Hi @Søren Bech Christensen , when it comes to access rights, it is always best practice to grant only the narrowest possible scope. This is because the more access rights a user has, the more damage they can do if their account is compromised.
For example, if a user has read access to a resource, they can only view the resource and its properties. However, if a user has contribute access, they can make changes to the resource, which could potentially cause damage.
Regarding your question, read access rights need to be more specific than contribute access rights because read access is generally less risky than contribute access. If a user has read access to a resource, they can only view the resource and its properties. However, if a user has contribute access, they can make changes to the resource, which could potentially cause damage.
Regarding your second question, to create a role assignment in Azure Resource Group using Azure CLI, you can use the following command:
az role assignment create --assignee <service-principal-object-id> --role <role-name> --resource-group <resource-group-name>
Here, you need to replace <service-principal-object-id>
with the object ID of the service principal, <role-name>
with the name of the role you want to assign, and <resource-group-name>
with the name of the resource group to which you want to assign the role.
Please let me know if you have any questions and I can help you further.
If this answer helps you please mark "Accept Answer" so other users can reference it.
Thank you,
James