Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
In this article, you learn about the Azure role-based access control (RBAC) permissions required to use network security perimeter capabilities. You learn about the actions required for network security perimeter, profile, network security perimeter access rule, diagnostic settings, association, and appendix capabilities.
Azure role-based access control permissions
Azure role-based access control (Azure RBAC) enables you to assign only the specific actions to members of your organization that they require to complete their assigned responsibilities. To use network security perimeter capabilities, the account you log into Azure with, must be assigned to the Owner, Contributor, or Network contributor built-in roles, or assigned to a custom role that is assigned the actions listed for each network security perimeter capability in the sections that follow. To learn how to check roles assigned to a user for a subscription, see List Azure role assignments using the Azure portal. If you can't see the role assignments, contact the respective subscription admin.
Network security perimeter permissions
Action | Description |
---|---|
Microsoft.Network/networkSecurityPerimeters/read | Gets a network security perimeter |
Microsoft.Network/networkSecurityPerimeters/write | Creates or updates a network security perimeter |
Microsoft.Network/networkSecurityPerimeters/delete | Deletes a network security perimeter |
Microsoft.Network/locations/perimeterAssociableResourceTypes/read | Gets network security perimeter associable resources |
Network security perimeter profile permissions
Action | Description |
---|---|
Microsoft.Network/networkSecurityPerimeters/profiles/read | Gets a network security perimeter profile |
Microsoft.Network/networkSecurityPerimeters/profiles/write | Creates or updates a network security perimeter profile |
Microsoft.Network/networkSecurityPerimeters/profiles/delete | Deletes a network security perimeter profile |
Network security perimeter access rule permissions
Action | Description |
---|---|
Microsoft.Network/networkSecurityPerimeters/profiles/accessRules/read | Gets a network security perimeter access rule. |
Microsoft.Network/networkSecurityPerimeters/profiles/accessRules/write | Creates or updates a network security perimeter access rule. |
Microsoft.Network/networkSecurityPerimeters/profiles/accessRules/delete | Deletes a network security perimeter access rule. |
Microsoft.Resources/subscriptions/joinPerimeterRule/action | User must have microsoft.resources/subscriptions/joinperimeterrule/action role over the subscription |
Note
User must have subscription contributor role to create/update subscription-based access rule.
Network security perimeter association permissions
Action | Description |
---|---|
Microsoft.Network/networkSecurityPerimeters/resourceAssociations/read | Gets a network security perimeter resource association |
Microsoft.Network/networkSecurityPerimeters/resourceAssociations/write | Creates or updates a network security perimeter resource association |
Microsoft.Network/networkSecurityPerimeters/profiles/join/action | Joins a network security perimeter profile. Linked access check is performed while associating the resource |
Microsoft.Network/networkSecurityPerimeters/resourceAssociations/delete | Deletes a network security perimeter resource association |
Note
To create or update an association, the following permissions are required to exist:
- Microsoft.Network/networkSecurityPerimeters/resourceAssociations/write is required at the network security perimeter resource.
- Microsoft.Network/networkSecurityPerimeters/profiles/join/action is required on the profile.
- {providerNamespace}/{resourceType}/joinPerimeter/action is required on the respective PaaS resource.