Role Information
Details and metadata
82c6a823-ae9c-4b90-b5c5-bff581c45896
Change History
Track all modifications to this role since 2025-12-15 01:08:16+00:00
Updated On
Event Type
Summary & Details
2025-11-04 16:13:15
Created
Show full JSON diff
+ {
+ "properties": {
+ "roleName": "Azure Resilience Management Drills Target Resource Contributor",
+ "type": "BuiltInRole",
+ "description": "This role should be assigned at the Service Group Members scope to enable resource read access and configure chaos targets and capabilities for fault injection, failover, and other post-fault actions",
+ "assignableScopes": [
+ "/"
+ ],
+ "permissions": [
+ {
+ "actions": [
+ "*/read",
+ "Microsoft.Authorization/*/read",
+ "Microsoft.Chaos/locations/targetTypes/capabilityTypes/read",
+ "Microsoft.Chaos/locations/targetTypes/read",
+ "Microsoft.Chaos/targets/capabilities/delete",
+ "Microsoft.Chaos/targets/capabilities/read",
+ "Microsoft.Chaos/targets/capabilities/write",
+ "Microsoft.Chaos/targets/delete",
+ "Microsoft.Chaos/targets/read",
+ "Microsoft.Chaos/targets/write",
+ "Microsoft.Network/networkSecurityGroups/read",
+ "Microsoft.Network/virtualNetworks/read ",
+ "Microsoft.Sql/managedInstances/read",
+ "Microsoft.Web/serverfarms/read",
+ "Microsoft.Web/sites/read"
+ ],
+ "notActions": [],
+ "dataActions": [],
+ "notDataActions": []
+ }
+ ],
+ "createdOn": "2025-11-04T16:13:15.888Z",
+ "updatedOn": "2025-11-04T16:13:15.888Z",
+ "createdBy": null,
+ "updatedBy": null
+ },
+ "id": "/providers/Microsoft.Authorization/roleDefinitions/82c6a823-ae9c-4b90-b5c5-bff581c45896",
+ "type": "Microsoft.Authorization/roleDefinitions",
+ "name": "82c6a823-ae9c-4b90-b5c5-bff581c45896"
+ }
2025-11-04 16:13:15
Created
View details
+ {
+ "properties": {
+ "roleName": "Azure Resilience Management Drills Target Resource Contributor",
+ "type": "BuiltInRole",
+ "description": "This role should be assigned at the Service Group Members scope to enable resource read access and configure chaos targets and capabilities for fault injection, failover, and other post-fault actions",
+ "assignableScopes": [
+ "/"
+ ],
+ "permissions": [
+ {
+ "actions": [
+ "*/read",
+ "Microsoft.Authorization/*/read",
+ "Microsoft.Chaos/locations/targetTypes/capabilityTypes/read",
+ "Microsoft.Chaos/locations/targetTypes/read",
+ "Microsoft.Chaos/targets/capabilities/delete",
+ "Microsoft.Chaos/targets/capabilities/read",
+ "Microsoft.Chaos/targets/capabilities/write",
+ "Microsoft.Chaos/targets/delete",
+ "Microsoft.Chaos/targets/read",
+ "Microsoft.Chaos/targets/write",
+ "Microsoft.Network/networkSecurityGroups/read",
+ "Microsoft.Network/virtualNetworks/read ",
+ "Microsoft.Sql/managedInstances/read",
+ "Microsoft.Web/serverfarms/read",
+ "Microsoft.Web/sites/read"
+ ],
+ "notActions": [],
+ "dataActions": [],
+ "notDataActions": []
+ }
+ ],
+ "createdOn": "2025-11-04T16:13:15.888Z",
+ "updatedOn": "2025-11-04T16:13:15.888Z",
+ "createdBy": null,
+ "updatedBy": null
+ },
+ "id": "/providers/Microsoft.Authorization/roleDefinitions/82c6a823-ae9c-4b90-b5c5-bff581c45896",
+ "type": "Microsoft.Authorization/roleDefinitions",
+ "name": "82c6a823-ae9c-4b90-b5c5-bff581c45896"
+ }
Latest Role JSON
Raw definition from Azure
{
"properties": {
"roleName": "Azure Resilience Management Drills Target Resource Contributor",
"type": "BuiltInRole",
"description": "This role should be assigned at the Service Group Members scope to enable resource read access and configure chaos targets and capabilities for fault injection, failover, and other post-fault actions",
"assignableScopes": [
"/"
],
"permissions": [
{
"actions": [
"*/read",
"Microsoft.Authorization/*/read",
"Microsoft.Chaos/locations/targetTypes/capabilityTypes/read",
"Microsoft.Chaos/locations/targetTypes/read",
"Microsoft.Chaos/targets/capabilities/delete",
"Microsoft.Chaos/targets/capabilities/read",
"Microsoft.Chaos/targets/capabilities/write",
"Microsoft.Chaos/targets/delete",
"Microsoft.Chaos/targets/read",
"Microsoft.Chaos/targets/write",
"Microsoft.Network/networkSecurityGroups/read",
"Microsoft.Network/virtualNetworks/read ",
"Microsoft.Sql/managedInstances/read",
"Microsoft.Web/serverfarms/read",
"Microsoft.Web/sites/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"createdOn": "2025-11-04T16:13:15.888Z",
"updatedOn": "2025-11-04T16:13:15.888Z",
"createdBy": null,
"updatedBy": null
},
"id": "/providers/Microsoft.Authorization/roleDefinitions/82c6a823-ae9c-4b90-b5c5-bff581c45896",
"type": "Microsoft.Authorization/roleDefinitions",
"name": "82c6a823-ae9c-4b90-b5c5-bff581c45896"
}
Effective Permissions
Operations granted by this role (7488 total)
Permission Patterns (from role definition)
Actions
15 patterns
*/read
Microsoft.Authorization/*/read
Microsoft.Chaos/locations/targetTypes/capabilityTypes/read
Microsoft.Chaos/locations/targetTypes/read
Microsoft.Chaos/targets/capabilities/delete
Microsoft.Chaos/targets/capabilities/read
Microsoft.Chaos/targets/capabilities/write
Microsoft.Chaos/targets/delete
Microsoft.Chaos/targets/read
Microsoft.Chaos/targets/write
Microsoft.Network/networkSecurityGroups/read
Microsoft.Network/virtualNetworks/read
Microsoft.Sql/managedInstances/read
Microsoft.Web/serverfarms/read
Microsoft.Web/sites/read
Control Plane Operations (7488)
No matching operations
/ shown
Data Plane Operations (0)
No data plane operations granted