You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/custom-roles.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: rolyon
6
6
manager: amycolannino
7
7
ms.service: role-based-access-control
8
8
ms.topic: conceptual
9
-
ms.date: 11/15/2023
9
+
ms.date: 02/22/2024
10
10
ms.author: rolyon
11
11
---
12
12
@@ -195,8 +195,11 @@ Here are steps to help find the role assignments before deleting a custom role:
195
195
- In the [AssignableScopes](role-definitions.md#assignablescopes) section, get the management groups, subscriptions, and resource groups.
196
196
- Iterate over the `AssignableScopes` and [list the role assignments](role-assignments-list-portal.md).
197
197
-[Remove the role assignments](role-assignments-remove.md) that use the custom role.
198
+
- If you are using [Microsoft Entra Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-resource-roles-assign-roles), remove eligible custom role assignments.
198
199
-[Delete the custom role](custom-roles-portal.md#delete-a-custom-role).
199
200
201
+
For information about how to find unused custom roles, see [Symptom - No more role definitions can be created](troubleshoot-limits.md#symptom---no-more-role-definitions-can-be-created).
202
+
200
203
## Custom role limits
201
204
202
205
The following list describes the limits for custom roles.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/troubleshoot-limits.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: rolyon
6
6
manager: amycolannino
7
7
ms.service: role-based-access-control
8
8
ms.topic: how-to
9
-
ms.date: 01/12/2024
9
+
ms.date: 02/22/2024
10
10
ms.author: rolyon
11
11
---
12
12
@@ -63,7 +63,7 @@ To reduce the number of role assignments in the subscription, add principals (us
63
63
64
64
1. Run the following query to get the role assignments with the same role and at the same scope, but for different principals.
65
65
66
-
This query checks active role assignments and doesn't consider eligible role assignments in [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md).
66
+
This query checks active role assignments and doesn't consider eligible role assignments in [Microsoft Entra Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-resource-roles-assign-roles). To list eligible role assignments, you can use the Microsoft Entra admin center, PowerShell, or REST API. For more information, see [Get-AzRoleEligibilityScheduleInstance](/powershell/module/az.resources/get-azroleeligibilityscheduleinstance) or [Role Eligibility Schedule Instances - List For Scope](/rest/api/authorization/role-eligibility-schedule-instances/list-for-scope).
67
67
68
68
If you are using [role assignment conditions](conditions-overview.md) or [delegating role assignment management with conditions](delegate-role-assignments-overview.md), you should use the Conditions query. Otherwise, use the Default query.
69
69
@@ -147,7 +147,7 @@ To reduce the number of role assignments in the subscription, remove redundant r
147
147
148
148
1. Run the following query to get the role assignments with the same role and same principal, but at different scopes.
149
149
150
-
This query checks active role assignments and doesn't consider eligible role assignments in [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md).
150
+
This query checks active role assignments and doesn't consider eligible role assignments in [Microsoft Entra Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-resource-roles-assign-roles). To list eligible role assignments, you can the Microsoft Entra admin center, PowerShell, or REST API. For more information, see [Get-AzRoleEligibilityScheduleInstance](/powershell/module/az.resources/get-azroleeligibilityscheduleinstance) or [Role Eligibility Schedule Instances - List For Scope](/rest/api/authorization/role-eligibility-schedule-instances/list-for-scope).
151
151
152
152
If you are using [role assignment conditions](conditions-overview.md) or [delegating role assignment management with conditions](delegate-role-assignments-overview.md), you should use the Conditions query. Otherwise, use the Default query.
153
153
@@ -217,7 +217,7 @@ To reduce the number of role assignments in the subscription, replace multiple b
217
217
218
218
1. Run the following query to get role assignments with the same principal and same scope, but with different built-in roles.
219
219
220
-
This query checks active role assignments and doesn't consider eligible role assignments in [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md).
220
+
This query checks active role assignments and doesn't consider eligible role assignments in [Microsoft Entra Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-resource-roles-assign-roles). To list eligible role assignments, you can use the Microsoft Entra admin center, PowerShell, or REST API. For more information, see [Get-AzRoleEligibilityScheduleInstance](/powershell/module/az.resources/get-azroleeligibilityscheduleinstance) or [Role Eligibility Schedule Instances - List For Scope](/rest/api/authorization/role-eligibility-schedule-instances/list-for-scope).
221
221
222
222
If you are using [role assignment conditions](conditions-overview.md) or [delegating role assignment management with conditions](delegate-role-assignments-overview.md), you should use the Conditions query. Otherwise, use the Default query.
223
223
@@ -272,7 +272,7 @@ To reduce the number of role assignments in the subscription, replace multiple b
272
272
273
273
### Solution 4 - Make role assignments eligible
274
274
275
-
To reduce the number of role assignments in the subscription and you have Microsoft Entra ID P2, make role assignments eligible in [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md) instead of permanently assigned.
275
+
To reduce the number of role assignments in the subscription and you have Microsoft Entra ID P2, make role assignments eligible in [Microsoft Entra Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-resource-roles-assign-roles) instead of permanently assigned.
276
276
277
277
### Solution 5 - Add an additional subscription
278
278
@@ -323,7 +323,7 @@ Follow these steps to find and delete unused Azure custom roles.
323
323
324
324
1. Run the following query to get all custom roles that don't have any role assignments:
325
325
326
-
This query checks active role assignments and doesn't consider eligible role assignments in [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md).
326
+
This query checks active role assignments and doesn't consider eligible custom role assignments in [Microsoft Entra Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-resource-roles-assign-roles). To list eligible custom role assignments, you can use the Microsoft Entra admin center, PowerShell, or REST API. For more information, see [Get-AzRoleEligibilityScheduleInstance](/powershell/module/az.resources/get-azroleeligibilityscheduleinstance) or [Role Eligibility Schedule Instances - List For Scope](/rest/api/authorization/role-eligibility-schedule-instances/list-for-scope).
0 commit comments