Operation Information
Details and metadata
Microsoft.Network/dnszones/CAA/read
Roles Allowing This Operation
29 roles grant this permission
| Role Name | Note |
|---|---|
|
App Compliance Automation Administrator
0f37683f-2463-46b6-9ce7-9b788b988ba2
|
— |
|
App Compliance Automation Reader
ffc6bbe0-e443-4c3b-bf54-26581bb2f78e
|
— |
|
Avere Contributor
4f8fab4f-1852-4a58-a46a-8eaf358af14a
|
— |
|
Azure Databases ARM Management Contributor
b7ef99e8-10af-4a7c-8b15-5b6c352a8378
|
— |
|
Azure Resilience Management Drills Target Resource Administrator
e4c7f620-39b8-4688-bba2-70dd82ef367b
|
— |
|
Azure Resilience Management Drills Target Resource Contributor
82c6a823-ae9c-4b90-b5c5-bff581c45896
|
— |
|
Contributor
b24988ac-6180-42a0-ab88-20f7382dd24c
|
— |
|
DNS Zone Contributor
befefa01-2a29-4197-83a8-272ff33ce314
|
— |
|
Elastic Autopilot Contributor
753ceed7-553b-434b-a2e5-78da1a8379d9
|
— |
|
Fabric Resource Management Administrator
337a31c1-4e14-4ef9-83ed-584bb8d2b70a
|
— |
Note: This list includes roles where the operation is allowed by the role's actions or dataActions patterns,
excluding any patterns in notActions or notDataActions.
Wildcard patterns (like */read or *) are expanded to match this specific operation.