Display name | Attribute Log Reader | ||
---|---|---|---|
Id | 9c99539d-8186-4804-835f-fd51ef9e2dcd | ||
Description | Read audit logs related to custom security attributes. | ||
Detailed description | Assign the Attribute Log Reader role to users who need to do the following tasks: * Read audit logs for attribute set changes * Read audit logs for custom security attribute definition changes * Read audit logs for custom security attribute assignment changes Users with this role *cannot* do the following tasks: * Configure diagnostic settings for custom security attributes * Read audit logs for other events By default, Global Administrator and other administrator roles do not have permissions to read audit logs for custom security attributes. To read audit logs for custom security attributes, you must be assigned this role or the Attribute Log Administrator role. |
||
Categories | identity | ||
isPrivileged | False | ||
EntraOps Tier Level | ManagementPlane | ||
#Resource Actions unique | 55 | ||
#Resource Actions Operations unique | 55 | ||
#Resource Actions privileged | 0 | ||
#Resource Actions direct | 1 | ||
Resource Actions inherited | True | ||
#Resource Actions inherited | 54 | ||
Resource Actions inherited from | Directory Readers (88d8e3e3-8f55-4a1e-953a-9b9898b8876b) | ||
#Resource Actions overlap direct&inherited | 0 | ||
Resource Actions overlap direct&inherited | |||
#Resource Actions inherited to | 0 other Entra Id Roles | ||
Resource Actions inherited to | n/a | ||
#Resource Actions conditioned | 0 | ||
#Resource Actions unconditioned | 55 | ||
#NameSpaces | 1 | ||
NameSpaces | microsoft.directory: 55 | ||
Actions | read: 55 | ||
Operations actionVerbs | GET: 55 | ||
Resource Actions where Consent Policy applies | 0 | ||
Resource Actions / Consent Policy | n/a | ||
JSON enriched |
|
||
JSON raw (v1.0 endpoint) |
|
||
JSON raw (beta endpoint) |
|