
| -- Microsoft.Resources/deployments/read |
40 |
| -- Microsoft.Authorization/\*/read |
41 |
| -- Microsoft.Insights/alertRules/\* |
42 |
| -- Microsoft.Support/\* |
| 37 | +| Action type | Permissions | |
| 38 | +|--|--| |
| 39 | +| actions | <ul><li>Microsoft.DesktopVirtualization/\*/read</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/read</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/read</li><li>Microsoft.Support/\*</li></ul> | |
| 40 | +| notActions | None | |
| 41 | +| dataActions | None | |
| 42 | +| notDataActions | None | |
43 | 43 |
|
44 |
| -## Desktop Virtualization Host Pool Contributor |
| 44 | +## Desktop Virtualization User |
45 | 45 |
|
46 |
| -The Host Pool Contributor role lets you manage all aspects of host pools, including access to resources. You'll need an extra contributor role, Virtual Machine Contributor, to create virtual machines. You will need AppGroup and Workspace contributor roles to create host pool using the portal or you can use Desktop Virtualization Contributor role. |
| 46 | +The Desktop Virtualization User role allows users to use the applications in an application group. |
| 47 | + |
| 48 | +| Action type | Permissions | |
| 49 | +|--|--| |
| 50 | +| actions | None | |
| 51 | +| notActions | None | |
| 52 | +| dataActions | <ul><li>Microsoft.DesktopVirtualization/applicationGroups/useApplications/action</li></ul> | |
| 53 | +| notDataActions | None | |
| 54 | + |
| 55 | +## Desktop Virtualization Host Pool Contributor |
47 | 56 |
|
48 |
| -The following list describes which permissions this role can access: |
| 57 | +The Desktop Virtualization Host Pool Contributor role allows users to manage all aspects of host pools, including access to resources. You'll also need the *Virtual Machine Contributor* role to create virtual machines. You will need *Desktop Virtualization Application Group Contributor* and *Desktop Virtualization Workspace Contributor* roles to create host pools using the portal, or you can use the *Desktop Virtualization Contributor* role. |
49 | 58 |
|
50 |
| -- Microsoft.DesktopVirtualization/hostpools/\* |
51 |
| -- Microsoft.Resources/subscriptions/resourceGroups/read |
52 |
| -- Microsoft.Resources/deployments/\* |
53 |
| -- Microsoft.Authorization/\*/read |
54 |
| -- Microsoft.Insights/alertRules/\* |
55 |
| -- Microsoft.Support/\* |
| 59 | +| Action type | Permissions | |
| 60 | +|--|--| |
| 61 | +| actions | <ul><li>Microsoft.DesktopVirtualization/hostpools/\*</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/\*</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/\*</li><li>Microsoft.Support/\*</li></ul> | |
| 62 | +| notActions | None | |
| 63 | +| dataActions | None | |
| 64 | +| notDataActions | None | |
56 | 65 |
|
57 | 66 | ## Desktop Virtualization Host Pool Reader
|
58 | 67 |
|
59 |
| -The Host Pool Reader role lets you view everything in the host pool, but won't allow you to make any changes. |
| 68 | +The Desktop Virtualization Host Pool Reader role allows users to view everything in the host pool, but won't allow them to make any changes. |
60 | 69 |
|
61 |
| -- Microsoft.DesktopVirtualization/hostpools/\*/read |
62 |
| -- Microsoft.Resources/subscriptions/resourceGroups/read |
63 |
| -- Microsoft.Resources/deployments/read |
64 |
| -- Microsoft.Authorization/\*/read |
65 |
| -- Microsoft.Insights/alertRules/\* |
66 |
| -- Microsoft.Support/\* |
| 70 | +| Action type | Permissions | |
| 71 | +|--|--| |
| 72 | +| actions | <ul><li>Microsoft.DesktopVirtualization/hostpools/\*/read</li><li>Microsoft.DesktopVirtualization/hostpools/read</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/read</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/read</li><li>Microsoft.Support/\*</li></ul> | |
| 73 | +| notActions | None | |
| 74 | +| dataActions | None | |
| 75 | +| notDataActions | None | |
67 | 76 |
|
68 | 77 | ## Desktop Virtualization Application Group Contributor
|
69 | 78 |
|
70 |
| -The Application Group Contributor role lets you manage all aspects of app groups. If you want to publish app groups to users or user groups, you'll need the User Access Administrator role. |
| 79 | +The Desktop Virtualization Application Group Contributor role allows users to manage all aspects of application groups. If you want users to publish application groups to users or user groups, they'll also need the *User Access Administrator* role. |
71 | 80 |
|
72 |
| -The following list describes which permissions this role can access: |
73 |
| - |
74 |
| -- Microsoft.DesktopVirtualization/applicationgroups/\* |
75 |
| -- Microsoft.DesktopVirtualization/hostpools/read |
76 |
| -- Microsoft.DesktopVirtualization/hostpools/sessionhosts/read |
77 |
| -- Microsoft.Resources/subscriptions/resourceGroups/read |
78 |
| -- Microsoft.Resources/deployments/\* |
79 |
| -- Microsoft.Authorization/\*/read |
80 |
| -- Microsoft.Insights/alertRules/\* |
81 |
| -- Microsoft.Support/\* |
| 81 | +| Action type | Permissions | |
| 82 | +|--|--| |
| 83 | +| actions | <ul><li>Microsoft.DesktopVirtualization/applicationgroups/\*</li><li>Microsoft.DesktopVirtualization/hostpools/read</li><li>Microsoft.DesktopVirtualization/hostpools/sessionhosts/read</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/\*</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/\*</li><li>Microsoft.Support/\*</ul></li> | |
| 84 | +| notActions | None | |
| 85 | +| dataActions | None | |
| 86 | +| notDataActions | None | |
82 | 87 |
|
83 | 88 | ## Desktop Virtualization Application Group Reader
|
84 | 89 |
|
85 |
| -The Application Group Reader role lets you view everything in the app group and will not allow you to make any changes. |
86 |
| - |
87 |
| -The following list describes which permissions this role can access: |
| 90 | +The Desktop Virtualization Application Group Reader role allows users to view everything in the application group and will not allow them to make any changes. |
88 | 91 |
|
89 |
| -- Microsoft.DesktopVirtualization/applicationgroups/\*/read |
90 |
| -- Microsoft.DesktopVirtualization/applicationgroups/read |
91 |
| -- Microsoft.DesktopVirtualization/hostpools/read |
92 |
| -- Microsoft.DesktopVirtualization/hostpools/sessionhosts/read |
93 |
| -- Microsoft.Resources/subscriptions/resourceGroups/read |
94 |
| -- Microsoft.Resources/deployments/read |
95 |
| -- Microsoft.Authorization/\*/read |
96 |
| -- Microsoft.Insights/alertRules/\* |
97 |
| -- Microsoft.Support/\* |
| 92 | +| Action type | Permissions | |
| 93 | +|--|--| |
| 94 | +| actions | <ul><li>Microsoft.DesktopVirtualization/applicationgroups/\*/read</li><li>Microsoft.DesktopVirtualization/applicationgroups/read</li><li>Microsoft.DesktopVirtualization/hostpools/read</li><li>Microsoft.DesktopVirtualization/hostpools/sessionhosts/read</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/read</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/read</li><li>Microsoft.Support/\*</li></ul> | |
| 95 | +| notActions | None | |
| 96 | +| dataActions | None | |
| 97 | +| notDataActions | None | |
98 | 98 |
|
99 | 99 | ## Desktop Virtualization Workspace Contributor
|
100 | 100 |
|
101 |
| -The Workspace Contributor role lets you manage all aspects of workspaces. To get information on applications added to the app groups, you'll also need to be assigned the Application Group Reader role. |
102 |
| - |
103 |
| -The following list describes which permissions this role can access: |
| 101 | +The Desktop Virtualization Workspace Contributor role allows users to manage all aspects of workspaces. To get information on applications added to the application groups, they'll also need the *Application Group Reader* role. |
104 | 102 |
|
105 |
| -- Microsoft.DesktopVirtualization/workspaces/\* |
106 |
| -- Microsoft.DesktopVirtualization/applicationgroups/read |
107 |
| -- Microsoft.Resources/subscriptions/resourceGroups/read |
108 |
| -- Microsoft.Resources/deployments/\* |
109 |
| -- Microsoft.Authorization/\*/read |
110 |
| -- Microsoft.Insights/alertRules/\* |
111 |
| -- Microsoft.Support/\* |
| 103 | +| Action type | Permissions | |
| 104 | +|--|--| |
| 105 | +| actions | <ul><li>Microsoft.DesktopVirtualization/workspaces/\*</li><li>Microsoft.DesktopVirtualization/applicationgroups/read</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/\*</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/\*</li><li>Microsoft.Support/\*</li></ul> | |
| 106 | +| notActions | None | |
| 107 | +| dataActions | None | |
| 108 | +| notDataActions | None | |
112 | 109 |
|
113 | 110 | ## Desktop Virtualization Workspace Reader
|
114 | 111 |
|
115 |
| -The Workspace Reader role lets you view everything in the workspace, but won't allow you to make any changes. |
| 112 | +The Desktop Virtualization Workspace Reader role allows users to view everything in the workspace, but won't allow them to make any changes. |
116 | 113 |
|
117 |
| -The following list describes which permissions this role can access: |
118 |
| - |
119 |
| -- Microsoft.DesktopVirtualization/workspaces/read |
120 |
| -- Microsoft.DesktopVirtualization/applicationgroups/read |
121 |
| -- Microsoft.Resources/subscriptions/resourceGroups/read |
122 |
| -- Microsoft.Resources/deployments/read |
123 |
| -- Microsoft.Authorization/\*/read |
124 |
| -- Microsoft.Insights/alertRules/\* |
125 |
| -- Microsoft.Support/\* |
| 114 | +| Action type | Permissions | |
| 115 | +|--|--| |
| 116 | +| actions | <ul><li>Microsoft.DesktopVirtualization/workspaces/read</li><li>Microsoft.DesktopVirtualization/applicationgroups/read</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/read</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/read</li><li>Microsoft.Support/\*</li></ul> | |
| 117 | +| notActions | None | |
| 118 | +| dataActions | None | |
| 119 | +| notDataActions | None | |
126 | 120 |
|
127 | 121 | ## Desktop Virtualization User Session Operator
|
128 | 122 |
|
129 |
| -The User Session Operator role lets you send messages, disconnect sessions, and use the "logoff" function to sign sessions out of the session host. However, this role doesn't let you perform session host management like removing session host, changing drain mode, and so on. This role can see assignments, but can't modify admins. We recommend you assign this role to specific host pools. If you give this permission at a resource group level, the admin will have read permission on all host pools under a resource group. |
130 |
| - |
131 |
| -The following list describes which permissions this role can access: |
| 123 | +The Desktop Virtualization User Session Operator role allows users to send messages, disconnect sessions, and use the "logoff" function to sign sessions out of the session host. However, this role doesn't let users perform session host management like removing session host, changing drain mode, and so on. This role can see assignments, but can't modify admins. We recommend you assign this role to specific host pools. If you give this permission at a resource group level, the admin will have read permission on all host pools under a resource group. |
132 | 124 |
|
133 |
| -- Microsoft.DesktopVirtualization/hostpools/read |
134 |
| -- Microsoft.DesktopVirtualization/hostpools/sessionhosts/read |
135 |
| -- Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/\* |
136 |
| -- Microsoft.Resources/subscriptions/resourceGroups/read |
137 |
| -- Microsoft.Resources/deployments/read |
138 |
| -- Microsoft.Authorization/\*/read |
139 |
| -- Microsoft.Insights/alertRules/\* |
140 |
| -- Microsoft.Support/\* |
| 125 | +| Action type | Permissions | |
| 126 | +|--|--| |
| 127 | +| actions | <ul><li>Microsoft.DesktopVirtualization/hostpools/read</li><li>Microsoft.DesktopVirtualization/hostpools/sessionhosts/read</li><li>Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/\*</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/\*</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/\*</li><li>Microsoft.Support/\*</li></ul> | |
| 128 | +| notActions | None | |
| 129 | +| dataActions | None | |
| 130 | +| notDataActions | None | |
141 | 131 |
|
142 | 132 | ## Desktop Virtualization Session Host Operator
|
143 | 133 |
|
144 |
| -The Session Host Operator role lets you view and remove session hosts, as well as change drain mode. They can't add session hosts using the Azure portal because they don't have write permission for host pool objects. If the registration token is valid (generated and not expired), you can use this role to add session hosts to the host pool outside of Azure portal if the admin has compute permissions through the Virtual Machine Contributor role. |
145 |
| - |
146 |
| -The following list describes which permissions this role can access: |
| 134 | +The Desktop Virtualization Session Host Operator role allows users to view and remove session hosts, as well as change drain mode. Users can't add session hosts using the Azure portal because they don't have write permission for host pool objects. If the registration token is valid (generated and not expired), users assigned this role can add session hosts to the host pool outside of the Azure portal if they also have the *Virtual Machine Contributor* role. |
147 | 135 |
|
148 |
| -- Microsoft.DesktopVirtualization/hostpools/read |
149 |
| -- Microsoft.DesktopVirtualization/hostpools/sessionhosts/\* |
150 |
| -- Microsoft.Resources/subscriptions/resourceGroups/read |
151 |
| -- Microsoft.Resources/deployments/read |
152 |
| -- Microsoft.Authorization/\*/read |
153 |
| -- Microsoft.Insights/alertRules/\* |
154 |
| -- Microsoft.Support/\* |
| 136 | +| Action type | Permissions | |
| 137 | +|--|--| |
| 138 | +| actions | <ul><li>Microsoft.DesktopVirtualization/hostpools/read</li><li>Microsoft.DesktopVirtualization/hostpools/sessionhosts/\*</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/\*</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/\*</li><li>Microsoft.Support/\*</li></ul> | |
| 139 | +| notActions | None | |
| 140 | +| dataActions | None | |
| 141 | +| notDataActions | None | |
0 commit comments