Often times clients do not understand how role base access control (RBAC) works in Azure. In this post we’ll go over RBAC
First list out all the azure role definitions in your subscription
$ az role definition list -o table
Best if you limit the role definitions to a specific resource group
$ az role assignment list --resource-group <name_of_resource_group>
If you need to define a new role you can does as follows, where the @ad-role.json is the definition of the role
$ az role definition create --role-definition @add-role.json
Delete role you do not plan to use with the following
$ az role definition delete --name MyRole
You can also update a role. Done like a create
$ az role definition update --role-definition @update-role.json
Have a look at what users you have
$ az ad user list --query "[].[userPrincipalName,userType]" -o table
Now lets have a look at what the client has used.
$ az role assignment list --all -o table
You may find that your clients are not using RBAC property. They be using named users in roles and not AD groups. A common reason for this is that AD groups are not easly created and may even require having a ticked put into a system and take days, weeks to be provisioned. That, or assigning users to these AD groups could also take days, weeks, or not be accurate. As a result cloud admin teams do not use the AD groups and move to named users.