Rôles intégrés Azure pour la mise en réseau
Cet article répertorie les rôles intégrés Azure dans la catégorie Mise en réseau.
Contributeur de domaine Azure Front Door
Pour une utilisation interne dans Azure. Peut gérer les domaines Azure Front Door, mais ne peut pas accorder l’accès à d’autres utilisateurs.
Actions | Description |
---|---|
Microsoft.Cdn/operationresults/profileresults/customdomainresults/read | |
Microsoft.Cdn/profiles/customdomains/read | |
Microsoft.Cdn/profiles/customdomains/write | |
Microsoft.Cdn/profiles/customdomains/delete | |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "For internal use within Azure. Can manage Azure Front Door domains, but can't grant access to other users.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/0ab34830-df19-4f8c-b84e-aa85b8afa6e8",
"name": "0ab34830-df19-4f8c-b84e-aa85b8afa6e8",
"permissions": [
{
"actions": [
"Microsoft.Cdn/operationresults/profileresults/customdomainresults/read",
"Microsoft.Cdn/profiles/customdomains/read",
"Microsoft.Cdn/profiles/customdomains/write",
"Microsoft.Cdn/profiles/customdomains/delete",
"Microsoft.Resources/subscriptions/resourceGroups/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Azure Front Door Domain Contributor",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Lecteur de domaine Azure Front Door
Pour une utilisation interne dans Azure. Peut afficher les domaines Azure Front Door, mais ne peut pas apporter de modifications.
Actions | Description |
---|---|
Microsoft.Cdn/operationresults/profileresults/customdomainresults/read | |
Microsoft.Cdn/profiles/customdomains/read | |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "For internal use within Azure. Can view Azure Front Door domains, but can't make changes.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/0f99d363-226e-4dca-9920-b807cf8e1a5f",
"name": "0f99d363-226e-4dca-9920-b807cf8e1a5f",
"permissions": [
{
"actions": [
"Microsoft.Cdn/operationresults/profileresults/customdomainresults/read",
"Microsoft.Cdn/profiles/customdomains/read",
"Microsoft.Resources/subscriptions/resourceGroups/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Azure Front Door Domain Reader",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Lecteur de profil Azure Front Door
Peut afficher les profils standard et Premium Azure Front Door et leurs points de terminaison, mais ne peut pas apporter de modifications.
Actions | Description |
---|---|
Microsoft.Authorization/*/read | Lire les rôles et les affectations de rôles |
Microsoft.Cdn/edgenodes/read | |
Microsoft.Cdn/operationresults/* | |
Microsoft.Cdn/profiles/*/read | |
Microsoft.Insights/alertRules/* | Créer et gérer une alerte de métrique classique |
Microsoft.Resources/deployments/* | Créer et gérer un déploiement |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
Microsoft.Cdn/operationresults/profileresults/afdendpointresults/CheckCustomDomainDNSMappingStatus/action | |
Microsoft.Cdn/profiles/queryloganalyticsmetrics/action | |
Microsoft.Cdn/profiles/queryloganalyticsrankings/action | |
Microsoft.Cdn/profiles/querywafloganalyticsmetrics/action | |
Microsoft.Cdn/profiles/querywafloganalyticsrankings/action | |
Microsoft.Cdn/profiles/afdendpoints/CheckCustomDomainDNSMappingStatus/action | |
Microsoft.Cdn/profiles/Usages/action | |
Microsoft.Cdn/profiles/afdendpoints/Usages/action | |
Microsoft.Cdn/profiles/origingroups/Usages/action | |
Microsoft.Cdn/profiles/rulesets/Usages/action | |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "Can view AFD standard and premium profiles and their endpoints, but can't make changes.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/662802e2-50f6-46b0-aed2-e834bacc6d12",
"name": "662802e2-50f6-46b0-aed2-e834bacc6d12",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Cdn/edgenodes/read",
"Microsoft.Cdn/operationresults/*",
"Microsoft.Cdn/profiles/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Resources/deployments/*",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Cdn/operationresults/profileresults/afdendpointresults/CheckCustomDomainDNSMappingStatus/action",
"Microsoft.Cdn/profiles/queryloganalyticsmetrics/action",
"Microsoft.Cdn/profiles/queryloganalyticsrankings/action",
"Microsoft.Cdn/profiles/querywafloganalyticsmetrics/action",
"Microsoft.Cdn/profiles/querywafloganalyticsrankings/action",
"Microsoft.Cdn/profiles/afdendpoints/CheckCustomDomainDNSMappingStatus/action",
"Microsoft.Cdn/profiles/Usages/action",
"Microsoft.Cdn/profiles/afdendpoints/Usages/action",
"Microsoft.Cdn/profiles/origingroups/Usages/action",
"Microsoft.Cdn/profiles/rulesets/Usages/action"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Azure Front Door Profile Reader",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Contributeur secret Azure Front Door
Pour une utilisation interne dans Azure. Peut gérer les secrets Azure Front Door, mais ne peut pas accorder l’accès à d’autres utilisateurs.
Actions | Description |
---|---|
Microsoft.Cdn/operationresults/profileresults/secretresults/read | |
Microsoft.Cdn/profiles/secrets/read | |
Microsoft.Cdn/profiles/secrets/write | |
Microsoft.Cdn/profiles/secrets/delete | |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "For internal use within Azure. Can manage Azure Front Door secrets, but can't grant access to other users.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/3f2eb865-5811-4578-b90a-6fc6fa0df8e5",
"name": "3f2eb865-5811-4578-b90a-6fc6fa0df8e5",
"permissions": [
{
"actions": [
"Microsoft.Cdn/operationresults/profileresults/secretresults/read",
"Microsoft.Cdn/profiles/secrets/read",
"Microsoft.Cdn/profiles/secrets/write",
"Microsoft.Cdn/profiles/secrets/delete",
"Microsoft.Resources/subscriptions/resourceGroups/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Azure Front Door Secret Contributor",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Lecteur de secrets Azure Front Door
Pour une utilisation interne dans Azure. Peut afficher les secrets Azure Front Door, mais ne peut pas apporter de modifications.
Actions | Description |
---|---|
Microsoft.Cdn/operationresults/profileresults/secretresults/read | |
Microsoft.Cdn/profiles/secrets/read | |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "For internal use within Azure. Can view Azure Front Door secrets, but can't make changes.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/0db238c4-885e-4c4f-a933-aa2cef684fca",
"name": "0db238c4-885e-4c4f-a933-aa2cef684fca",
"permissions": [
{
"actions": [
"Microsoft.Cdn/operationresults/profileresults/secretresults/read",
"Microsoft.Cdn/profiles/secrets/read",
"Microsoft.Resources/subscriptions/resourceGroups/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Azure Front Door Secret Reader",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Contributeur de point de terminaison CDN
Peut gérer les points de terminaison CDN, mais ne peut pas accorder l’accès à d’autres utilisateurs.
Actions | Description |
---|---|
Microsoft.Authorization/*/read | Lire les rôles et les affectations de rôles |
Microsoft.Cdn/edgenodes/read | |
Microsoft.Cdn/operationresults/* | |
Microsoft.Cdn/profiles/endpoints/* | |
Microsoft.Insights/alertRules/* | Créer et gérer une alerte de métrique classique |
Microsoft.Resources/deployments/* | Créer et gérer un déploiement |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
Microsoft.Support/* | Créer et mettre à jour un ticket de support |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "Can manage CDN endpoints, but can't grant access to other users.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/426e0c7f-0c7e-4658-b36f-ff54d6c29b45",
"name": "426e0c7f-0c7e-4658-b36f-ff54d6c29b45",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Cdn/edgenodes/read",
"Microsoft.Cdn/operationresults/*",
"Microsoft.Cdn/profiles/endpoints/*",
"Microsoft.Insights/alertRules/*",
"Microsoft.Resources/deployments/*",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Support/*"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "CDN Endpoint Contributor",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Lecteur de point de terminaison CDN
Peut afficher des points de terminaison CDN, mais ne peut pas effectuer de modifications.
Actions | Description |
---|---|
Microsoft.Authorization/*/read | Lire les rôles et les affectations de rôles |
Microsoft.Cdn/edgenodes/read | |
Microsoft.Cdn/operationresults/* | |
Microsoft.Cdn/profiles/endpoints/*/read | |
Microsoft.Cdn/profiles/afdendpoints/validateCustomDomain/action | |
Microsoft.Insights/alertRules/* | Créer et gérer une alerte de métrique classique |
Microsoft.Resources/deployments/* | Créer et gérer un déploiement |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
Microsoft.Support/* | Créer et mettre à jour un ticket de support |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "Can view CDN endpoints, but can't make changes.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/871e35f6-b5c1-49cc-a043-bde969a0f2cd",
"name": "871e35f6-b5c1-49cc-a043-bde969a0f2cd",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Cdn/edgenodes/read",
"Microsoft.Cdn/operationresults/*",
"Microsoft.Cdn/profiles/endpoints/*/read",
"Microsoft.Cdn/profiles/afdendpoints/validateCustomDomain/action",
"Microsoft.Insights/alertRules/*",
"Microsoft.Resources/deployments/*",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Support/*"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "CDN Endpoint Reader",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Contributeur de profil CDN
Peut gérer des profils CDN et Azure Front Door standard et premium et leurs points de terminaison, mais ne peut pas accorder l’accès à d’autres utilisateurs.
Actions | Description |
---|---|
Microsoft.Authorization/*/read | Lire les rôles et les affectations de rôles |
Microsoft.Cdn/edgenodes/read | |
Microsoft.Cdn/operationresults/* | |
Microsoft.Cdn/profiles/* | |
Microsoft.Insights/alertRules/* | Créer et gérer une alerte de métrique classique |
Microsoft.Resources/deployments/* | Créer et gérer un déploiement |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
Microsoft.Support/* | Créer et mettre à jour un ticket de support |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "Can manage CDN and Azure Front Door standard and premium profiles and their endpoints, but can't grant access to other users.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/ec156ff8-a8d1-4d15-830c-5b80698ca432",
"name": "ec156ff8-a8d1-4d15-830c-5b80698ca432",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Cdn/edgenodes/read",
"Microsoft.Cdn/operationresults/*",
"Microsoft.Cdn/profiles/*",
"Microsoft.Insights/alertRules/*",
"Microsoft.Resources/deployments/*",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Support/*"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "CDN Profile Contributor",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Lecteur de profil CDN
Peut afficher des profils CDN et leurs points de terminaison, mais ne peut pas y apporter des modifications.
Actions | Description |
---|---|
Microsoft.Authorization/*/read | Lire les rôles et les affectations de rôles |
Microsoft.Cdn/edgenodes/read | |
Microsoft.Cdn/operationresults/* | |
Microsoft.Cdn/profiles/*/read | |
Microsoft.Insights/alertRules/* | Créer et gérer une alerte de métrique classique |
Microsoft.Resources/deployments/* | Créer et gérer un déploiement |
Microsoft.Cdn/profiles/afdendpoints/validateCustomDomain/action | |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
Microsoft.Support/* | Créer et mettre à jour un ticket de support |
Microsoft.Cdn/profiles/CheckResourceUsage/action | |
Microsoft.Cdn/profiles/endpoints/CheckResourceUsage/action | |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "Can view CDN profiles and their endpoints, but can't make changes.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/8f96442b-4075-438f-813d-ad51ab4019af",
"name": "8f96442b-4075-438f-813d-ad51ab4019af",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Cdn/edgenodes/read",
"Microsoft.Cdn/operationresults/*",
"Microsoft.Cdn/profiles/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Resources/deployments/*",
"Microsoft.Cdn/profiles/afdendpoints/validateCustomDomain/action",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Support/*",
"Microsoft.Cdn/profiles/CheckResourceUsage/action",
"Microsoft.Cdn/profiles/endpoints/CheckResourceUsage/action"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "CDN Profile Reader",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Contributeur de réseau classique
Permet de gérer des réseaux classiques, mais pas d’y accéder.
Actions | Description |
---|---|
Microsoft.Authorization/*/read | Lire les rôles et les affectations de rôles |
Microsoft.ClassicNetwork/* | Créer et gérer des réseaux classiques |
Microsoft.Insights/alertRules/* | Créer et gérer une alerte de métrique classique |
Microsoft.ResourceHealth/availabilityStatuses/read | Obtient les états de disponibilité de toutes les ressources dans l’étendue spécifiée. |
Microsoft.Resources/deployments/* | Créer et gérer un déploiement |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
Microsoft.Support/* | Créer et mettre à jour un ticket de support |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "Lets you manage classic networks, but not access to them.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/b34d265f-36f7-4a0d-a4d4-e158ca92e90f",
"name": "b34d265f-36f7-4a0d-a4d4-e158ca92e90f",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.ClassicNetwork/*",
"Microsoft.Insights/alertRules/*",
"Microsoft.ResourceHealth/availabilityStatuses/read",
"Microsoft.Resources/deployments/*",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Support/*"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Classic Network Contributor",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Contributeur de Zone DNS
Permet de gérer des zones DNS et des jeux d’enregistrements dans Azure DNS, mais pas de contrôler qui y a accès.
Actions | Description |
---|---|
Microsoft.Authorization/*/read | Lire les rôles et les affectations de rôles |
Microsoft.Insights/alertRules/* | Créer et gérer une alerte de métrique classique |
Microsoft.Network/dnsZones/* | Créer et gérer des enregistrements et zones DNS |
Microsoft.ResourceHealth/availabilityStatuses/read | Obtient les états de disponibilité de toutes les ressources dans l’étendue spécifiée. |
Microsoft.Resources/deployments/* | Créer et gérer un déploiement |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
Microsoft.Support/* | Créer et mettre à jour un ticket de support |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "Lets you manage DNS zones and record sets in Azure DNS, but does not let you control who has access to them.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/befefa01-2a29-4197-83a8-272ff33ce314",
"name": "befefa01-2a29-4197-83a8-272ff33ce314",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Network/dnsZones/*",
"Microsoft.ResourceHealth/availabilityStatuses/read",
"Microsoft.Resources/deployments/*",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Support/*"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "DNS Zone Contributor",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Contributeur de réseau
Permet de gérer des réseaux, mais pas d’y accéder. Ce rôle ne vous accorde pas l’autorisation de déployer ou de gérer Machines Virtuelles.
Actions | Description |
---|---|
Microsoft.Authorization/*/read | Lire les rôles et les affectations de rôles |
Microsoft.Insights/alertRules/* | Créer et gérer une alerte de métrique classique |
Microsoft.Network/* | Créer et gérer des réseaux |
Microsoft.ResourceHealth/availabilityStatuses/read | Obtient les états de disponibilité de toutes les ressources dans l’étendue spécifiée. |
Microsoft.Resources/deployments/* | Créer et gérer un déploiement |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
Microsoft.Support/* | Créer et mettre à jour un ticket de support |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "Lets you manage networks, but not access to them.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7",
"name": "4d97b98b-1d4f-4787-a291-c67834d212e7",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Network/*",
"Microsoft.ResourceHealth/availabilityStatuses/read",
"Microsoft.Resources/deployments/*",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Support/*"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Network Contributor",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Collaborateur de zone DNS privée
Permet de gérer les ressources de zone DNS privée, mais pas les réseaux virtuels auxquels elles sont liées.
Actions | Description |
---|---|
Microsoft.Insights/alertRules/* | Créer et gérer une alerte de métrique classique |
Microsoft.Resources/deployments/* | Créer et gérer un déploiement |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
Microsoft.Support/* | Créer et mettre à jour un ticket de support |
Microsoft.Network/privateDnsZones/* | |
Microsoft.Network/privateDnsOperationResults/* | |
Microsoft.Network/privateDnsOperationStatuses/* | |
Microsoft.Network/virtualNetworks/read | Obtenir la définition de réseau virtuel. |
Microsoft.Network/virtualNetworks/join/action | Joint un réseau virtuel. Impossible à alerter. |
Microsoft.Authorization/*/read | Lire les rôles et les affectations de rôles |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "Lets you manage private DNS zone resources, but not the virtual networks they are linked to.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/b12aa53e-6015-4669-85d0-8515ebb3ae7f",
"name": "b12aa53e-6015-4669-85d0-8515ebb3ae7f",
"permissions": [
{
"actions": [
"Microsoft.Insights/alertRules/*",
"Microsoft.Resources/deployments/*",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Support/*",
"Microsoft.Network/privateDnsZones/*",
"Microsoft.Network/privateDnsOperationResults/*",
"Microsoft.Network/privateDnsOperationStatuses/*",
"Microsoft.Network/virtualNetworks/read",
"Microsoft.Network/virtualNetworks/join/action",
"Microsoft.Authorization/*/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Private DNS Zone Contributor",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Contributeur Traffic Manager
Permet de gérer des profils Traffic Manager, mais pas de contrôler qui y a accès.
Actions | Description |
---|---|
Microsoft.Authorization/*/read | Lire les rôles et les affectations de rôles |
Microsoft.Insights/alertRules/* | Créer et gérer une alerte de métrique classique |
Microsoft.Network/trafficManagerProfiles/* | |
Microsoft.ResourceHealth/availabilityStatuses/read | Obtient les états de disponibilité de toutes les ressources dans l’étendue spécifiée. |
Microsoft.Resources/deployments/* | Créer et gérer un déploiement |
Microsoft.Resources/subscriptions/resourceGroups/read | Obtient ou répertorie les groupes de ressources. |
Microsoft.Support/* | Créer et mettre à jour un ticket de support |
NotActions | |
aucune | |
DataActions | |
aucune | |
NotDataActions | |
aucune |
{
"assignableScopes": [
"/"
],
"description": "Lets you manage Traffic Manager profiles, but does not let you control who has access to them.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/a4b10055-b0c7-44c2-b00f-c7b5b3550cf7",
"name": "a4b10055-b0c7-44c2-b00f-c7b5b3550cf7",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Network/trafficManagerProfiles/*",
"Microsoft.ResourceHealth/availabilityStatuses/read",
"Microsoft.Resources/deployments/*",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Support/*"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Traffic Manager Contributor",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}