Skip to content

Commit fadcaf6

Browse files
authored
Update permission-view-manage.md
1 parent 3806fb8 commit fadcaf6

File tree

1 file changed

+66
-79
lines changed

1 file changed

+66
-79
lines changed

articles/cost-management-billing/savings-plan/permission-view-manage.md

Lines changed: 66 additions & 79 deletions
Original file line numberDiff line numberDiff line change
@@ -17,46 +17,24 @@ This article explains how savings plan permissions work and how users can view a
1717
## Who can manage a savings plan by default
1818
There are two different authorization methods that control an users ability to view, manage and delegate permissions to savings plans - billing admin roles and savings plan RBAC roles.
1919

20-
### Billing admin roles
20+
## Billing admin roles
2121
You can view, manage, and delegate permissions to savings plans using built-in billing admin roles. To learn more about MCA and EA billing roles, see [Understand Microsoft Customer Agreement administrative roles in Azure](../manage/understand-mca-roles.md) and [Managing Azure Enterprise Agreement roles](../manage/understand-ea-roles.md), respectively.
22+
23+
### Billing admin roles required for savings plan actions
2224
- View savings plans
23-
- MCA: Users with _**Billing profile reader**_ or above
24-
- EA: Users with _**Enterprise Administrator (read only)**_ or above
25+
- MCA: Users with Billing profile reader or above
26+
- EA: Users with Enterprise Administrator (read only) or above
2527
- MPA: Not supported
2628
- Manage savings plans (achieved by delegating permissions for the full billing profile/enrollment)
27-
- MCA: Users with _**Billing profile contributor**_ or above
28-
- EA: Users with _**EA Administrator**_ or above
29+
- MCA: Users with Billing profile contributor or above
30+
- EA: Users with EA Administrator or above
2931
- MPA: Not supported
3032
- Delegate savings plan permissions
31-
- MCA: Users with _**Billing profile contributor**_ or above
32-
- EA: Users with _**EA purchaser**_ or above
33+
- MCA: Users with Billing profile contributor or above
34+
- EA: Users with EA purchaser or above
3335
- MPA: Not supported
3436

35-
### Savings plans RBAC roles
36-
The savings plan lifecycle is independent of an Azure subscription. Savings plans don't inherit permissions from subscriptions after the purchase. Savings plans are a tenant-level resource with their own Azure RBAC permissions. There are four savings plan-specific RBAC roles:
37-
- Savings plan administrator – allows [management](manage-savings-plan.md) of one or more savings plans in a tenant and [delegation of RBAC roles](../../role-based-access-control/role-assignments-portal.yml) to other users.
38-
- Savings plan purchaser – allows purchase of savings plans with a specified subscription.
39-
- Allows savings plans purchase or [Reservation trade-in](reservation-trade-in.md) by non-billing admins and non-subscription owners.
40-
- Savings plan purchasing by non-billing admins must be enabled. Learn more [here](buy-savings-plan.md#who-can-buy-a-savings-plan).
41-
- Savings plan contributor – allows management of one or more savings plans in a tenant but not delegation of RBAC roles to other users.
42-
- Savings plan reader – allows read-only access to one or more savings plans in a tenant.
43-
44-
RBAC roles can be scoped to either a specific resource entity (e.g. subscription or savings plan) or the Microsoft Entra tenant (directory). To learn about delegating savings plan RBAC roles, see [Delegate savings plan RBAC roles](manage-savings-plan.md#delegate-savings-plan-rbac-roles). To learn more about Azure RBAC, see [What is Azure role-based access control (Azure RBAC)?](../../role-based-access-control/overview.md).
45-
46-
- View savings plans:
47-
- Tenant-scope: Users with _**Savings plan reader**_ or above.
48-
- Savings plan-scope: Built-in _**Reader**_ or above.
49-
- Manage savings plans:
50-
- Tenant-scope: Users with _**Savings plan contributor**_ or above.
51-
- Savings plan-scope: Built-in _**Contributor**_ or _**Owner**_ roles, or _**Savings plan contributor**_ or above.
52-
- Delegate savings plan permissions:
53-
- Tenant-scope: [User Access Administrator](../../role-based-access-control/built-in-roles.md#general) rights are required to grant RBAC roles to all savings plans in the tenant. To gain these rights, follow [Elevate access](../../role-based-access-control/elevate-access-global-admin.md) steps.
54-
- Savings plan-scope: **_Savings plan administrator_** or **_User access administrator_**.
55-
56-
In addition, users who held the _**Subscription owner**_ role when the subscription was used to purchase a savings plan, can also view, manage and delegate permissions for the purchased savings plan.
57-
58-
## View and manage savings plans as a billing admin
59-
37+
### View and manage savings plans as a billing admin
6038
If you're a billing role user, use following steps to view and manage all savings plans and savings plan transactions in the Azure portal:
6139

6240
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Cost Management + Billing**.
@@ -67,7 +45,6 @@ If you're a billing role user, use following steps to view and manage all saving
6745
1. Billing role users can take ownership of a savings plan with the [Savings Plan Order - Elevate REST API](/rest/api/billingbenefits/savings-plan-order/elevate) to give themselves Azure RBAC roles.
6846

6947
### Adding billing administrators
70-
7148
Add a user as billing administrator to an Enterprise Agreement or a Microsoft Customer Agreement in the Azure portal.
7249

7350
- For an Enterprise Agreement, add users with the Enterprise Administrator role to view and manage all savings plan orders that apply to the Enterprise Agreement. Enterprise administrators can view and manage savings plan in **Cost Management + Billing**.
@@ -77,38 +54,43 @@ Add a user as billing administrator to an Enterprise Agreement or a Microsoft Cu
7754
- Billing profile readers and invoice managers can view all savings plans that are paid for with the billing profile. However, they can't make changes to savings plans. For more information, see [Billing profile roles and tasks](../manage/understand-mca-roles.md#billing-profile-roles-and-tasks).
7855

7956

80-
## View savings plans with Azure RBAC access
81-
82-
If you have savings plan-specific RBAC roles (Savings plan administrator, purchaser, contributor or reader), purchased savings plans, or been added as an owner to savings plans, use the following steps to view and manage savings plans in the Azure portal:
57+
## Savings plan RBAC roles
58+
The savings plan lifecycle is independent of an Azure subscription. Savings plans don't inherit permissions from subscriptions after the purchase. Savings plans are a tenant-level resource with their own Azure RBAC permissions.
8359

84-
1. Sign in to the [Azure portal](https://portal.azure.com).
85-
2. Select **Home** > **Savings plans** to list savings plans that you have access to.
86-
87-
## Manage resource entities (including savings plans) with elevated access
88-
89-
You can [elevate a user's access to manage all Azure resource entities](../../role-based-access-control/elevate-access-global-admin.md).
90-
91-
After you have elevated access:
92-
93-
1. Navigate to **Home** > **Savings plans** to see all savings plans that are in the tenant.
94-
2. To make modifications to the savings plan, add yourself as an owner of the savings plan order using Access control (IAM).
60+
### Overview
61+
There are four savings plan-specific RBAC roles:
62+
- Savings plan administrator – allows [management](manage-savings-plan.md) of one or more savings plans in a tenant and [delegation of RBAC roles](../../role-based-access-control/role-assignments-portal.yml) to other users.
63+
- Savings plan purchaser – allows purchase of savings plans with a specified subscription.
64+
- Allows savings plans purchase or [Reservation trade-in](reservation-trade-in.md) by non-billing admins and non-subscription owners.
65+
- Savings plan purchasing by non-billing admins must be enabled. Learn more [here](buy-savings-plan.md#who-can-buy-a-savings-plan).
66+
- Savings plan contributor – allows management of one or more savings plans in a tenant but not delegation of RBAC roles to other users.
67+
- Savings plan reader – allows read-only access to one or more savings plans in a tenant.
9568

96-
## Grant access to individual savings plans
69+
These roles can be scoped to either a specific resource entity (e.g. subscription or savings plan) or the Microsoft Entra tenant (directory). To learn more about Azure RBAC, see [What is Azure role-based access control (Azure RBAC)?](../../role-based-access-control/overview.md).
9770

98-
Users who have owner access on the savings plan and billing administrators can delegate access management for an individual savings plan order in the Azure portal.
71+
### Savings plan RBAC roles required for savings plan actions
72+
- View savings plans:
73+
- Tenant-scope: Users with Savings plan reader or above.
74+
- Savings plan-scope: Built-in Reader or above.
75+
- Manage savings plans:
76+
- Tenant-scope: Users with Savings plan contributor or above.
77+
- Savings plan-scope: Built-in Contributor or Owner roles, or Savings plan contributor or above.
78+
- Delegate savings plan permissions:
79+
- Tenant-scope: [User Access Administrator](../../role-based-access-control/built-in-roles.md#general) rights are required to grant RBAC roles to all savings plans in the tenant. To gain these rights, follow [Elevate access](../../role-based-access-control/elevate-access-global-admin.md) steps.
80+
- Savings plan-scope: Savings plan administrator or User access administrator.
9981

100-
To allow other people to manage savings plans, you have two options:
82+
In addition, users who held the Subscription owner role when the subscription was used to purchase a savings plan, can also view, manage and delegate permissions for the purchased savings plan.
10183

102-
- Delegate access management for an individual savings plan order by assigning the savings plan owner or savings plan administrator role to a user at the resource scope of the savings plan order. If you want to give limited access, select a different role. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.yml).
10384

104-
- Add a user as billing administrator to an Enterprise Agreement or a Microsoft Customer Agreement:
105-
- For an Enterprise Agreement, add users with the Enterprise Administrator role to view and manage all savings plan orders that apply to the Enterprise Agreement. Users with the Enterprise Administrator (read only) role can only view the savings plan. Department admins and account owners can't view savings plans unless they're explicitly added to them using Access control (IAM). For more information, see [Manage Azure Enterprise roles](../manage/understand-ea-roles.md).
106-
- For a Microsoft Customer Agreement, users with the billing profile owner role or the billing profile contributor role can manage all savings plan purchases made using the billing profile. Billing profile readers and invoice managers can view all savings plans that are paid for with the billing profile. However, they can't make changes to savings plans. For more information, see [Billing profile roles and tasks](../manage/understand-mca-roles.md#billing-profile-roles-and-tasks).
85+
### View savings plans with RBAC access
10786

108-
_Enterprise Administrators can take ownership of a savings plan order and they can add other users to a savings plan using Access control (IAM)._
87+
If you have savings plan-specific RBAC roles (Savings plan administrator, purchaser, contributor or reader), purchased savings plans, or been added as an owner to savings plans, use the following steps to view and manage savings plans in the Azure portal:
10988

110-
- For a Microsoft Customer Agreement, users with the billing profile owner role or the billing profile contributor role can manage all savings plan purchases made using the billing profile. Billing profile readers and invoice managers can view all savings plans that are paid for with the billing profile. However, they can't make changes to savings plans. For more information, see [Billing profile roles and tasks](../manage/understand-mca-roles.md#billing-profile-roles-and-tasks).
89+
1. Sign in to the [Azure portal](https://portal.azure.com).
90+
2. Select **Home** > **Savings plans** to list savings plans that you have access to.
11191

92+
### Adding RBAC roles to users and groups
93+
To learn about delegating savings plan RBAC roles, see [Delegate savings plan RBAC roles](manage-savings-plan.md#delegate-savings-plan-rbac-roles)
11294

11395

11496
## Grant access with PowerShell
@@ -117,12 +99,10 @@ Users that have owner access for savings plan orders, users with elevated access
11799

118100
Access granted using PowerShell isn't shown in the Azure portal. Instead, you use the `get-AzRoleAssignment` command in the following section to view assigned roles.
119101

120-
## Assign the owner role for all savings plan
121-
102+
### Assign the owner role for all savings plan
122103
Use the following Azure PowerShell script to give a user Azure RBAC access to all savings plan orders in their Microsoft Entra tenant (directory).
123104

124105
```azurepowershell
125-
126106
Import-Module Az.Accounts
127107
Import-Module Az.Resources
128108
@@ -137,12 +117,11 @@ foreach ($savingsPlan in $savingsPlanObjects)
137117
Write-Host "Assigning Owner role assignment to "$savingsPlanOrderId
138118
New-AzRoleAssignment -Scope $savingsPlanOrderId -ObjectId <ObjectId> -RoleDefinitionName Owner
139119
}
140-
141120
```
142121

143122
When you use the PowerShell script to assign the ownership role and it runs successfully, a success message isn’t returned.
144123

145-
### Parameters
124+
#### Parameters
146125

147126
**-ObjectId** Microsoft Entra ObjectId of the user, group, or service principal.
148127
- Type: String
@@ -159,21 +138,8 @@ When you use the PowerShell script to assign the ownership role and it runs succ
159138
- Accept pipeline input: False
160139
- Accept wildcard characters: False
161140

162-
## Tenant-level access
163-
164-
[User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) rights are required before you can grant users or groups the Savings plan Administrator and Savings plan Reader roles at the tenant level. In order to get User Access Administrator rights at the tenant level, follow [Elevate access](../../role-based-access-control/elevate-access-global-admin.md) steps.
165-
166-
### Add a Savings plan Administrator role or Savings plan Reader role at the tenant level
167-
You can assign these roles from the [Azure portal](https://portal.azure.com).
168-
169-
1. Sign in to the Azure portal and navigate to **Savings plan**.
170-
1. Select a savings plan that you have access to.
171-
1. At the top of the page, select **Role Assignment**.
172-
1. Select the **Roles** tab.
173-
1. To make modifications, add a user as a Savings plan Administrator or Savings plan Reader using Access control.
174141

175142
### Add a Savings plan Administrator role at the tenant level using Azure PowerShell script
176-
177143
Use the following Azure PowerShell script to add a Savings plan Administrator role at the tenant level with PowerShell.
178144

179145
```azurepowershell
@@ -184,7 +150,32 @@ New-AzRoleAssignment -Scope "/providers/Microsoft.BillingBenefits" -PrincipalId
184150
```
185151

186152
#### Parameters
153+
**-ObjectId** Microsoft Entra ObjectId of the user, group, or service principal.
154+
- Type: String
155+
- Aliases: Id, PrincipalId
156+
- Position: Named
157+
- Default value: None
158+
- Accept pipeline input: True
159+
- Accept wildcard characters: False
187160

161+
**-TenantId** Tenant unique identifier.
162+
- Type: String
163+
- Position: 5
164+
- Default value: None
165+
- Accept pipeline input: False
166+
- Accept wildcard characters: False
167+
168+
### Assign a Savings plan Contributor role at the tenant level using Azure PowerShell script
169+
Use the following Azure PowerShell script to assign the Savings plan Contributor role at the tenant level with PowerShell.
170+
171+
```azurepowershell
172+
Import-Module Az.Accounts
173+
Import-Module Az.Resources
174+
Connect-AzAccount -Tenant <TenantId>
175+
New-AzRoleAssignment -Scope "/providers/Microsoft.BillingBenefits" -PrincipalId <ObjectId> -RoleDefinitionName "Savings plan Contributor"
176+
```
177+
178+
#### Parameters
188179
**-ObjectId** Microsoft Entra ObjectId of the user, group, or service principal.
189180
- Type: String
190181
- Aliases: Id, PrincipalId
@@ -200,22 +191,18 @@ New-AzRoleAssignment -Scope "/providers/Microsoft.BillingBenefits" -PrincipalId
200191
- Accept pipeline input: False
201192
- Accept wildcard characters: False
202193

203-
### Assign a Savings plan Reader role at the tenant level using Azure PowerShell script
204194

195+
### Assign a Savings plan Reader role at the tenant level using Azure PowerShell script
205196
Use the following Azure PowerShell script to assign the Savings plan Reader role at the tenant level with PowerShell.
206197

207198
```azurepowershell
208-
209199
Import-Module Az.Accounts
210200
Import-Module Az.Resources
211-
212201
Connect-AzAccount -Tenant <TenantId>
213-
214202
New-AzRoleAssignment -Scope "/providers/Microsoft.BillingBenefits" -PrincipalId <ObjectId> -RoleDefinitionName "Savings plan Reader"
215203
```
216204

217205
#### Parameters
218-
219206
**-ObjectId** Microsoft Entra ObjectId of the user, group, or service principal.
220207
- Type: String
221208
- Aliases: Id, PrincipalId

0 commit comments

Comments
 (0)