Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info

The Azure built-in Role "Reader" has no default access to the Storage Account keys which are required for collecting data about VHDs, therefore another custom role Role should be created.

Table of Contents

Create a Custom Role

Keep in mind that you need permissions to create custom rolesRoles, such as Owner or User Access Administrator

...

1. In the Azure portal, open a subscription or resource group where you want the custom role Role to be assignable.

2. Open Access Open 'Access control (IAM)'. Click Add and then click  → Add custom roleRole*. 3. Name the new role Role CloudAware Custom Policy.

...

43. Open the tab PermissionsAdd permissions. Copy and paste Microsoft.Storage/storageAccounts/listKeys/action in the Search for a permission box to select Microsoft Storage. Check the box near the permission. Click Add.

...

Image Removed

Tip

If you are planning to install Breeze Agent, add Microsoft.Compute/virtualMachines/extensions/write permission to the role.

Read more

5. Select 'Start from JSON'. Use the JSON template below. Fill your subscription id in the subscription-Id field{subscription_id} field.

Code Block
{
  "IsCustom": true,
  "Name": "CloudAware Collector Extended",
  "Description": "For collecting data about Blob Containers and VHDs we need to get access to the Storage Account keys as the default roleRole Reader does not provide API access to these keys.",
  "Actions": [
    "Microsoft.Compute/virtualMachines/extensions/write",
    "Microsoft.Storage/storageAccounts/listKeys/action"
  ],
  "notActions": [],
  "assignableScopes": [
    "/subscriptions/{subscription_id}"
  ]
}

...

Tip

The permission Microsoft.Storage/storageAccounts/listKeys/actiongrants 'read' access to List Keys. 

If you are planning to install Breeze Agent, the permission Microsoft.Compute/virtualMachines/extensions/write is required as well.

Read more

Commonly used Azure built-in roles:

Built-in Role

...

ID

Reader

...

acdd72a7-3385-48ef-bd42-f606fba81ae7

...

Contributor

...

b24988ac-6180-42a0-ab88-20f7382dd24c

...

Virtual

...

Machine

...

Contributor

...

d73bb868-a0df-4d4d-bd69-98a00b01fccb

...

Virtual

...

Network

...

Contributor

...

b34d265f-36f7-4a0d-a4d4-e158ca92e90f

...

Storage

...

Account

...

Contributor

...

86e8f5dc-a6e9-4c67-9d15-de283e8eac25

...

Web Plan Contributor

2cc479cb-7b4d-49a8-b449-8c00fd0f0a4b

...

SQL

...

server Contributor

6d8ee4ec-f05a-4a1d-8b00-a9b17e38b437

...

SQL

...

DB

...

Contributor

...

9b7fa17d-e63e-47b0-bb0a-15c516ac86ec

Read more

*In case a custom role Role already exists , you can use it as well. JSON body of your role in your environment, its JSON body should look like the template below. Replace {your-existing-role-definition-id} with your role definition id. In “assignableScopes” section add string"/subscriptions/{subscription-id}" with your {subscription-id}.:

Code Block
{
  "name": "{your-existing-roleRole-definition-id}",
  "permissions": [
    {
      "actions": [
        "Microsoft.Compute/virtualMachines/extensions/write",
        "Microsoft.Storage/storageAccounts/listKeys/action"
      ],
      "notActions": []
    }
  ],
  "AssignableScopes": [
    "/subscriptions/{subscription-id}",
     "/subscriptions/{subscription-id}",
    "/subscriptions/{subscription-id}"
  ],
  "roleNameRoleName": "{your-roleRole-name}",
  "roleTypeRoleType": "CustomRole",
  "type": "Microsoft.Authorization/roleDefinitionsRoleDefinitions"
}

Then you will need to assign this custom role Replace {your-existing-Role-definition-id} with your Role definition id. In the section "AssignableScopes" add the string "/subscriptions/{subscription-id}" with your {subscription-id}.

4. Assign the custom Role to a user in case you are adding a Native application, or to the application in case you are adding a Web app/API.

Creating a custom role Custom Role creation in Azure Portal is an asynchronous operation. This means that a time lag may take place.

...

Cloudaware may regularly introduce new capabilities which require addition of new actions and permissions. In cases a Cloudaware custom role Role already exists, you can update this role Role without updating it for every subscription. If updating an existing Cloudaware Custom Policy role Role is required, your Technical Account manager will provide you with instructions on how to perform this action.

Creating a custom role Custom Role creation in Azure Portal is an asynchronous operation. This means that a time lag may take place between the creation of a role Role and time when this role Role becomes available.