Skip to content

Commit 3ced0a0

Browse files
Merge pull request #310041 from rolyon/rolyon-rbac-roles-dec-2025-new
[Azure RBAC] Roles and permissions for Dec 2025
2 parents 5792eb5 + 355ed1d commit 3ced0a0

44 files changed

Lines changed: 4298 additions & 1681 deletions

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5064,6 +5064,16 @@
50645064
"redirect_url": "/azure/role-based-access-control/quickstart-role-assignments-template",
50655065
"redirect_document_id": true
50665066
},
5067+
{
5068+
"source_path_from_root": "/articles/role-based-access-control/built-in-roles/mixed-reality.md",
5069+
"redirect_url": "/azure/role-based-access-control/built-in-roles",
5070+
"redirect_document_id": false
5071+
},
5072+
{
5073+
"source_path_from_root": "/articles/role-based-access-control/permissions/mixed-reality.md",
5074+
"redirect_url": "/azure/role-based-access-control/resource-provider-operations",
5075+
"redirect_document_id": false
5076+
},
50675077
{
50685078
"source_path_from_root": "/articles/scheduler/get-started-portal.md",
50695079
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",

articles/role-based-access-control/TOC.yml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -201,8 +201,6 @@
201201
href: built-in-roles/ai-machine-learning.md
202202
- name: Internet of Things
203203
href: built-in-roles/internet-of-things.md
204-
- name: Mixed reality
205-
href: built-in-roles/mixed-reality.md
206204
- name: Integration
207205
href: built-in-roles/integration.md
208206
- name: Identity
@@ -211,6 +209,8 @@
211209
href: built-in-roles/security.md
212210
- name: DevOps
213211
href: built-in-roles/devops.md
212+
- name: Migration
213+
href: built-in-roles/migration.md
214214
- name: Monitor
215215
href: built-in-roles/monitor.md
216216
- name: Management and governance
@@ -241,8 +241,6 @@
241241
href: permissions/ai-machine-learning.md
242242
- name: Internet of Things
243243
href: permissions/internet-of-things.md
244-
- name: Mixed reality
245-
href: permissions/mixed-reality.md
246244
- name: Integration
247245
href: permissions/integration.md
248246
- name: Identity

articles/role-based-access-control/built-in-roles.md

Lines changed: 57 additions & 40 deletions
Large diffs are not rendered by default.

articles/role-based-access-control/built-in-roles/ai-machine-learning.md

Lines changed: 133 additions & 218 deletions
Large diffs are not rendered by default.

articles/role-based-access-control/built-in-roles/analytics.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.workload: identity
77
author: rolyon
88
manager: pmwongera
99
ms.author: rolyon
10-
ms.date: 05/25/2025
10+
ms.date: 12/31/2025
1111
ms.custom: generated
1212
---
1313

@@ -641,4 +641,4 @@ Lets you perform query testing without creating a stream analytics job first
641641

642642
## Next steps
643643

644-
- [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal)
644+
- [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal)

articles/role-based-access-control/built-in-roles/compute.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.workload: identity
77
author: rolyon
88
manager: pmwongera
99
ms.author: rolyon
10-
ms.date: 09/03/2025
10+
ms.date: 12/31/2025
1111
ms.custom: generated
1212
---
1313

@@ -166,6 +166,7 @@ Arc VMware VM Contributor has permissions to perform all VM actions.
166166
"type": "Microsoft.Authorization/roleDefinitions"
167167
}
168168
```
169+
169170
## Azure Batch Account Contributor
170171

171172
Grants full access to manage all Batch resources, including Batch accounts, pools and jobs.
@@ -1709,6 +1710,8 @@ Provides permission to backup vault to perform disk restore.
17091710
> | [Microsoft.Resources](../permissions/management-and-governance.md#microsoftresources)/subscriptions/resourceGroups/read | Gets or lists resource groups. |
17101711
> | [Microsoft.Compute](../permissions/compute.md#microsoftcompute)/disks/write | Creates a new Disk or updates an existing one |
17111712
> | [Microsoft.Compute](../permissions/compute.md#microsoftcompute)/disks/read | Get the properties of a Disk |
1713+
> | [Microsoft.Compute](../permissions/compute.md#microsoftcompute)/disks/beginGetAccess/action | Get the SAS URI of the Disk for blob access |
1714+
> | [Microsoft.Compute](../permissions/compute.md#microsoftcompute)/disks/endGetAccess/action | Revoke the SAS URI of the Disk |
17121715
> | **NotActions** | |
17131716
> | *none* | |
17141717
> | **DataActions** | |
@@ -1730,7 +1733,9 @@ Provides permission to backup vault to perform disk restore.
17301733
"Microsoft.Authorization/*/read",
17311734
"Microsoft.Resources/subscriptions/resourceGroups/read",
17321735
"Microsoft.Compute/disks/write",
1733-
"Microsoft.Compute/disks/read"
1736+
"Microsoft.Compute/disks/read",
1737+
"Microsoft.Compute/disks/beginGetAccess/action",
1738+
"Microsoft.Compute/disks/endGetAccess/action"
17341739
],
17351740
"notActions": [],
17361741
"dataActions": [],

articles/role-based-access-control/built-in-roles/containers.md

Lines changed: 550 additions & 27 deletions
Large diffs are not rendered by default.

articles/role-based-access-control/built-in-roles/databases.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.workload: identity
77
author: rolyon
88
manager: pmwongera
99
ms.author: rolyon
10-
ms.date: 05/25/2025
10+
ms.date: 12/31/2025
1111
ms.custom: generated
1212
---
1313

@@ -130,6 +130,7 @@ Lets you manage Azure Cosmos DB accounts, but not access data in them. Prevents
130130
> | [Microsoft.Support](../permissions/general.md#microsoftsupport)/* | Create and update a support ticket |
131131
> | [Microsoft.Network](../permissions/networking.md#microsoftnetwork)/virtualNetworks/subnets/joinViaServiceEndpoint/action | Joins resource such as storage account or SQL database to a subnet. Not alertable. |
132132
> | **NotActions** | |
133+
> | [Microsoft.DocumentDB](../permissions/databases.md#microsoftdocumentdb)/databaseAccounts/copyJobs/* | |
133134
> | [Microsoft.DocumentDB](../permissions/databases.md#microsoftdocumentdb)/databaseAccounts/dataTransferJobs/* | |
134135
> | [Microsoft.DocumentDB](../permissions/databases.md#microsoftdocumentdb)/databaseAccounts/readonlyKeys/* | |
135136
> | [Microsoft.DocumentDB](../permissions/databases.md#microsoftdocumentdb)/databaseAccounts/regenerateKey/* | |
@@ -169,6 +170,7 @@ Lets you manage Azure Cosmos DB accounts, but not access data in them. Prevents
169170
"Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action"
170171
],
171172
"notActions": [
173+
"Microsoft.DocumentDB/databaseAccounts/copyJobs/*",
172174
"Microsoft.DocumentDB/databaseAccounts/dataTransferJobs/*",
173175
"Microsoft.DocumentDB/databaseAccounts/readonlyKeys/*",
174176
"Microsoft.DocumentDB/databaseAccounts/regenerateKey/*",
@@ -202,8 +204,8 @@ Can submit restore request for a Cosmos DB database or a container for an accoun
202204
> [!div class="mx-tableFixed"]
203205
> | Actions | Description |
204206
> | --- | --- |
205-
> | [Microsoft.DocumentDB](../permissions/databases.md#microsoftdocumentdb)/databaseAccounts/backup/action | Submit a request to configure backup |
206-
> | [Microsoft.DocumentDB](../permissions/databases.md#microsoftdocumentdb)/databaseAccounts/restore/action | Submit a restore request |
207+
> | [Microsoft.DocumentDB](../permissions/databases.md#microsoftdocumentdb)/databaseAccounts/backup/action | Submit a request to trigger external backup operation |
208+
> | [Microsoft.DocumentDB](../permissions/databases.md#microsoftdocumentdb)/databaseAccounts/restore/action | Submit a request to trigger external restore operation |
207209
> | **NotActions** | |
208210
> | *none* | |
209211
> | **DataActions** | |
@@ -661,7 +663,7 @@ Lets you manage the security-related policies of SQL servers and databases, but
661663
> | [Microsoft.Sql](../permissions/databases.md#microsoftsql)/servers/advancedThreatProtectionSettings/read | Retrieve a list of server Advanced Threat Protection settings configured for a given server |
662664
> | [Microsoft.Sql](../permissions/databases.md#microsoftsql)/servers/advancedThreatProtectionSettings/write | Change the server Advanced Threat Protection settings for a given server |
663665
> | [Microsoft.Sql](../permissions/databases.md#microsoftsql)/servers/auditingSettings/* | Create and manage SQL server auditing setting |
664-
> | [Microsoft.Sql](../permissions/databases.md#microsoftsql)/servers/extendedAuditingSettings/read | Retrieve details of the extended server blob auditing policy configured on a given server |
666+
> | [Microsoft.Sql](../permissions/databases.md#microsoftsql)/servers/extendedAuditingSettings/* | |
665667
> | [Microsoft.Sql](../permissions/databases.md#microsoftsql)/servers/databases/advancedThreatProtectionSettings/read | Retrieve a list of database Advanced Threat Protection settings configured for a given database |
666668
> | [Microsoft.Sql](../permissions/databases.md#microsoftsql)/servers/databases/advancedThreatProtectionSettings/write | Change the database Advanced Threat Protection settings for a given database |
667669
> | [Microsoft.Sql](../permissions/databases.md#microsoftsql)/servers/databases/advancedThreatProtectionSettings/read | Retrieve a list of database Advanced Threat Protection settings configured for a given database |
@@ -752,7 +754,7 @@ Lets you manage the security-related policies of SQL servers and databases, but
752754
"Microsoft.Sql/servers/advancedThreatProtectionSettings/read",
753755
"Microsoft.Sql/servers/advancedThreatProtectionSettings/write",
754756
"Microsoft.Sql/servers/auditingSettings/*",
755-
"Microsoft.Sql/servers/extendedAuditingSettings/read",
757+
"Microsoft.Sql/servers/extendedAuditingSettings/*",
756758
"Microsoft.Sql/servers/databases/advancedThreatProtectionSettings/read",
757759
"Microsoft.Sql/servers/databases/advancedThreatProtectionSettings/write",
758760
"Microsoft.Sql/servers/databases/advancedThreatProtectionSettings/read",

0 commit comments

Comments
 (0)