You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/built-in-roles.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.workload: identity
7
7
author: rolyon
8
8
manager: pmwongera
9
9
ms.author: rolyon
10
-
ms.date: 12/31/2025
10
+
ms.date: 02/23/2026
11
11
ms.custom: generated
12
12
---
13
13
@@ -399,10 +399,10 @@ The following table provides a brief description of each built-in role. Click th
399
399
> | <aname='api-management-workspace-api-product-manager'></a>[API Management Workspace API Product Manager](./built-in-roles/integration.md#api-management-workspace-api-product-manager)| Has read access to entities in the workspace and read and write access to entities for publishing APIs. This role should be assigned on the workspace scope. | 73c2c328-d004-4c5e-938c-35c6f5679a1f |
400
400
> | <aname='api-management-workspace-contributor'></a>[API Management Workspace Contributor](./built-in-roles/integration.md#api-management-workspace-contributor)| Can manage the workspace and view, but not modify its members. This role should be assigned on the workspace scope. | 0c34c906-8d99-4cb7-8bb7-33f5b0a1a799 |
401
401
> | <aname='api-management-workspace-reader'></a>[API Management Workspace Reader](./built-in-roles/integration.md#api-management-workspace-reader)| Has read-only access to entities in the workspace. This role should be assigned on the workspace scope. | ef1c2c96-4a77-49e8-b9a4-6179fe1d2fd2 |
402
-
> | <aname='app-configuration-contributor'></a>[App Configuration Contributor](./built-in-roles/integration.md#app-configuration-contributor)| Grants permission for all management operations, except purge, for App Configuration resources. | fe86443c-f201-4fc4-9d2a-ac61149fbda0 |
402
+
> | <aname='app-configuration-contributor'></a>[App Configuration Contributor](./built-in-roles/integration.md#app-configuration-contributor)| Grants permission for all management operations, except purge, for App Configuration resources. This role does not grant access to data plane resources such as key-values, snapshots, and feature flags. | fe86443c-f201-4fc4-9d2a-ac61149fbda0 |
403
403
> | <aname='app-configuration-data-owner'></a>[App Configuration Data Owner](./built-in-roles/integration.md#app-configuration-data-owner)| Allows full access to App Configuration data. | 5ae67dd6-50cb-40e7-96ff-dc2bfa4b606b |
404
404
> | <aname='app-configuration-data-reader'></a>[App Configuration Data Reader](./built-in-roles/integration.md#app-configuration-data-reader)| Allows read access to App Configuration data. | 516239f1-63e1-4d78-a4de-a74fb236a071 |
405
-
> | <aname='app-configuration-reader'></a>[App Configuration Reader](./built-in-roles/integration.md#app-configuration-reader)| Grants permission for read operations for App Configuration resources. | 175b81b9-6e0d-490a-85e4-0d422273c10c |
405
+
> | <aname='app-configuration-reader'></a>[App Configuration Reader](./built-in-roles/integration.md#app-configuration-reader)| Grants permission for read operations for App Configuration resources. This role does not grant access to data plane resources such as key-values, snapshots, and feature flags. | 175b81b9-6e0d-490a-85e4-0d422273c10c |
406
406
> | <aname='azure-api-center-compliance-manager'></a>[Azure API Center Compliance Manager](./built-in-roles/integration.md#azure-api-center-compliance-manager)| Grants reader access to AI projects, reader access to AI accounts, and data actions for an AI project. Applies for new Foundry resources. | ede9aaa3-4627-494e-be13-4aa7c256148d |
407
407
> | <aname='azure-api-center-data-reader'></a>[Azure API Center Data Reader](./built-in-roles/integration.md#azure-api-center-data-reader)| Allows for access to Azure API Center data plane read operations. | c7244dfb-f447-457d-b2ba-3999044d1706 |
408
408
> | <aname='azure-api-center-service-contributor'></a>[Azure API Center Service Contributor](./built-in-roles/integration.md#azure-api-center-service-contributor)| Allows managing Azure API Center service. | dd24193f-ef65-44e5-8a7e-6fa6e03f7713 |
Copy file name to clipboardExpand all lines: articles/role-based-access-control/built-in-roles/ai-machine-learning.md
+23-3Lines changed: 23 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.workload: identity
7
7
author: rolyon
8
8
manager: pmwongera
9
9
ms.author: rolyon
10
-
ms.date: 12/31/2025
10
+
ms.date: 02/23/2026
11
11
ms.custom: generated
12
12
---
13
13
@@ -342,6 +342,7 @@ Can approve private endpoint connections to Azure AI common dependency resources
342
342
> |[Microsoft.DBforMySQL](../permissions/databases.md#microsoftdbformysql)/flexibleServers/privateLinkResources/read | Get the private link resources for the corresponding MySQL Server |
343
343
> |[Microsoft.DBforMySQL](../permissions/databases.md#microsoftdbformysql)/flexibleServers/read | Returns the list of servers or gets the properties for the specified server. |
344
344
> |[Microsoft.DocumentDB](../permissions/databases.md#microsoftdocumentdb)/databaseAccounts/privateEndpointConnectionsApproval/action | Manage a private endpoint connection of Database Account |
345
+
> |[Microsoft.DocumentDB](../permissions/databases.md#microsoftdocumentdb)/databaseAccounts/privateEndpointConnections/operationResults/read | Read Status of privateEndpointConnections asynchronous operation |
345
346
> |[Microsoft.DocumentDB](../permissions/databases.md#microsoftdocumentdb)/databaseAccounts/privateEndpointConnections/read | Read a private endpoint connection or list all the private endpoint connections of a Database Account |
346
347
> |[Microsoft.DocumentDB](../permissions/databases.md#microsoftdocumentdb)/databaseAccounts/privateEndpointConnections/write | Create or update a private endpoint connection of a Database Account |
347
348
> |[Microsoft.DocumentDB](../permissions/databases.md#microsoftdocumentdb)/databaseAccounts/privateLinkResources/read | Read a private link resource or list all the private link resources of a Database Account |
@@ -448,6 +449,7 @@ Can approve private endpoint connections to Azure AI common dependency resources
> |[Microsoft.ResourceHealth](../permissions/management-and-governance.md#microsoftresourcehealth)/availabilityStatuses/read | Gets the availability statuses for all resources in the specified scope |
572
582
> |[Microsoft.Resources](../permissions/management-and-governance.md#microsoftresources)/deployments/*| Create and manage a deployment |
573
583
> |[Microsoft.Resources](../permissions/management-and-governance.md#microsoftresources)/deployments/operations/read | Gets or lists deployment operations. |
@@ -594,8 +604,16 @@ Grants full to manage AI project and accounts. Grants reader access to AI projec
@@ -650,7 +668,7 @@ Lets you perform developer actions and management actions on Foundry Projects. I
650
668
"assignableScopes": [
651
669
"/"
652
670
],
653
-
"description": "Lets you perform developer actions and management actions on Microsoft Foundry Projects. Allows for making role assignments, but limited to Cognitive Service User role.",
671
+
"description": "Lets you perform developer actions and management actions on Azure AI Foundry Projects. Allows for making role assignments, but limited to Cognitive Service User role.",
> |[Microsoft.Search](../permissions/ai-machine-learning.md#microsoftsearch)/searchServices/indexes/contentSecurity/elevatedOperations/read | Enable the option to read all documents in an index regardless of permission filters. |
2713
2732
> |**NotDataActions**||
2714
2733
> |*none*||
2715
2734
@@ -2726,7 +2745,8 @@ Grants full access to Azure Cognitive Search index data.
Copy file name to clipboardExpand all lines: articles/role-based-access-control/built-in-roles/containers.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.workload: identity
7
7
author: rolyon
8
8
manager: pmwongera
9
9
ms.author: rolyon
10
-
ms.date: 12/31/2025
10
+
ms.date: 02/23/2026
11
11
ms.custom: generated
12
12
---
13
13
@@ -4868,6 +4868,7 @@ Grants Microsoft Defender for Cloud access to Azure Kubernetes Services
4868
4868
> |[Microsoft.Features](../permissions/management-and-governance.md#microsoftfeatures)/providers/features/read | Gets the feature of a subscription in a given resource provider. |
4869
4869
> |[Microsoft.Features](../permissions/management-and-governance.md#microsoftfeatures)/providers/features/register/action | Registers the feature for a subscription in a given resource provider. |
4870
4870
> |[Microsoft.Security](../permissions/security.md#microsoftsecurity)/pricings/securityoperators/read | Gets the security operators for the scope |
4871
+
> |[Microsoft.Security](../permissions/security.md#microsoftsecurity)/securityOperators/read | Gets the securityoperators for the scope |
4871
4872
> |**NotActions**||
4872
4873
> |*none*||
4873
4874
> |**DataActions**||
@@ -4893,7 +4894,8 @@ Grants Microsoft Defender for Cloud access to Azure Kubernetes Services
0 commit comments