Can I create an Azure role assignment with wild card access?
I would like to have a service principal that can regenerate keys for service buses. Unfortunately, my organization is over their limit for custom role creation. I was hoping to give "Contributor" access to all service buses in the subscription, but I can't find a way to do it. Is there a way to accomplish this with something like wild cards? Like this:
az role assignment create --assignee (service-principal) --role Contributor --scope "/subscriptions/(subscription)/resourceGroups/*/providers/Microsoft.ServiceBus/namespaces/*"
I can't find a built-in role related to service buses like there is for storage accounts with the "Storage Account Key Operator Service Role".
Any help would be appreciated. Thanks!
azure azure-active-directory azureservicebus
add a comment |
I would like to have a service principal that can regenerate keys for service buses. Unfortunately, my organization is over their limit for custom role creation. I was hoping to give "Contributor" access to all service buses in the subscription, but I can't find a way to do it. Is there a way to accomplish this with something like wild cards? Like this:
az role assignment create --assignee (service-principal) --role Contributor --scope "/subscriptions/(subscription)/resourceGroups/*/providers/Microsoft.ServiceBus/namespaces/*"
I can't find a built-in role related to service buses like there is for storage accounts with the "Storage Account Key Operator Service Role".
Any help would be appreciated. Thanks!
azure azure-active-directory azureservicebus
If my reply is helpful, you could accept it as the answer, thanks.
– Joy Wang
Jan 6 at 3:10
I'll accept it because it might work for other people's situations, but I was hoping for a service principal that would have access to all service buses that exist currently and ones that will be made in the future, like you get with the Storage Account Key operator service role. I'm guessing that there is no solution to my problem without having a custom role.
– R Wood
Jan 7 at 18:14
add a comment |
I would like to have a service principal that can regenerate keys for service buses. Unfortunately, my organization is over their limit for custom role creation. I was hoping to give "Contributor" access to all service buses in the subscription, but I can't find a way to do it. Is there a way to accomplish this with something like wild cards? Like this:
az role assignment create --assignee (service-principal) --role Contributor --scope "/subscriptions/(subscription)/resourceGroups/*/providers/Microsoft.ServiceBus/namespaces/*"
I can't find a built-in role related to service buses like there is for storage accounts with the "Storage Account Key Operator Service Role".
Any help would be appreciated. Thanks!
azure azure-active-directory azureservicebus
I would like to have a service principal that can regenerate keys for service buses. Unfortunately, my organization is over their limit for custom role creation. I was hoping to give "Contributor" access to all service buses in the subscription, but I can't find a way to do it. Is there a way to accomplish this with something like wild cards? Like this:
az role assignment create --assignee (service-principal) --role Contributor --scope "/subscriptions/(subscription)/resourceGroups/*/providers/Microsoft.ServiceBus/namespaces/*"
I can't find a built-in role related to service buses like there is for storage accounts with the "Storage Account Key Operator Service Role".
Any help would be appreciated. Thanks!
azure azure-active-directory azureservicebus
azure azure-active-directory azureservicebus
edited Jan 3 at 20:32
David Makogon
57.5k15109157
57.5k15109157
asked Jan 3 at 18:13
R WoodR Wood
474
474
If my reply is helpful, you could accept it as the answer, thanks.
– Joy Wang
Jan 6 at 3:10
I'll accept it because it might work for other people's situations, but I was hoping for a service principal that would have access to all service buses that exist currently and ones that will be made in the future, like you get with the Storage Account Key operator service role. I'm guessing that there is no solution to my problem without having a custom role.
– R Wood
Jan 7 at 18:14
add a comment |
If my reply is helpful, you could accept it as the answer, thanks.
– Joy Wang
Jan 6 at 3:10
I'll accept it because it might work for other people's situations, but I was hoping for a service principal that would have access to all service buses that exist currently and ones that will be made in the future, like you get with the Storage Account Key operator service role. I'm guessing that there is no solution to my problem without having a custom role.
– R Wood
Jan 7 at 18:14
If my reply is helpful, you could accept it as the answer, thanks.
– Joy Wang
Jan 6 at 3:10
If my reply is helpful, you could accept it as the answer, thanks.
– Joy Wang
Jan 6 at 3:10
I'll accept it because it might work for other people's situations, but I was hoping for a service principal that would have access to all service buses that exist currently and ones that will be made in the future, like you get with the Storage Account Key operator service role. I'm guessing that there is no solution to my problem without having a custom role.
– R Wood
Jan 7 at 18:14
I'll accept it because it might work for other people's situations, but I was hoping for a service principal that would have access to all service buses that exist currently and ones that will be made in the future, like you get with the Storage Account Key operator service role. I'm guessing that there is no solution to my problem without having a custom role.
– R Wood
Jan 7 at 18:14
add a comment |
1 Answer
1
active
oldest
votes
The Azure CLI seems not to support wildcard in --scope
, if you want to give your service principal a Contributor
role for all the service buses in the subscription, my workaround is to do that via Azure Powershell, you could refer to the command below, it works fine on my side.
$ResourceId = (Get-AzureRmResource -ResourceType Microsoft.ServiceBus/namespaces).ResourceId
foreach($rid in $ResourceId){
New-AzureRmRoleAssignment -ObjectId <Service Principal ObjectId> -Scope $rid -RoleDefinitionName Contributor
}
add a comment |
Your Answer
StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f54027637%2fcan-i-create-an-azure-role-assignment-with-wild-card-access%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
The Azure CLI seems not to support wildcard in --scope
, if you want to give your service principal a Contributor
role for all the service buses in the subscription, my workaround is to do that via Azure Powershell, you could refer to the command below, it works fine on my side.
$ResourceId = (Get-AzureRmResource -ResourceType Microsoft.ServiceBus/namespaces).ResourceId
foreach($rid in $ResourceId){
New-AzureRmRoleAssignment -ObjectId <Service Principal ObjectId> -Scope $rid -RoleDefinitionName Contributor
}
add a comment |
The Azure CLI seems not to support wildcard in --scope
, if you want to give your service principal a Contributor
role for all the service buses in the subscription, my workaround is to do that via Azure Powershell, you could refer to the command below, it works fine on my side.
$ResourceId = (Get-AzureRmResource -ResourceType Microsoft.ServiceBus/namespaces).ResourceId
foreach($rid in $ResourceId){
New-AzureRmRoleAssignment -ObjectId <Service Principal ObjectId> -Scope $rid -RoleDefinitionName Contributor
}
add a comment |
The Azure CLI seems not to support wildcard in --scope
, if you want to give your service principal a Contributor
role for all the service buses in the subscription, my workaround is to do that via Azure Powershell, you could refer to the command below, it works fine on my side.
$ResourceId = (Get-AzureRmResource -ResourceType Microsoft.ServiceBus/namespaces).ResourceId
foreach($rid in $ResourceId){
New-AzureRmRoleAssignment -ObjectId <Service Principal ObjectId> -Scope $rid -RoleDefinitionName Contributor
}
The Azure CLI seems not to support wildcard in --scope
, if you want to give your service principal a Contributor
role for all the service buses in the subscription, my workaround is to do that via Azure Powershell, you could refer to the command below, it works fine on my side.
$ResourceId = (Get-AzureRmResource -ResourceType Microsoft.ServiceBus/namespaces).ResourceId
foreach($rid in $ResourceId){
New-AzureRmRoleAssignment -ObjectId <Service Principal ObjectId> -Scope $rid -RoleDefinitionName Contributor
}
edited Jan 4 at 2:11
answered Jan 4 at 2:04
Joy WangJoy Wang
8,3742315
8,3742315
add a comment |
add a comment |
Thanks for contributing an answer to Stack Overflow!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f54027637%2fcan-i-create-an-azure-role-assignment-with-wild-card-access%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
If my reply is helpful, you could accept it as the answer, thanks.
– Joy Wang
Jan 6 at 3:10
I'll accept it because it might work for other people's situations, but I was hoping for a service principal that would have access to all service buses that exist currently and ones that will be made in the future, like you get with the Storage Account Key operator service role. I'm guessing that there is no solution to my problem without having a custom role.
– R Wood
Jan 7 at 18:14