Skip to content

Commit 3ff165a

Browse files
DTOSS-10982: add storage data contributor roles to managed identity RBAC
1 parent c78ba55 commit 3ff165a

File tree

1 file changed

+4
-2
lines changed
  • infrastructure/terraform/resource_group_init

1 file changed

+4
-2
lines changed

infrastructure/terraform/resource_group_init/core.bicep

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,8 @@ var roleID = {
1010
contributor: 'b24988ac-6180-42a0-ab88-20f7382dd24c'
1111
kvSecretsUser: '4633458b-17de-408a-b874-0445c86b69e6'
1212
rbacAdmin: 'f58310d9-a9f6-439a-9e8d-f62e7b41a168'
13+
storageBlobDataContributor: 'ba92f5b4-2d11-453d-a403-e96b0029c9fe'
14+
storageQueueDataContributor: '974c5e8b-45b9-4653-ba55-5f855dd0fb88'
1315
}
1416

1517
// Let the managed identity configure resources in the subscription
@@ -38,8 +40,8 @@ resource rbacAdminAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01
3840
properties: {
3941
roleDefinitionId: subscriptionResourceId('Microsoft.Authorization/roleDefinitions', roleID.rbacAdmin)
4042
principalId: miPrincipalId
41-
condition: '((!(ActionMatches{\'Microsoft.Authorization/roleAssignments/write\'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${roleID.kvSecretsUser}})) AND ((!(ActionMatches{\'Microsoft.Authorization/roleAssignments/delete\'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${roleID.kvSecretsUser}}))'
43+
condition: '((!(ActionMatches{\'Microsoft.Authorization/roleAssignments/write\'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${roleID.kvSecretsUser}, ${roleID.storageBlobDataContributor}, ${roleID.storageQueueDataContributor}})) AND ((!(ActionMatches{\'Microsoft.Authorization/roleAssignments/delete\'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${roleID.kvSecretsUser}, ${roleID.storageBlobDataContributor}, ${roleID.storageQueueDataContributor}}))'
4244
conditionVersion: '2.0'
43-
description: '${miName} Role Based Access Control Administrator access to subscription. Only allows assigning the Key Vault Secrets User role.'
45+
description: '${miName} Role Based Access Control Administrator access to subscription. Can assign Key Vault Secrets User, Storage Blob Data Contributor, and Storage Queue Data Contributor roles.'
4446
}
4547
}

0 commit comments

Comments
 (0)