Role Information
Details and metadata
e4c7f620-39b8-4688-bba2-70dd82ef367b
Change History
Track all modifications to this role since 2025-12-15 01:08:16+00:00
Updated On
Event Type
Summary & Details
2025-11-04 16:13:15
Created
Show full JSON diff
+ {
+ "properties": {
+ "roleName": "Azure Resilience Management Drills Target Resource Administrator",
+ "type": "BuiltInRole",
+ "description": "This role should be assigned at the Service Group Members scope to enable resource read access, manage role assignments, and configure chaos targets and capabilities for fault injection, failover, and other post-fault actions",
+ "assignableScopes": [
+ "/"
+ ],
+ "permissions": [
+ {
+ "actions": [
+ "*/read",
+ "Microsoft.Authorization/*/read",
+ "Microsoft.Authorization/roleAssignments/write",
+ "Microsoft.Chaos/locations/targetTypes/capabilityTypes/read",
+ "Microsoft.Chaos/locations/targetTypes/read",
+ "Microsoft.Chaos/targets/capabilities/delete",
+ "Microsoft.Chaos/targets/capabilities/read",
+ "Microsoft.Chaos/targets/capabilities/write",
+ "Microsoft.Chaos/targets/delete",
+ "Microsoft.Chaos/targets/read",
+ "Microsoft.Chaos/targets/write",
+ "Microsoft.Network/networkSecurityGroups/read",
+ "Microsoft.Network/virtualNetworks/read ",
+ "Microsoft.Sql/managedInstances/read",
+ "Microsoft.Web/serverfarms/read",
+ "Microsoft.Web/sites/read"
+ ],
+ "notActions": [],
+ "dataActions": [],
+ "notDataActions": []
+ }
+ ],
+ "createdOn": "2025-11-04T16:13:15.877Z",
+ "updatedOn": "2025-11-04T16:13:15.877Z",
+ "createdBy": null,
+ "updatedBy": null
+ },
+ "id": "/providers/Microsoft.Authorization/roleDefinitions/e4c7f620-39b8-4688-bba2-70dd82ef367b",
+ "type": "Microsoft.Authorization/roleDefinitions",
+ "name": "e4c7f620-39b8-4688-bba2-70dd82ef367b"
+ }
2025-11-04 16:13:15
Created
View details
+ {
+ "properties": {
+ "roleName": "Azure Resilience Management Drills Target Resource Administrator",
+ "type": "BuiltInRole",
+ "description": "This role should be assigned at the Service Group Members scope to enable resource read access, manage role assignments, and configure chaos targets and capabilities for fault injection, failover, and other post-fault actions",
+ "assignableScopes": [
+ "/"
+ ],
+ "permissions": [
+ {
+ "actions": [
+ "*/read",
+ "Microsoft.Authorization/*/read",
+ "Microsoft.Authorization/roleAssignments/write",
+ "Microsoft.Chaos/locations/targetTypes/capabilityTypes/read",
+ "Microsoft.Chaos/locations/targetTypes/read",
+ "Microsoft.Chaos/targets/capabilities/delete",
+ "Microsoft.Chaos/targets/capabilities/read",
+ "Microsoft.Chaos/targets/capabilities/write",
+ "Microsoft.Chaos/targets/delete",
+ "Microsoft.Chaos/targets/read",
+ "Microsoft.Chaos/targets/write",
+ "Microsoft.Network/networkSecurityGroups/read",
+ "Microsoft.Network/virtualNetworks/read ",
+ "Microsoft.Sql/managedInstances/read",
+ "Microsoft.Web/serverfarms/read",
+ "Microsoft.Web/sites/read"
+ ],
+ "notActions": [],
+ "dataActions": [],
+ "notDataActions": []
+ }
+ ],
+ "createdOn": "2025-11-04T16:13:15.877Z",
+ "updatedOn": "2025-11-04T16:13:15.877Z",
+ "createdBy": null,
+ "updatedBy": null
+ },
+ "id": "/providers/Microsoft.Authorization/roleDefinitions/e4c7f620-39b8-4688-bba2-70dd82ef367b",
+ "type": "Microsoft.Authorization/roleDefinitions",
+ "name": "e4c7f620-39b8-4688-bba2-70dd82ef367b"
+ }
Latest Role JSON
Raw definition from Azure
{
"properties": {
"roleName": "Azure Resilience Management Drills Target Resource Administrator",
"type": "BuiltInRole",
"description": "This role should be assigned at the Service Group Members scope to enable resource read access, manage role assignments, and configure chaos targets and capabilities for fault injection, failover, and other post-fault actions",
"assignableScopes": [
"/"
],
"permissions": [
{
"actions": [
"*/read",
"Microsoft.Authorization/*/read",
"Microsoft.Authorization/roleAssignments/write",
"Microsoft.Chaos/locations/targetTypes/capabilityTypes/read",
"Microsoft.Chaos/locations/targetTypes/read",
"Microsoft.Chaos/targets/capabilities/delete",
"Microsoft.Chaos/targets/capabilities/read",
"Microsoft.Chaos/targets/capabilities/write",
"Microsoft.Chaos/targets/delete",
"Microsoft.Chaos/targets/read",
"Microsoft.Chaos/targets/write",
"Microsoft.Network/networkSecurityGroups/read",
"Microsoft.Network/virtualNetworks/read ",
"Microsoft.Sql/managedInstances/read",
"Microsoft.Web/serverfarms/read",
"Microsoft.Web/sites/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"createdOn": "2025-11-04T16:13:15.877Z",
"updatedOn": "2025-11-04T16:13:15.877Z",
"createdBy": null,
"updatedBy": null
},
"id": "/providers/Microsoft.Authorization/roleDefinitions/e4c7f620-39b8-4688-bba2-70dd82ef367b",
"type": "Microsoft.Authorization/roleDefinitions",
"name": "e4c7f620-39b8-4688-bba2-70dd82ef367b"
}
Effective Permissions
Operations granted by this role (7489 total)
Permission Patterns (from role definition)
Actions
16 patterns
*/read
Microsoft.Authorization/*/read
Microsoft.Authorization/roleAssignments/write
Microsoft.Chaos/locations/targetTypes/capabilityTypes/read
Microsoft.Chaos/locations/targetTypes/read
Microsoft.Chaos/targets/capabilities/delete
Microsoft.Chaos/targets/capabilities/read
Microsoft.Chaos/targets/capabilities/write
Microsoft.Chaos/targets/delete
Microsoft.Chaos/targets/read
Microsoft.Chaos/targets/write
Microsoft.Network/networkSecurityGroups/read
Microsoft.Network/virtualNetworks/read
Microsoft.Sql/managedInstances/read
Microsoft.Web/serverfarms/read
Microsoft.Web/sites/read