Hi @Brad Field
Although you are a Global Administrator
, Azure RBAC (Role-Based Access Control) functions independently of Azure AD roles. The error suggests that your account lacks the required Azure role assignments to create a Storage Account.
You can check the role assignments through portal or also through Azure CLI command.
Command:
az role assignment list --assignee ******@momentumstack.com --subscription 0bc7aaa8-899e-4c78-9480-1c362774f235 --output table
The above command will list all Azure role assignments for the user ******@momentumstack.com
within the specified subscription (0bc7aaa8-899e-4c78-9480-1c362774f235
) and presents the results in a table format.
Sample Output:
Principal Role Scope
----------------------------- ----------------------------- ---------------------------------------------------
******@momentumstack.com Owner /subscriptions/0bc7aaa8-899e-4c78-9480-1c362774f235
******@momentumstack.com User Access Administrator /subscriptions/0bc7aaa8-899e-4c78-9480-1c362774f235
******@momentumstack.com Storage Account Contributor /subscriptions/0bc7aaa8-899e-4c78-9480-1c362774f235
While listing your role assignments, if you do not see the appropriate role, ask your subscription admin (Owner or User Access Administrator) to assign you the Storage Account Contributor roles to create a storage account at subscription level. If you need to create other resources, such as a Function App or Key Vault, request your admin to assign you the Contributor role.
Reference:
- Azure built-in roles - Azure RBAC | Microsoft Learn
- Assign Azure roles using the Azure portal - Azure RBAC | Microsoft Learn
Please do not forget to "Accept the answer” and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.
If you have any other questions or are still running into more issues, let me know in the “comments” and I would be happy to help you.