Use Role-based Access Control to manage Azure Local virtual machines
Applies to: Azure Local, version 23H2
This article describes how to use the Role-based Access Control (RBAC) to control access to Arc virtual machines (VMs) running on Azure Local.
You can use the builtin RBAC roles to control access to VMs and VM resources such as virtual disks, network interfaces, VM images, logical networks and storage paths. You can assign these roles to users, groups, service principals and managed identities.
About builtin RBAC roles
To control access to VMs and VM resources on Azure Local, you can use the following RBAC roles:
- Azure Stack HCI Administrator - This role grants full access to your Azure Local instance and its resources. An Azure Stack HCI administrator can register the system as well as assign Azure Stack HCI VM contributor and Azure Stack HCI VM reader roles to other users. They can also create shared resources such as logical networks, VM images, and storage paths.
- Azure Stack HCI VM Contributor - This role grants permissions to perform all VM actions such as start, stop, restart the VMs. An Azure Stack HCI VM Contributor can create and delete VMs, as well as the resources and extensions attached to VMs. An Azure Stack HCI VM Contributor can't register the system or assign roles to other users, nor create system-shared resources such as logical networks, VM images, and storage paths.
- Azure Stack HCI VM Reader - This role grants permissions to only view the VMs. A VM reader can't perform any actions on the VMs or VM resources and extensions.
Here's a table that describes the VM actions granted by each role for the VMs and the various VM resources. The VM resources are referred to resources required to create a VM and include virtual disks, network interfaces, VM images, logical networks, and storage paths:
Builtin role | VMs | VM resources |
---|---|---|
Azure Stack HCI Administrator | Create, list, delete VMs Start, stop, restart VMs |
Create, list, delete all VM resources including logical networks, VM images, and storage paths |
Azure Stack HCI VM Contributor | Create, list, delete VMs Start, stop, restart VMs |
Create, list, delete all VM resources except logical networks, VM images, and storage paths |
Azure Stack HCI VM Reader | List all VMs | List all VM resources |
Prerequisites
Before you begin, make sure to complete the following prerequisites:
Make sure that complete the Azure Local requirements.
Make sure that you have access to Azure subscription as an Owner or User Access Administrator to assign roles to others.
Assign RBAC roles to users
You can assign RBAC roles to user via the Azure portal. Follow these steps to assign RBAC roles to users:
In the Azure portal, search for the scope to grant access to, for example, search for subscriptions, resource groups, or a specific resource. In this example, we use the subscription in which your Azure Local is deployed.
Go to your subscription and then go to Access control (IAM) > Role assignments. From the top command bar, select + Add and then select Add role assignment.
If you don't have permissions to assign roles, the Add role assignment option is disabled.
On the Role tab, select an RBAC role to assign and choose from one of the following builtin roles:
- Azure Stack HCI Administrator
- Azure Stack HCI VM Contributor
- Azure Stack HCI VM Reader
On the Members tab, select the User, group, or service principal. Also select a member to assign the role.
Review the role and assign it.
Verify the role assignment. Go to Access control (IAM) > Check access > View my access. You should see the role assignment.
For more information on role assignment, see Assign Azure roles using the Azure portal.