Operation Information
Details and metadata
Microsoft.Compute/diskEncryptionSets/read
Roles Allowing This Operation
36 roles grant this permission
| Role Name | Note |
|---|---|
|
App Compliance Automation Administrator
0f37683f-2463-46b6-9ce7-9b788b988ba2
|
— |
|
App Compliance Automation Reader
ffc6bbe0-e443-4c3b-bf54-26581bb2f78e
|
— |
|
Avere Contributor
4f8fab4f-1852-4a58-a46a-8eaf358af14a
|
— |
|
Azure Batch Service Orchestration Role
a35466a1-cfd6-450a-b35e-683fcdf30363
|
— |
|
Azure Kubernetes Service Policy Add-on Deployment
18ed5180-3e48-46fd-8541-4ea054d57064
|
— |
|
Azure Migrate Execute Expert
1cfa4eac-9a23-481c-a793-bfb6958e836b
|
— |
|
Azure Migrate Owner
fd8ea4d5-6509-4db0-bada-356ab233b4fa
|
— |
|
Azure Red Hat OpenShift Disk Storage Operator
5b7237c5-45e1-49d6-bc18-a1f62f400748
|
— |
|
Azure Red Hat OpenShift Hosted Control Planes Cluster API Provider
88366f10-ed47-4cc0-9fab-c8a06148393e
|
— |
|
Azure Red Hat OpenShift Machine API Operator
0358943c-7e01-48ba-8889-02cc51d78637
|
— |
Note: This list includes roles where the operation is allowed by the role's actions or dataActions patterns,
excluding any patterns in notActions or notDataActions.
Wildcard patterns (like */read or *) are expanded to match this specific operation.