Back to Operation

Kubernetes Cluster - Azure Arc Onboarding

Azure Built-in Role

Role Information

Details and metadata

Role ID
34e09817-6cbe-4d01-b1a2-e0eac5743d41
Type
BuiltInRole
Last Updated (Azure)
2024-11-06 16:01:19

Change History

Track all modifications to this role since 2025-12-15 01:08:16+00:00

2024-11-06 16:01:19 Initial Scan
View details
{
  "properties": {
    "roleName": "Kubernetes Cluster - Azure Arc Onboarding",
    "type": "BuiltInRole",
    "description": "Role definition to authorize any user/service to create connectedClusters resource",
    "assignableScopes": [
      "/"
    ],
    "permissions": [
      {
        "actions": [
          "Microsoft.Authorization/*/read",
          "Microsoft.Insights/alertRules/*",
          "Microsoft.Resources/deployments/write",
          "Microsoft.Resources/subscriptions/operationresults/read",
          "Microsoft.Resources/subscriptions/read",
          "Microsoft.Resources/subscriptions/resourceGroups/read",
          "Microsoft.Kubernetes/connectedClusters/Write",
          "Microsoft.Kubernetes/connectedClusters/read",
          "Microsoft.KubernetesConfiguration/extensions/write",
          "Microsoft.KubernetesConfiguration/extensions/read",
          "Microsoft.KubernetesConfiguration/extensions/delete",
          "Microsoft.KubernetesConfiguration/extensions/operations/read",
          "Microsoft.Support/*"
        ],
        "notActions": [],
        "dataActions": [],
        "notDataActions": []
      }
    ],
    "createdOn": "2019-11-18T17:00:02.208Z",
    "updatedOn": "2024-11-06T16:01:19.796Z",
    "createdBy": null,
    "updatedBy": null
  },
  "id": "/providers/Microsoft.Authorization/roleDefinitions/34e09817-6cbe-4d01-b1a2-e0eac5743d41",
  "type": "Microsoft.Authorization/roleDefinitions",
  "name": "34e09817-6cbe-4d01-b1a2-e0eac5743d41"
}

Latest Role JSON

Raw definition from Azure

{
  "properties": {
    "roleName": "Kubernetes Cluster - Azure Arc Onboarding",
    "type": "BuiltInRole",
    "description": "Role definition to authorize any user/service to create connectedClusters resource",
    "assignableScopes": [
      "/"
    ],
    "permissions": [
      {
        "actions": [
          "Microsoft.Authorization/*/read",
          "Microsoft.Insights/alertRules/*",
          "Microsoft.Resources/deployments/write",
          "Microsoft.Resources/subscriptions/operationresults/read",
          "Microsoft.Resources/subscriptions/read",
          "Microsoft.Resources/subscriptions/resourceGroups/read",
          "Microsoft.Kubernetes/connectedClusters/Write",
          "Microsoft.Kubernetes/connectedClusters/read",
          "Microsoft.KubernetesConfiguration/extensions/write",
          "Microsoft.KubernetesConfiguration/extensions/read",
          "Microsoft.KubernetesConfiguration/extensions/delete",
          "Microsoft.KubernetesConfiguration/extensions/operations/read",
          "Microsoft.Support/*"
        ],
        "notActions": [],
        "dataActions": [],
        "notDataActions": []
      }
    ],
    "createdOn": "2019-11-18T17:00:02.208Z",
    "updatedOn": "2024-11-06T16:01:19.796Z",
    "createdBy": null,
    "updatedBy": null
  },
  "id": "/providers/Microsoft.Authorization/roleDefinitions/34e09817-6cbe-4d01-b1a2-e0eac5743d41",
  "type": "Microsoft.Authorization/roleDefinitions",
  "name": "34e09817-6cbe-4d01-b1a2-e0eac5743d41"
}

Effective Permissions

Operations granted by this role (59 total)

Permission Patterns (from role definition)

Actions 13 patterns
Microsoft.Authorization/*/read Microsoft.Insights/alertRules/* Microsoft.Resources/deployments/write Microsoft.Resources/subscriptions/operationresults/read Microsoft.Resources/subscriptions/read Microsoft.Resources/subscriptions/resourceGroups/read Microsoft.Kubernetes/connectedClusters/Write Microsoft.Kubernetes/connectedClusters/read Microsoft.KubernetesConfiguration/extensions/write Microsoft.KubernetesConfiguration/extensions/read Microsoft.KubernetesConfiguration/extensions/delete Microsoft.KubernetesConfiguration/extensions/operations/read Microsoft.Support/*

Control Plane Operations (59)

Data Plane Operations (0)

No data plane operations granted