Can I create an Azure role assignment with wild card access?












0















I would like to have a service principal that can regenerate keys for service buses. Unfortunately, my organization is over their limit for custom role creation. I was hoping to give "Contributor" access to all service buses in the subscription, but I can't find a way to do it. Is there a way to accomplish this with something like wild cards? Like this:




az role assignment create --assignee (service-principal) --role Contributor --scope "/subscriptions/(subscription)/resourceGroups/*/providers/Microsoft.ServiceBus/namespaces/*"


I can't find a built-in role related to service buses like there is for storage accounts with the "Storage Account Key Operator Service Role".



Any help would be appreciated. Thanks!










share|improve this question

























  • If my reply is helpful, you could accept it as the answer, thanks.

    – Joy Wang
    Jan 6 at 3:10











  • I'll accept it because it might work for other people's situations, but I was hoping for a service principal that would have access to all service buses that exist currently and ones that will be made in the future, like you get with the Storage Account Key operator service role. I'm guessing that there is no solution to my problem without having a custom role.

    – R Wood
    Jan 7 at 18:14
















0















I would like to have a service principal that can regenerate keys for service buses. Unfortunately, my organization is over their limit for custom role creation. I was hoping to give "Contributor" access to all service buses in the subscription, but I can't find a way to do it. Is there a way to accomplish this with something like wild cards? Like this:




az role assignment create --assignee (service-principal) --role Contributor --scope "/subscriptions/(subscription)/resourceGroups/*/providers/Microsoft.ServiceBus/namespaces/*"


I can't find a built-in role related to service buses like there is for storage accounts with the "Storage Account Key Operator Service Role".



Any help would be appreciated. Thanks!










share|improve this question

























  • If my reply is helpful, you could accept it as the answer, thanks.

    – Joy Wang
    Jan 6 at 3:10











  • I'll accept it because it might work for other people's situations, but I was hoping for a service principal that would have access to all service buses that exist currently and ones that will be made in the future, like you get with the Storage Account Key operator service role. I'm guessing that there is no solution to my problem without having a custom role.

    – R Wood
    Jan 7 at 18:14














0












0








0








I would like to have a service principal that can regenerate keys for service buses. Unfortunately, my organization is over their limit for custom role creation. I was hoping to give "Contributor" access to all service buses in the subscription, but I can't find a way to do it. Is there a way to accomplish this with something like wild cards? Like this:




az role assignment create --assignee (service-principal) --role Contributor --scope "/subscriptions/(subscription)/resourceGroups/*/providers/Microsoft.ServiceBus/namespaces/*"


I can't find a built-in role related to service buses like there is for storage accounts with the "Storage Account Key Operator Service Role".



Any help would be appreciated. Thanks!










share|improve this question
















I would like to have a service principal that can regenerate keys for service buses. Unfortunately, my organization is over their limit for custom role creation. I was hoping to give "Contributor" access to all service buses in the subscription, but I can't find a way to do it. Is there a way to accomplish this with something like wild cards? Like this:




az role assignment create --assignee (service-principal) --role Contributor --scope "/subscriptions/(subscription)/resourceGroups/*/providers/Microsoft.ServiceBus/namespaces/*"


I can't find a built-in role related to service buses like there is for storage accounts with the "Storage Account Key Operator Service Role".



Any help would be appreciated. Thanks!







azure azure-active-directory azureservicebus






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Jan 3 at 20:32









David Makogon

57.5k15109157




57.5k15109157










asked Jan 3 at 18:13









R WoodR Wood

474




474













  • If my reply is helpful, you could accept it as the answer, thanks.

    – Joy Wang
    Jan 6 at 3:10











  • I'll accept it because it might work for other people's situations, but I was hoping for a service principal that would have access to all service buses that exist currently and ones that will be made in the future, like you get with the Storage Account Key operator service role. I'm guessing that there is no solution to my problem without having a custom role.

    – R Wood
    Jan 7 at 18:14



















  • If my reply is helpful, you could accept it as the answer, thanks.

    – Joy Wang
    Jan 6 at 3:10











  • I'll accept it because it might work for other people's situations, but I was hoping for a service principal that would have access to all service buses that exist currently and ones that will be made in the future, like you get with the Storage Account Key operator service role. I'm guessing that there is no solution to my problem without having a custom role.

    – R Wood
    Jan 7 at 18:14

















If my reply is helpful, you could accept it as the answer, thanks.

– Joy Wang
Jan 6 at 3:10





If my reply is helpful, you could accept it as the answer, thanks.

– Joy Wang
Jan 6 at 3:10













I'll accept it because it might work for other people's situations, but I was hoping for a service principal that would have access to all service buses that exist currently and ones that will be made in the future, like you get with the Storage Account Key operator service role. I'm guessing that there is no solution to my problem without having a custom role.

– R Wood
Jan 7 at 18:14





I'll accept it because it might work for other people's situations, but I was hoping for a service principal that would have access to all service buses that exist currently and ones that will be made in the future, like you get with the Storage Account Key operator service role. I'm guessing that there is no solution to my problem without having a custom role.

– R Wood
Jan 7 at 18:14












1 Answer
1






active

oldest

votes


















0














The Azure CLI seems not to support wildcard in --scope, if you want to give your service principal a Contributor role for all the service buses in the subscription, my workaround is to do that via Azure Powershell, you could refer to the command below, it works fine on my side.



$ResourceId = (Get-AzureRmResource -ResourceType Microsoft.ServiceBus/namespaces).ResourceId
foreach($rid in $ResourceId){
New-AzureRmRoleAssignment -ObjectId <Service Principal ObjectId> -Scope $rid -RoleDefinitionName Contributor
}





share|improve this answer


























    Your Answer






    StackExchange.ifUsing("editor", function () {
    StackExchange.using("externalEditor", function () {
    StackExchange.using("snippets", function () {
    StackExchange.snippets.init();
    });
    });
    }, "code-snippets");

    StackExchange.ready(function() {
    var channelOptions = {
    tags: "".split(" "),
    id: "1"
    };
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function() {
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled) {
    StackExchange.using("snippets", function() {
    createEditor();
    });
    }
    else {
    createEditor();
    }
    });

    function createEditor() {
    StackExchange.prepareEditor({
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: true,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: 10,
    bindNavPrevention: true,
    postfix: "",
    imageUploader: {
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    },
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    });


    }
    });














    draft saved

    draft discarded


















    StackExchange.ready(
    function () {
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f54027637%2fcan-i-create-an-azure-role-assignment-with-wild-card-access%23new-answer', 'question_page');
    }
    );

    Post as a guest















    Required, but never shown

























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    0














    The Azure CLI seems not to support wildcard in --scope, if you want to give your service principal a Contributor role for all the service buses in the subscription, my workaround is to do that via Azure Powershell, you could refer to the command below, it works fine on my side.



    $ResourceId = (Get-AzureRmResource -ResourceType Microsoft.ServiceBus/namespaces).ResourceId
    foreach($rid in $ResourceId){
    New-AzureRmRoleAssignment -ObjectId <Service Principal ObjectId> -Scope $rid -RoleDefinitionName Contributor
    }





    share|improve this answer






























      0














      The Azure CLI seems not to support wildcard in --scope, if you want to give your service principal a Contributor role for all the service buses in the subscription, my workaround is to do that via Azure Powershell, you could refer to the command below, it works fine on my side.



      $ResourceId = (Get-AzureRmResource -ResourceType Microsoft.ServiceBus/namespaces).ResourceId
      foreach($rid in $ResourceId){
      New-AzureRmRoleAssignment -ObjectId <Service Principal ObjectId> -Scope $rid -RoleDefinitionName Contributor
      }





      share|improve this answer




























        0












        0








        0







        The Azure CLI seems not to support wildcard in --scope, if you want to give your service principal a Contributor role for all the service buses in the subscription, my workaround is to do that via Azure Powershell, you could refer to the command below, it works fine on my side.



        $ResourceId = (Get-AzureRmResource -ResourceType Microsoft.ServiceBus/namespaces).ResourceId
        foreach($rid in $ResourceId){
        New-AzureRmRoleAssignment -ObjectId <Service Principal ObjectId> -Scope $rid -RoleDefinitionName Contributor
        }





        share|improve this answer















        The Azure CLI seems not to support wildcard in --scope, if you want to give your service principal a Contributor role for all the service buses in the subscription, my workaround is to do that via Azure Powershell, you could refer to the command below, it works fine on my side.



        $ResourceId = (Get-AzureRmResource -ResourceType Microsoft.ServiceBus/namespaces).ResourceId
        foreach($rid in $ResourceId){
        New-AzureRmRoleAssignment -ObjectId <Service Principal ObjectId> -Scope $rid -RoleDefinitionName Contributor
        }






        share|improve this answer














        share|improve this answer



        share|improve this answer








        edited Jan 4 at 2:11

























        answered Jan 4 at 2:04









        Joy WangJoy Wang

        8,3742315




        8,3742315
































            draft saved

            draft discarded




















































            Thanks for contributing an answer to Stack Overflow!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid



            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.


            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f54027637%2fcan-i-create-an-azure-role-assignment-with-wild-card-access%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            Monofisismo

            Angular Downloading a file using contenturl with Basic Authentication

            Olmecas