Back to Operation

Azure Migrate Execute Expert

Azure Built-in Role

Role Information

Details and metadata

Role ID
1cfa4eac-9a23-481c-a793-bfb6958e836b
Type
BuiltInRole
Last Updated (Azure)
2025-10-27 15:01:02

Change History

Track all modifications to this role since 2025-12-15 01:08:16+00:00

2025-10-27 15:01:02 Initial Scan
View details
{
  "properties": {
    "roleName": "Azure Migrate Execute Expert",
    "type": "BuiltInRole",
    "description": "Grants restricted access on an Azure Migrate project to only perform migration related operations, including replication, execution of test migrations, tracking and monitoring of migration progress, and initiation of agentless and agent-based migrations.",
    "assignableScopes": [
      "/"
    ],
    "permissions": [
      {
        "actions": [
          "Microsoft.Resources/subscriptions/resourceGroups/read",
          "Microsoft.Resources/subscriptions/read",
          "Microsoft.Resources/deployments/*",
          "Microsoft.Resources/subscriptions/resourceGroups/write",
          "Microsoft.Resources/subscriptions/locations/read",
          "Microsoft.Resources/checkResourceName/action",
          "Microsoft.Resources/deploymentScripts/write",
          "Microsoft.Resources/deploymentScripts/read",
          "Microsoft.Resources/links/write",
          "Microsoft.Authorization/*/read",
          "Microsoft.Authorization/locks/write",
          "Microsoft.Authorization/locks/delete",
          "Microsoft.Insights/alertRules/*",
          "Microsoft.Migrate/*/read",
          "Microsoft.ApplicationMigration/*/read",
          "Microsoft.OffAzure/*/read",
          "Microsoft.MySQLDiscovery/*/read",
          "Microsoft.Support/*",
          "Microsoft.Network/networkInterfaces/read",
          "Microsoft.Network/networkInterfaces/write",
          "Microsoft.Network/networkInterfaces/delete",
          "Microsoft.Network/virtualNetworks/read",
          "Microsoft.Network/virtualNetworks/subnets/read",
          "Microsoft.Storage/storageAccounts/*/read",
          "Microsoft.Storage/storageAccounts/*/write",
          "Microsoft.Storage/storageAccounts/listKeys/action",
          "Microsoft.Compute/register/action",
          "Microsoft.Compute/availabilitySets/read",
          "Microsoft.Compute/availabilitySets/vmSizes/read",
          "Microsoft.Compute/diskEncryptionSets/read",
          "Microsoft.Compute/skus/read",
          "Microsoft.Compute/disks/read",
          "Microsoft.Compute/disks/write",
          "Microsoft.Compute/disks/delete",
          "Microsoft.Compute/virtualMachines/read",
          "Microsoft.Compute/virtualMachines/write",
          "Microsoft.Compute/virtualMachines/delete",
          "Microsoft.RecoveryServices/vaults/*",
          "Microsoft.RecoveryServices/register/action",
          "Microsoft.RecoveryServices/operations/read",
          "Microsoft.Resources/links/read",
          "Microsoft.DependencyMap/*/read",
          "Microsoft.DependencyMap/maps/*/action"
        ],
        "notActions": [
          "Microsoft.OffAzure/hypervSites/machines/inventoryinsights/pendingupdates/*",
          "Microsoft.OffAzure/hypervSites/machines/inventoryinsights/vulnerabilities/*",
          "Microsoft.OffAzure/serverSites/machines/inventoryinsights/pendingupdates/*",
          "Microsoft.OffAzure/serverSites/machines/inventoryinsights/vulnerabilities/*",
          "Microsoft.OffAzure/vmwareSites/machines/inventoryinsights/vulnerabilities/*",
          "Microsoft.OffAzure/vmwareSites/machines/inventoryinsights/pendingupdates/*"
        ],
        "dataActions": [],
        "notDataActions": []
      },
      {
        "actions": [
          "Microsoft.Authorization/roleAssignments/write",
          "Microsoft.Authorization/roleAssignments/delete"
        ],
        "notActions": [],
        "dataActions": [],
        "notDataActions": [],
        "Condition": "((!(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{17d1049b-9a84-46fb-8f53-869881c3d3ab, ba92f5b4-2d11-453d-a403-e96b0029c9fe})) AND ((!(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{17d1049b-9a84-46fb-8f53-869881c3d3ab, ba92f5b4-2d11-453d-a403-e96b0029c9fe}))",
        "ConditionVersion": "2.0"
      }
    ],
    "createdOn": "2025-09-09T09:16:16.87Z",
    "updatedOn": "2025-10-27T15:01:02.964Z",
    "createdBy": null,
    "updatedBy": null
  },
  "id": "/providers/Microsoft.Authorization/roleDefinitions/1cfa4eac-9a23-481c-a793-bfb6958e836b",
  "type": "Microsoft.Authorization/roleDefinitions",
  "name": "1cfa4eac-9a23-481c-a793-bfb6958e836b"
}

Latest Role JSON

Raw definition from Azure

{
  "properties": {
    "roleName": "Azure Migrate Execute Expert",
    "type": "BuiltInRole",
    "description": "Grants restricted access on an Azure Migrate project to only perform migration related operations, including replication, execution of test migrations, tracking and monitoring of migration progress, and initiation of agentless and agent-based migrations.",
    "assignableScopes": [
      "/"
    ],
    "permissions": [
      {
        "actions": [
          "Microsoft.Resources/subscriptions/resourceGroups/read",
          "Microsoft.Resources/subscriptions/read",
          "Microsoft.Resources/deployments/*",
          "Microsoft.Resources/subscriptions/resourceGroups/write",
          "Microsoft.Resources/subscriptions/locations/read",
          "Microsoft.Resources/checkResourceName/action",
          "Microsoft.Resources/deploymentScripts/write",
          "Microsoft.Resources/deploymentScripts/read",
          "Microsoft.Resources/links/write",
          "Microsoft.Authorization/*/read",
          "Microsoft.Authorization/locks/write",
          "Microsoft.Authorization/locks/delete",
          "Microsoft.Insights/alertRules/*",
          "Microsoft.Migrate/*/read",
          "Microsoft.ApplicationMigration/*/read",
          "Microsoft.OffAzure/*/read",
          "Microsoft.MySQLDiscovery/*/read",
          "Microsoft.Support/*",
          "Microsoft.Network/networkInterfaces/read",
          "Microsoft.Network/networkInterfaces/write",
          "Microsoft.Network/networkInterfaces/delete",
          "Microsoft.Network/virtualNetworks/read",
          "Microsoft.Network/virtualNetworks/subnets/read",
          "Microsoft.Storage/storageAccounts/*/read",
          "Microsoft.Storage/storageAccounts/*/write",
          "Microsoft.Storage/storageAccounts/listKeys/action",
          "Microsoft.Compute/register/action",
          "Microsoft.Compute/availabilitySets/read",
          "Microsoft.Compute/availabilitySets/vmSizes/read",
          "Microsoft.Compute/diskEncryptionSets/read",
          "Microsoft.Compute/skus/read",
          "Microsoft.Compute/disks/read",
          "Microsoft.Compute/disks/write",
          "Microsoft.Compute/disks/delete",
          "Microsoft.Compute/virtualMachines/read",
          "Microsoft.Compute/virtualMachines/write",
          "Microsoft.Compute/virtualMachines/delete",
          "Microsoft.RecoveryServices/vaults/*",
          "Microsoft.RecoveryServices/register/action",
          "Microsoft.RecoveryServices/operations/read",
          "Microsoft.Resources/links/read",
          "Microsoft.DependencyMap/*/read",
          "Microsoft.DependencyMap/maps/*/action"
        ],
        "notActions": [
          "Microsoft.OffAzure/hypervSites/machines/inventoryinsights/pendingupdates/*",
          "Microsoft.OffAzure/hypervSites/machines/inventoryinsights/vulnerabilities/*",
          "Microsoft.OffAzure/serverSites/machines/inventoryinsights/pendingupdates/*",
          "Microsoft.OffAzure/serverSites/machines/inventoryinsights/vulnerabilities/*",
          "Microsoft.OffAzure/vmwareSites/machines/inventoryinsights/vulnerabilities/*",
          "Microsoft.OffAzure/vmwareSites/machines/inventoryinsights/pendingupdates/*"
        ],
        "dataActions": [],
        "notDataActions": []
      },
      {
        "actions": [
          "Microsoft.Authorization/roleAssignments/write",
          "Microsoft.Authorization/roleAssignments/delete"
        ],
        "notActions": [],
        "dataActions": [],
        "notDataActions": [],
        "Condition": "((!(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{17d1049b-9a84-46fb-8f53-869881c3d3ab, ba92f5b4-2d11-453d-a403-e96b0029c9fe})) AND ((!(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{17d1049b-9a84-46fb-8f53-869881c3d3ab, ba92f5b4-2d11-453d-a403-e96b0029c9fe}))",
        "ConditionVersion": "2.0"
      }
    ],
    "createdOn": "2025-09-09T09:16:16.87Z",
    "updatedOn": "2025-10-27T15:01:02.964Z",
    "createdBy": null,
    "updatedBy": null
  },
  "id": "/providers/Microsoft.Authorization/roleDefinitions/1cfa4eac-9a23-481c-a793-bfb6958e836b",
  "type": "Microsoft.Authorization/roleDefinitions",
  "name": "1cfa4eac-9a23-481c-a793-bfb6958e836b"
}

Effective Permissions

Operations granted by this role (666 total)

Conditional Permissions

This role has conditions that may restrict effective permissions based on context (e.g., resource attributes, request properties).

Permission Patterns (from role definition)

Actions 45 patterns
Microsoft.Resources/subscriptions/resourceGroups/read Microsoft.Resources/subscriptions/read Microsoft.Resources/deployments/* Microsoft.Resources/subscriptions/resourceGroups/write Microsoft.Resources/subscriptions/locations/read Microsoft.Resources/checkResourceName/action Microsoft.Resources/deploymentScripts/write Microsoft.Resources/deploymentScripts/read Microsoft.Resources/links/write Microsoft.Authorization/*/read Microsoft.Authorization/locks/write Microsoft.Authorization/locks/delete Microsoft.Insights/alertRules/* Microsoft.Migrate/*/read Microsoft.ApplicationMigration/*/read Microsoft.OffAzure/*/read Microsoft.MySQLDiscovery/*/read Microsoft.Support/* Microsoft.Network/networkInterfaces/read Microsoft.Network/networkInterfaces/write Microsoft.Network/networkInterfaces/delete Microsoft.Network/virtualNetworks/read Microsoft.Network/virtualNetworks/subnets/read Microsoft.Storage/storageAccounts/*/read Microsoft.Storage/storageAccounts/*/write Microsoft.Storage/storageAccounts/listKeys/action Microsoft.Compute/register/action Microsoft.Compute/availabilitySets/read Microsoft.Compute/availabilitySets/vmSizes/read Microsoft.Compute/diskEncryptionSets/read Microsoft.Compute/skus/read Microsoft.Compute/disks/read Microsoft.Compute/disks/write Microsoft.Compute/disks/delete Microsoft.Compute/virtualMachines/read Microsoft.Compute/virtualMachines/write Microsoft.Compute/virtualMachines/delete Microsoft.RecoveryServices/vaults/* Microsoft.RecoveryServices/register/action Microsoft.RecoveryServices/operations/read Microsoft.Resources/links/read Microsoft.DependencyMap/*/read Microsoft.DependencyMap/maps/*/action Microsoft.Authorization/roleAssignments/write Microsoft.Authorization/roleAssignments/delete
NotActions (excluded)
Microsoft.OffAzure/hypervSites/machines/inventoryinsights/pendingupdates/* Microsoft.OffAzure/hypervSites/machines/inventoryinsights/vulnerabilities/* Microsoft.OffAzure/serverSites/machines/inventoryinsights/pendingupdates/* Microsoft.OffAzure/serverSites/machines/inventoryinsights/vulnerabilities/* Microsoft.OffAzure/vmwareSites/machines/inventoryinsights/vulnerabilities/* Microsoft.OffAzure/vmwareSites/machines/inventoryinsights/pendingupdates/*

Control Plane Operations (666)

Data Plane Operations (0)

No data plane operations granted