Operation Information
Details and metadata
Microsoft.ContainerService/managedClusters/read
Roles Allowing This Operation
28 roles grant this permission
| Role Name | Note |
|---|---|
|
App Compliance Automation Administrator
0f37683f-2463-46b6-9ce7-9b788b988ba2
|
— |
|
App Compliance Automation Reader
ffc6bbe0-e443-4c3b-bf54-26581bb2f78e
|
— |
|
Azure Kubernetes Service Cluster Admin Role
0ab0b1a8-8aac-4efd-b8c2-3ee1fb270be8
|
— |
|
Azure Kubernetes Service Cluster Monitoring User
1afdec4b-e479-420e-99e7-f82237c7c5e6
|
— |
|
Azure Kubernetes Service Cluster User Role
4abbcc35-e782-43d8-92c5-2d3f1bd2253f
|
— |
|
Azure Kubernetes Service Contributor Role
ed7f3fbd-7b88-4dd4-9017-9adb7ce333f8
|
— |
|
Azure Resilience Management Drills Target Resource Administrator
e4c7f620-39b8-4688-bba2-70dd82ef367b
|
— |
|
Azure Resilience Management Drills Target Resource Contributor
82c6a823-ae9c-4b90-b5c5-bff581c45896
|
— |
|
Contributor
b24988ac-6180-42a0-ab88-20f7382dd24c
|
— |
|
Defender Kubernetes API Access
d5a2ae44-610b-4500-93be-660a0c5f5ca6
|
— |
Note: This list includes roles where the operation is allowed by the role's actions or dataActions patterns,
excluding any patterns in notActions or notDataActions.
Wildcard patterns (like */read or *) are expanded to match this specific operation.