Back to Operations

Get private link resources

Microsoft Key Vault

Operation Information

Details and metadata

Operation Name
Microsoft.KeyVault/vaults/privateLinkResources/read
Display Name
Get private link resources
Description
Get the available private link resources for the specified instance of Key Vault
Operation Type
Control Plane
Provider
Microsoft Key Vault
Resource Type
Key Vault

Roles Allowing This Operation

35 roles grant this permission

Role Name Actions Data Actions Note
App Compliance Automation Administrator
0f37683f-2463-46b6-9ce7-9b788b988ba2
7,522 0
App Compliance Automation Reader
ffc6bbe0-e443-4c3b-bf54-26581bb2f78e
7,484 0
Azure AI Administrator
b78c5d69-af96-48a3-bf8d-a8b4d589de94
1,313 0
Azure AI Enterprise Network Connection Approver
b556d68e-0be0-4f35-a333-ad7ee1ce17ea
78 0
Azure Migrate Decide and Plan Expert
7859c0b0-0bb9-4994-bd12-cd529af7d646
1,048 0
Azure Migrate Owner
fd8ea4d5-6509-4db0-bada-356ab233b4fa
1,132 0
Azure Resilience Management Drills Target Resource Administrator
e4c7f620-39b8-4688-bba2-70dd82ef367b
7,489 0
Azure Resilience Management Drills Target Resource Contributor
82c6a823-ae9c-4b90-b5c5-bff581c45896
7,488 0
Contributor
b24988ac-6180-42a0-ab88-20f7382dd24c
17,503 0
Elastic Autopilot Contributor
753ceed7-553b-434b-a2e5-78da1a8379d9
1,671 0
Key Vault Administrator
00482a5a-887f-4fb3-b363-3b7fe8e74483
78 52
Key Vault Certificates Officer
a4417e6f-fecd-4de8-b567-7b0420556985
78 13
Key Vault Contributor
f25e0fa2-a7c8-4377-a976-54943a77a395
105 0
Key Vault Crypto Officer
14b46e9e-c2b7-41b4-b07b-48a6ebf60603
78 19
Key Vault Data Access Administrator
8b54135c-b56d-4d72-a534-26097cfdc8d8
68 0
Key Vault Reader
21090545-7ca7-4776-b22c-e363652d74d2
78 7
Key Vault Secrets Officer
b86a8fe4-44ce-4948-aee5-eccb2c155cd7
78 9
Log Analytics Contributor
92aaf0da-9dab-42b6-94a3-d43ce8d16293
7,582 0
Log Analytics Reader
73c42c96-874c-492b-b04d-ab87d138a893
7,492 0
Managed Application Contributor Role
641177b8-a67a-45b9-a033-47bc880bb21e
7,502 0
Managed Application Operator Role
c7393b34-138c-406f-901b-d8cf2b17e6ae
7,491 0
Managed Application Publisher Operator
b9331d33-8a36-4f8c-b097-4f54124fdb44
7,492 0
Monitoring Contributor
749f88d5-cbae-40b8-bcfc-e573ddc772fa
7,635 0
Monitoring Policy Contributor
47be4a87-7950-4631-9daf-b664a405f074
7,641 0
Monitoring Reader
43d0d8ad-25c7-4714-9337-8ba259a9fe05
7,491 0
MySQL Control Plane
b5207fd7-42d3-40fa-8cc6-a7e189aef39e
1,920 0
Owner
8e3af657-a8ff-443c-a75c-2fe8c4bcb635
17,549 0
Reader
acdd72a7-3385-48ef-bd42-f606fba81ae7
7,484 0
Resource Policy Contributor
36243c78-bf99-498c-9df9-86d9f8d28608
7,533 0
Role Based Access Control Administrator
f58310d9-a9f6-439a-9e8d-f62e7b41a168
7,492 0
Service Group Administrator
4e50c84c-c78e-4e37-b47e-e60ffea0a775
17,547 0
Service Group Contributor
32e6a4ec-6095-4e37-b54b-12aa350ba81f
17,547 0
Service Group Reader
de754d53-652d-4c75-a67f-1e48d8b49c97
7,484 0
User Access Administrator
18d7d88d-d35e-4fb5-a5c3-7773c20a72d9
7,538 0
UserAccessAdministrator for AzureJIT
5a966030-d6b2-4d2c-ba61-dbcf2f426586
7,487 0

Note: This list includes roles where the operation is allowed by the role's actions or dataActions patterns, excluding any patterns in notActions or notDataActions. Wildcard patterns (like */read or *) are expanded to match this specific operation.