Operation Information
Details and metadata
Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read
Roles Allowing This Operation
17 roles grant this permission
| Role Name | Note |
|---|---|
|
Avere Contributor
4f8fab4f-1852-4a58-a46a-8eaf358af14a
|
— |
|
Avere Operator
c025889f-8102-4ebf-b32c-fc0c6f0c6bd9
|
— |
|
Azure Center for SAP solutions administrator
7b0c7e81-271f-4c71-90bf-e30bdfdbc2f7
|
— |
|
Azure Red Hat OpenShift Image Registry Operator
8b32b316-c2f5-4ddf-b05b-83dacd2d08b5
|
— |
|
CosmosDB Fleet Analytics Storage Data Writer
bf41e52e-617f-4981-8b7a-47431bd4e011
|
— |
|
Defender for Storage Data Scanner
1e7ca9b1-60d1-4db8-a914-f2ca1ff27c40
|
— |
|
Defender Sensitive Data Discovery
0b6ca2e8-2cdc-4bd6-b896-aa3d8c21fc35
|
— |
|
MySQL User Data Reader
abed7cd4-f358-4384-9d17-def9303b3b53
|
— |
|
MySQL User Data Writer
8894c184-eeb6-45cc-868a-1be782055af3
|
— |
|
Quantum Workspace Owner
30b3bcf2-670a-4bdc-8669-7e0ae0c0dfda
|
— |
Note: This list includes roles where the operation is allowed by the role's actions or dataActions patterns,
excluding any patterns in notActions or notDataActions.
Wildcard patterns (like */read or *) are expanded to match this specific operation.