Back to Operations

Create role assignment

Microsoft Authorization

Operation Information

Details and metadata

Operation Name
Microsoft.Authorization/roleAssignments/write
Display Name
Create role assignment
Description
Create a role assignment at the specified scope.
Operation Type
Control Plane
Provider
Microsoft Authorization
Resource Type
Role assignment

Roles Allowing This Operation

37 roles grant this permission

Role Name Actions Data Actions Note
Azure AI Account Owner
e47c6f54-e4a2-4754-9501-8e0985b135e1
205 0 Conditional This role has conditions that may restrict this permission
Azure AI Project Manager
eadc314b-1a2d-4efa-be10-5d325db5065e
102 1,578 Conditional This role has conditions that may restrict this permission
Azure Container Storage Contributor
95dd08a6-00bd-4661-84bf-f6726f83a4d0
61 0 Conditional This role has conditions that may restrict this permission
Azure Container Storage Owner
95de85bd-744d-4664-9dde-11430bc34793
86 0 Conditional This role has conditions that may restrict this permission
Azure Databases ARM Management Contributor
b7ef99e8-10af-4a7c-8b15-5b6c352a8378
355 0 Conditional This role has conditions that may restrict this permission
Azure File Sync Administrator
92b92042-07d9-4307-87f7-36a593fc5850
108 0 Conditional This role has conditions that may restrict this permission
Azure IoT Operations Onboarding
7b7c71ed-33fa-4ed2-a91a-e56d5da260b5
120 0
Azure Migrate Execute Expert
1cfa4eac-9a23-481c-a793-bfb6958e836b
666 0 Conditional This role has conditions that may restrict this permission
Azure Migrate Management Role
c20ab07d-648c-4fed-977e-f917d8095dfc
51 0 Conditional This role has conditions that may restrict this permission
Azure Migrate Owner
fd8ea4d5-6509-4db0-bada-356ab233b4fa
1,132 0 Conditional This role has conditions that may restrict this permission
Azure Resilience Management Drills Administrator
c914561b-1575-4601-af9c-a1356bf59818
68 0
Azure Resilience Management Drills Assets Administrator
5a2ec2f1-2375-4950-9906-59ec1d979249
46 0
Azure Resilience Management Drills Target Resource Administrator
e4c7f620-39b8-4688-bba2-70dd82ef367b
7,489 0
Azure Resilience Management Goals Administrator
a2b7cc47-30ec-462f-a2f4-9ac6e1c266af
42 0
Azure Resilience Management Recovery Administrator
481d9636-d9f0-468b-b93d-6056318e6f36
64 0
Azure Resilience Management Recovery Contributor
4c7fd853-7345-4453-babd-e9481e9b460b
64 0
Azure Sphere Owner
5a382001-fe36-41ff-bba4-8bf06bd54da9
105 0
Azure Stack HCI Administrator
bda0d508-adf1-4af0-9c28-88919fc3ae06
261 0 Conditional This role has conditions that may restrict this permission
Defender CSPM Storage Scanner Operator
8480c0f0-4509-4229-9339-7c10018cb8c4
61 0
Defender for Storage Scanner Operator
0f641de8-0b88-4198-bdef-bd8b45ceba96
71 0 Conditional This role has conditions that may restrict this permission
DevCenter Owner
4c6569b6-f23e-4295-9b90-bd4cc4ff3292
125 0 Conditional This role has conditions that may restrict this permission
Fabric Resource Management Administrator
337a31c1-4e14-4ef9-83ed-584bb8d2b70a
4,565 0 Conditional This role has conditions that may restrict this permission
Foundational RP Contributor
c840cbbc-8508-4228-b700-ec6522a74314
88 0
Key Vault Data Access Administrator
8b54135c-b56d-4d72-a534-26097cfdc8d8
68 0 Conditional This role has conditions that may restrict this permission
Microsoft Defender for Cloud administrator (preview)
87a87389-f3af-4c43-a694-f6e5efec8582
260 0 Conditional This role has conditions that may restrict this permission
Microsoft Discovery Platform Administrator (Preview)
7a2b6e6c-472e-4b39-8878-a26eb63d75c6
107 15 Conditional This role has conditions that may restrict this permission
MySQL Access Administrator
24208841-77f2-463a-ab3d-f8343716e8af
44 0 Conditional This role has conditions that may restrict this permission
Owner
8e3af657-a8ff-443c-a75c-2fe8c4bcb635
17,549 0
PostgreSQL Flexible Management Contributor
cc3c084f-9a2e-4664-b2bc-47a6685a5f99
198 3 Conditional This role has conditions that may restrict this permission
Quantum Workspace Owner
30b3bcf2-670a-4bdc-8669-7e0ae0c0dfda
91 3
Reservations Administrator
a8889054-8d42-49c9-bc1c-52486c10e7cd
42 0
Role Based Access Control Administrator
f58310d9-a9f6-439a-9e8d-f62e7b41a168
7,492 0
Savings plan Administrator
182a574c-b3c6-4acc-b019-48ae44cd4677
9 0 Conditional This role has conditions that may restrict this permission
Storage Actions Task Assignment Contributor
77789c21-1643-48a2-8f27-47f858540b51
57 0 Conditional This role has conditions that may restrict this permission
User Access Administrator
18d7d88d-d35e-4fb5-a5c3-7773c20a72d9
7,538 0
UserAccessAdministrator for AzureJIT
5a966030-d6b2-4d2c-ba61-dbcf2f426586
7,487 0 Conditional This role has conditions that may restrict this permission
Virtual Machine Data Access Administrator (preview)
66f75aeb-eabe-4b70-9f1e-c350c4c9ad04
81 0 Conditional This role has conditions that may restrict this permission

Note: This list includes roles where the operation is allowed by the role's actions or dataActions patterns, excluding any patterns in notActions or notDataActions. Wildcard patterns (like */read or *) are expanded to match this specific operation.