How a service administrator get enough permission to create azure custom roles -
i'm trying create custom role in azure (rbac). when execute powershell command new-azurermroledefinition
here message saying i'm not authorized create it.
> new-azurermroledefinition .\developer_access_rbac.json new-azurermroledefinition : authorizationfailed: client 'admin@company.com' object id '{guid}' not have authorization perform action 'microsoft.authorization/roledefinitions/write' on scope '/providers/microsoft.authorization/roledefinitions/{guid}'. @ line:1 char:1 + new-azurermroledefinition .\developer_access_rbac.json + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + categoryinfo : closeerror: (:) [new-azurermroledefinition], cloudexception + fullyqualifiederrorid : microsoft.azure.commands.resources.newazureroledefinitioncommand
i asked 1 of our administrators in our organization , says account admin@company.com
global administrator. , in active directory admin@company.com
displayed service administrator.
i'm little confused these permission levels in azure. can explain me how acquire needed permission account admin@company.com
solving issue.
who can create custom role? owners (and user access administrators) of subscriptions, resource groups, , resources can create custom roles use in scopes. user creating role needs able perform microsoft.authorization/roledefinition/write operation on assignablescopes of role.
who can modify custom role? owners (and user access administrators) of subscriptions, resource groups, , resources can modify custom roles in scopes. users need able perform microsoft.authorization/roledefinition/write operation on assignablescopes of custom role.
who can view custom roles? built-in roles in azure rbac allow viewing of roles available assignment. users can perform microsoft.authorization/roledefinition/read operation @ scope can view rbac roles available assignment @ scope.
Comments
Post a Comment