Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info

The Azure built-in role "Reader" may not have required permissions for Cloudaware, for example, it has no default access to the Storage Account keys which are required for collecting data about VHDs, therefore a custom role should be created.

...

5. Open the tab 'Review + Create'. Check the role details and click Create.

Custom Role For Tagging
Anchor
#Custom-role-for-tagging
#Custom-role-for-tagging

Another use case for creating a custom role is a necessity to provide Cloudaware with minimum permissions for tagging Azure resources.

Code Block
"properties": {
        "roleName": "{your-Role-name}",
        "description": "{your-Role-description}",
        "assignableScopes": [
            "/subscriptions/{subscription-id}",
        ],
        "permissions": [
            {
                "actions": [
                    "Microsoft.Resources/subscriptions/tagNames/read",
                    "Microsoft.Resources/subscriptions/tagNames/write",
                    "Microsoft.Resources/subscriptions/tagNames/delete",
                    "Microsoft.Resources/subscriptions/tagNames/tagValues/read",
                    "Microsoft.Resources/subscriptions/tagNames/tagValues/write",
                    "Microsoft.Resources/subscriptions/tagNames/tagValues/delete",
                    "Microsoft.Resources/subscriptions/resourceGroups/read",
                    "Microsoft.Resources/tags/write",
                    "Microsoft.Resources/tags/delete",
                    "Microsoft.Resources/tags/read"
                ],
                "notActions": [],
                "dataActions": [],
                "notDataActions": []
            }
        ]
    }

ReplaceĀ {your-Role-name}, {your-Role-description} and {subscription-id} with corresponding values from your Azure environment.

Update an Existing Cloudaware Custom Policy

...