Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| azure:azure_iam [2025/06/26 20:27] – [RBAC/Roles] mmuze | azure:azure_iam [2026/04/06 19:20] (current) – [Azure Administrator Roles (Entra ID Roles) vs. Azure Roles (Azure RBAC Roles)] mmuze | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Azure IAM ====== | ====== Azure IAM ====== | ||
| + | |||
| + | * [[Microsoft Entra]] | ||
| + | * [[microsoft: | ||
| + | |||
| * //AzureAD// vs. //AzureRM// roles | * //AzureAD// vs. //AzureRM// roles | ||
| Line 11: | Line 15: | ||
| ====== Azure Administrator Roles (Entra ID Roles) vs. Azure Roles (Azure RBAC Roles) ====== | ====== Azure Administrator Roles (Entra ID Roles) vs. Azure Roles (Azure RBAC Roles) ====== | ||
| * Entra roles/ | * Entra roles/ | ||
| - | * Azure roles, Azure RBAC roles, Azure resource roles | + | * Azure (ARM) roles, Azure RBAC roles, Azure resource roles |
| * There are some built-in roles for Entra ID and Azure that have the same name, for example, //Reader// and //Security Reader//. | * There are some built-in roles for Entra ID and Azure that have the same name, for example, //Reader// and //Security Reader//. | ||
| + | * Entra ID/Azure roles could be called // | ||
| ====== Tenant/Root Managment Group Level Access ====== | ====== Tenant/Root Managment Group Level Access ====== | ||
| Line 36: | Line 41: | ||
| * Example of a control plane action is, '' | * Example of a control plane action is, '' | ||
| * Example of a data plane action is, '' | * Example of a data plane action is, '' | ||
| + | |||
| + | ====== Service Accounts ====== | ||
| + | Microsoft’s guidance is to avoid using regular user accounts as service accounts when possible. Instead: | ||
| + | * Use App Registrations + Service Principals with client secret or certificate auth. | ||
| + | * Use Managed Identities if the service runs in Azure, so you don’t manage credentials at all. | ||
| ====== Security Principles ====== | ====== Security Principles ====== | ||
| Line 63: | Line 73: | ||
| * [[https:// | * [[https:// | ||
| * [[https:// | * [[https:// | ||
| - | |||
| - | ====== Related ====== | ||
| - | * [[azure: | ||
| - | * [[azure: | ||
| ====== Roles ====== | ====== Roles ====== | ||
| Line 74: | Line 80: | ||
| >The User Access Administrator role grants the ability to view all resources and manage access assignments at any subscription or management group level within the tenant. Due to its high privilege level, this role assignment should be removed immediately after completing the necessary changes at the root scope to minimize security risks. | >The User Access Administrator role grants the ability to view all resources and manage access assignments at any subscription or management group level within the tenant. Due to its high privilege level, this role assignment should be removed immediately after completing the necessary changes at the root scope to minimize security risks. | ||
| + | |||
| + | ====== Working With Roles ====== | ||
| + | |||
| + | Get the Azure Roles assigned to a user. | ||
| + | < | ||
| + | Get-AzRoleAssignment -SigninName " | ||
| + | </ | ||
| + | |||
| + | < | ||
| + | az role assignment list --assignee " | ||
| + | </ | ||
| + | |||
| + | === Get Roles that have a permission === | ||
| + | |||
| + | < | ||
| + | Get-AzRoleDefinition | Where-Object { | ||
| + | $_.Actions -match " | ||
| + | } | ||
| + | </ | ||
| + | ====== Related ====== | ||
| + | * [[azure: | ||
| + | * [[azure: | ||