Role Information
Details and metadata
00493d72-78f6-4148-b6c5-d3ce8e4799dd
Change History
Track all modifications to this role since 2025-12-15 01:08:16+00:00
Updated On
Event Type
Summary & Details
2025-12-14 23:49:13
Initial Scan
Show full JSON
{
"properties": {
"roleName": "Azure Arc Enabled Kubernetes Cluster User Role",
"type": "BuiltInRole",
"description": "List cluster user credentials action.",
"assignableScopes": [
"/"
],
"permissions": [
{
"actions": [
"Microsoft.Resources/deployments/write",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action",
"Microsoft.Authorization/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Support/*",
"Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"createdOn": "2020-07-28T17:37:00.763Z",
"updatedOn": "2022-02-17T02:29:05.1Z",
"createdBy": null,
"updatedBy": null
},
"id": "/providers/Microsoft.Authorization/roleDefinitions/00493d72-78f6-4148-b6c5-d3ce8e4799dd",
"type": "Microsoft.Authorization/roleDefinitions",
"name": "00493d72-78f6-4148-b6c5-d3ce8e4799dd"
}
2025-12-14 23:49:13
Initial Scan
View details
{
"properties": {
"roleName": "Azure Arc Enabled Kubernetes Cluster User Role",
"type": "BuiltInRole",
"description": "List cluster user credentials action.",
"assignableScopes": [
"/"
],
"permissions": [
{
"actions": [
"Microsoft.Resources/deployments/write",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action",
"Microsoft.Authorization/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Support/*",
"Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"createdOn": "2020-07-28T17:37:00.763Z",
"updatedOn": "2022-02-17T02:29:05.1Z",
"createdBy": null,
"updatedBy": null
},
"id": "/providers/Microsoft.Authorization/roleDefinitions/00493d72-78f6-4148-b6c5-d3ce8e4799dd",
"type": "Microsoft.Authorization/roleDefinitions",
"name": "00493d72-78f6-4148-b6c5-d3ce8e4799dd"
}
Latest Role JSON
Raw definition from Azure
{
"properties": {
"roleName": "Azure Arc Enabled Kubernetes Cluster User Role",
"type": "BuiltInRole",
"description": "List cluster user credentials action.",
"assignableScopes": [
"/"
],
"permissions": [
{
"actions": [
"Microsoft.Resources/deployments/write",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action",
"Microsoft.Authorization/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Support/*",
"Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"createdOn": "2020-07-28T17:37:00.763Z",
"updatedOn": "2022-02-17T02:29:05.1Z",
"createdBy": null,
"updatedBy": null
},
"id": "/providers/Microsoft.Authorization/roleDefinitions/00493d72-78f6-4148-b6c5-d3ce8e4799dd",
"type": "Microsoft.Authorization/roleDefinitions",
"name": "00493d72-78f6-4148-b6c5-d3ce8e4799dd"
}
Effective Permissions
Operations granted by this role (56 total)
Permission Patterns (from role definition)
Actions
9 patterns
Microsoft.Resources/deployments/write
Microsoft.Resources/subscriptions/operationresults/read
Microsoft.Resources/subscriptions/read
Microsoft.Resources/subscriptions/resourceGroups/read
Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action
Microsoft.Authorization/*/read
Microsoft.Insights/alertRules/*
Microsoft.Support/*
Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action
Control Plane Operations (56)
No matching operations
/ shown
Data Plane Operations (0)
No data plane operations granted