last sync: 2020-Jul-13 14:14:32 UTC

Azure Role

Resource Policy Contributor

Role Name Resource Policy Contributor
Role Id 36243c78-bf99-498c-9df9-86d9f8d28608
Role Description Users with rights to create/modify resource policy, create support ticket and read resources/hierarchy.
Role Changes
Date/Time (UTC ymd) (i) Change Change detail
2019-11-20 21:32:41 change: DisplayName previous DisplayName: Resource Policy Contributor (Preview)
Actions
Operation Description Used in other Role(s)
*/read Log Analytics Reader, Log Analytics Contributor, Managed Application Operator Role , Managed Applications Reader, Monitoring Reader, Monitoring Contributor, Reader, User Access Administrator, Managed Application Contributor Role
Microsoft.Authorization/policyassignments/* Security Admin
Microsoft.Authorization/policydefinitions/* Security Admin
Microsoft.Authorization/policysetdefinitions/* Security Admin
Microsoft.PolicyInsights/*
Microsoft.Support/* API Management Service Contributor, API Management Service Operator Role, API Management Service Reader Role , Application Insights Component Contributor, Application Insights Snapshot Debugger, Automation Job Operator, Automation Runbook Operator, Automation Operator, Avere Contributor, Backup Contributor, Billing Reader, Backup Operator, BizTalk Contributor, CDN Endpoint Contributor, CDN Endpoint Reader, CDN Profile Contributor, CDN Profile Reader, Classic Network Contributor, Classic Storage Account Contributor, ClearDB MySQL DB Contributor, Classic Virtual Machine Contributor, Cognitive Services User, Cognitive Services Contributor, Cosmos DB Account Reader Role, Cost Management Contributor, Cost Management Reader, Data Box Contributor, Data Box Reader, Data Factory Contributor, Data Lake Analytics Developer, DocumentDB Account Contributor, DNS Zone Contributor, EventGrid EventSubscription Contributor, Intelligent Systems Account Contributor, Key Vault Contributor, Lab Creator, Log Analytics Reader, Log Analytics Contributor, Logic App Operator, Logic App Contributor, Managed Identity Operator, Managed Identity Contributor, Monitoring Metrics Publisher, Monitoring Reader, Network Contributor, Monitoring Contributor, New Relic APM Account Contributor, Redis Cache Contributor, Scheduler Job Collections Contributor, Search Service Contributor, Security Admin, Security Manager (Legacy), Security Reader, Site Recovery Contributor, Site Recovery Operator, Site Recovery Reader, SQL Managed Instance Contributor, SQL DB Contributor, SQL Security Manager, Storage Account Contributor, SQL Server Contributor, Support Request Contributor, Traffic Manager Contributor, User Access Administrator, Virtual Machine Contributor, Web Plan Contributor, Website Contributor, HDInsight Cluster Operator, Cosmos DB Operator, Private DNS Zone Contributor, Blueprint Contributor, Blueprint Operator, Azure Sentinel Contributor, Azure Sentinel Responder, Azure Sentinel Reader, SignalR AccessKey Reader, SignalR Contributor, Kubernetes Cluster - Azure Arc Onboarding, Tag Contributor, Integration Service Environment Developer, Integration Service Environment Contributor, Key Vault Administrator (preview), Key Vault Crypto Officer (preview), Key Vault Secrets Officer (preview), Key Vault Certificates Officer (preview), Key Vault Reader (preview), Azure Arc Kubernetes Viewer, Azure Arc Kubernetes Writer, Azure Arc Kubernetes Cluster Admin, Azure Arc Kubernetes Admin, Azure Kubernetes Service RBAC Cluster Admin, Azure Kubernetes Service RBAC Admin, Azure Kubernetes Service RBAC Reader, Azure Kubernetes Service RBAC Writer
NotActions
DataActions
NotDataActions
Used in Policy
Role Definition (Json)
{
  "Name": "Resource Policy Contributor",
  "Id": "36243c78-bf99-498c-9df9-86d9f8d28608",
  "IsCustom": false,
  "Description": "Users with rights to create/modify resource policy, create support ticket and read resources/hierarchy.",
  "Actions": [
    "*/read",
    "Microsoft.Authorization/policyassignments/*",
    "Microsoft.Authorization/policydefinitions/*",
    "Microsoft.Authorization/policysetdefinitions/*",
    "Microsoft.PolicyInsights/*",
    "Microsoft.Support/*"
  ],
  "NotActions": [
    
  ],
  "DataActions": [
    
  ],
  "NotDataActions": [
    
  ],
  "AssignableScopes": [
    "/"
  ]
}