다음을 통해 공유


컨테이너에 대한 Azure 기본 제공 역할

이 문서에서는 컨테이너 범주의 Azure 기본 제공 역할을 나열합니다.

AcrDelete

컨테이너 레지스트리에서 리포지토리, 태그 또는 매니페스트를 삭제합니다.

자세한 정보

작업 설명
Microsoft.ContainerRegistry/registries/artifacts/delete 컨테이너 레지스트리에서 아티팩트를 삭제합니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "acr delete",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/c2f4ef07-c644-48eb-af81-4b1b4947fb11",
  "name": "c2f4ef07-c644-48eb-af81-4b1b4947fb11",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerRegistry/registries/artifacts/delete"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "AcrDelete",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

AcrImageSigner

콘텐츠 신뢰가 사용하도록 설정된 컨테이너 레지스트리에 신뢰할 수 있는 이미지를 푸시하거나 가져옵니다.

자세한 정보

작업 설명
Microsoft.ContainerRegistry/registries/sign/write 컨테이너 레지스트리에 대한 콘텐츠 신뢰 메타데이터를 푸시/풀합니다.
NotActions
없음
DataActions
Microsoft.ContainerRegistry/registries/trustedCollections/write 컨테이너 레지스트리 콘텐츠의 신뢰할 수 있는 컬렉션을 푸시하거나 게시할 수 있습니다. 이는 데이터 작업이라는 점을 제외하고 Microsoft.ContainerRegistry/registries/sign/write 작업과 유사합니다.
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "acr image signer",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/6cef56e8-d556-48e5-a04f-b8e64114680f",
  "name": "6cef56e8-d556-48e5-a04f-b8e64114680f",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerRegistry/registries/sign/write"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerRegistry/registries/trustedCollections/write"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "AcrImageSigner",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

AcrPull

컨테이너 레지스트리에서 아티팩트를 가져옵니다.

자세한 정보

작업 설명
Microsoft.ContainerRegistry/registries/pull/read 컨테이너 레지스트리에서 이미지를 끌어오거나 가져옵니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "acr pull",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/7f951dda-4ed3-4680-a7ca-43fe172d538d",
  "name": "7f951dda-4ed3-4680-a7ca-43fe172d538d",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerRegistry/registries/pull/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "AcrPull",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

AcrPush

컨테이너 레지스트리에 아티팩트를 푸시하거나 가져옵니다.

자세한 정보

작업 설명
Microsoft.ContainerRegistry/registries/pull/read 컨테이너 레지스트리에서 이미지를 끌어오거나 가져옵니다.
Microsoft.ContainerRegistry/registries/push/write 컨테이너 레지스트리에 이미지를 푸시하거나 씁니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "acr push",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/8311e382-0749-4cb8-b61a-304f252e45ec",
  "name": "8311e382-0749-4cb8-b61a-304f252e45ec",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerRegistry/registries/pull/read",
        "Microsoft.ContainerRegistry/registries/push/write"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "AcrPush",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

AcrQuarantineReader

컨테이너 레지스트리에서 격리된 이미지를 끌어옵니다.

자세한 정보

작업 설명
Microsoft.ContainerRegistry/registries/quarantine/read 컨테이너 레지스트리에서 격리된 이미지 끌어오기 또는 가져오기
NotActions
없음
DataActions
Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read 컨테이너 레지스트리에서 격리된 아티팩트를 끌어오거나 가져올 수 있습니다. 이는 데이터 작업이라는 점을 제외하고 Microsoft.ContainerRegistry/registries/quarantine/read와 유사합니다.
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "acr quarantine data reader",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/cdda3590-29a3-44f6-95f2-9f980659eb04",
  "name": "cdda3590-29a3-44f6-95f2-9f980659eb04",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerRegistry/registries/quarantine/read"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "AcrQuarantineReader",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

AcrQuarantineWriter

격리된 이미지를 컨테이너 레지스트리로 푸시하거나 컨테이너 레지스트리에서 가져옵니다.

자세한 정보

작업 설명
Microsoft.ContainerRegistry/registries/quarantine/read 컨테이너 레지스트리에서 격리된 이미지 끌어오기 또는 가져오기
Microsoft.ContainerRegistry/registries/quarantine/write 격리된 이미지의 격리 상태 작성/수정
NotActions
없음
DataActions
Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read 컨테이너 레지스트리에서 격리된 아티팩트를 끌어오거나 가져올 수 있습니다. 이는 데이터 작업이라는 점을 제외하고 Microsoft.ContainerRegistry/registries/quarantine/read와 유사합니다.
Microsoft.ContainerRegistry/registries/quarantinedArtifacts/write 격리된 아티팩트의 격리 상태를 작성하거나 업데이트할 수 있습니다. 이는 데이터 작업이라는 점을 제외하고 Microsoft.ContainerRegistry/registries/격리/쓰기 작업과 유사합니다.
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "acr quarantine data writer",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/c8d4ff99-41c3-41a8-9f60-21dfdad59608",
  "name": "c8d4ff99-41c3-41a8-9f60-21dfdad59608",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerRegistry/registries/quarantine/read",
        "Microsoft.ContainerRegistry/registries/quarantine/write"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read",
        "Microsoft.ContainerRegistry/registries/quarantinedArtifacts/write"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "AcrQuarantineWriter",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Arc 지원 Kubernetes 클러스터 사용자 역할

클러스터 사용자 자격 증명 작업을 나열합니다.

actions 설명
Microsoft.Resources/deployments/write 배포를 만들거나 업데이트합니다.
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action clusterUser 자격 증명(미리 보기)을 나열합니다.
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Insights/alertRules/* 클래식 메트릭 경고를 만들고 관리합니다.
Microsoft.Support/* 지원 티켓을 만들거나 업데이트합니다.
Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action clusterUser 자격 증명 나열
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "List cluster user credentials action.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/00493d72-78f6-4148-b6c5-d3ce8e4799dd",
  "name": "00493d72-78f6-4148-b6c5-d3ce8e4799dd",
  "permissions": [
    {
      "actions": [
        "Microsoft.Resources/deployments/write",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action",
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Support/*",
        "Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Arc Enabled Kubernetes Cluster User Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Arc Kubernetes 관리자

리소스 할당량 및 네임스페이스 업데이트 또는 삭제를 제외하고 클러스터/네임스페이스의 모든 리소스를 관리할 수 있습니다.

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Insights/alertRules/* 클래식 메트릭 경고를 만들고 관리합니다.
Microsoft.Resources/deployments/write 배포를 만들거나 업데이트합니다.
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.Support/* 지원 티켓을 만들거나 업데이트합니다.
NotActions
없음
DataActions
Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read controllerrevisions를 읽습니다.
Microsoft.Kubernetes/connectedClusters/apps/daemonsets/*
Microsoft.Kubernetes/connectedClusters/apps/deployments/*
Microsoft.Kubernetes/connectedClusters/apps/replicasets/*
Microsoft.Kubernetes/connectedClusters/apps/statefulsets/*
Microsoft.Kubernetes/connectedClusters/authorization.k8s.io/localsubjectaccessreviews/write localsubjectaccessreviews를 씁니다.
Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/*
Microsoft.Kubernetes/connectedClusters/batch/cronjobs/*
Microsoft.Kubernetes/connectedClusters/batch/jobs/*
Microsoft.Kubernetes/connectedClusters/configmaps/*
Microsoft.Kubernetes/connectedClusters/endpoints/*
Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read events를 읽습니다.
Microsoft.Kubernetes/connectedClusters/events/read events를 읽습니다.
Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/*
Microsoft.Kubernetes/connectedClusters/extensions/deployments/*
Microsoft.Kubernetes/connectedClusters/extensions/ingresses/*
Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/*
Microsoft.Kubernetes/connectedClusters/extensions/replicasets/*
Microsoft.Kubernetes/connectedClusters/limitranges/read limitranges를 읽습니다.
Microsoft.Kubernetes/connectedClusters/namespaces/read 네임스페이스를 읽습니다.
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/*
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/*
Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/*
Microsoft.Kubernetes/connectedClusters/pods/*
Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/*
Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/rolebindings/*
Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/roles/*
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*
Microsoft.Kubernetes/connectedClusters/resourcequotas/read resourcequotas를 읽습니다.
Microsoft.Kubernetes/connectedClusters/secrets/*
Microsoft.Kubernetes/connectedClusters/serviceaccounts/*
Microsoft.Kubernetes/connectedClusters/services/*
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/dffb1e0c-446f-4dde-a09f-99eb5cc68b96",
  "name": "dffb1e0c-446f-4dde-a09f-99eb5cc68b96",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/write",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read",
        "Microsoft.Kubernetes/connectedClusters/apps/daemonsets/*",
        "Microsoft.Kubernetes/connectedClusters/apps/deployments/*",
        "Microsoft.Kubernetes/connectedClusters/apps/replicasets/*",
        "Microsoft.Kubernetes/connectedClusters/apps/statefulsets/*",
        "Microsoft.Kubernetes/connectedClusters/authorization.k8s.io/localsubjectaccessreviews/write",
        "Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/*",
        "Microsoft.Kubernetes/connectedClusters/batch/cronjobs/*",
        "Microsoft.Kubernetes/connectedClusters/batch/jobs/*",
        "Microsoft.Kubernetes/connectedClusters/configmaps/*",
        "Microsoft.Kubernetes/connectedClusters/endpoints/*",
        "Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read",
        "Microsoft.Kubernetes/connectedClusters/events/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/deployments/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/ingresses/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/replicasets/*",
        "Microsoft.Kubernetes/connectedClusters/limitranges/read",
        "Microsoft.Kubernetes/connectedClusters/namespaces/read",
        "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/*",
        "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/*",
        "Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/*",
        "Microsoft.Kubernetes/connectedClusters/pods/*",
        "Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/*",
        "Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/rolebindings/*",
        "Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/roles/*",
        "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*",
        "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*",
        "Microsoft.Kubernetes/connectedClusters/resourcequotas/read",
        "Microsoft.Kubernetes/connectedClusters/secrets/*",
        "Microsoft.Kubernetes/connectedClusters/serviceaccounts/*",
        "Microsoft.Kubernetes/connectedClusters/services/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Arc Kubernetes Admin",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Arc Kubernetes 클러스터 관리자

클러스터의 모든 리소스를 관리할 수 있습니다.

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Insights/alertRules/* 클래식 메트릭 경고를 만들고 관리합니다.
Microsoft.Resources/deployments/write 배포를 만들거나 업데이트합니다.
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.Support/* 지원 티켓을 만들거나 업데이트합니다.
NotActions
없음
DataActions
Microsoft.Kubernetes/connectedClusters/*
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you manage all resources in the cluster.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/8393591c-06b9-48a2-a542-1bd6b377f6a2",
  "name": "8393591c-06b9-48a2-a542-1bd6b377f6a2",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/write",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.Kubernetes/connectedClusters/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Arc Kubernetes Cluster Admin",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Arc Kubernetes 뷰어

비밀을 제외하고 클러스터/네임스페이스의 모든 리소스를 볼 수 있습니다.

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Insights/alertRules/* 클래식 메트릭 경고를 만들고 관리합니다.
Microsoft.Resources/deployments/write 배포를 만들거나 업데이트합니다.
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.Support/* 지원 티켓을 만들거나 업데이트합니다.
NotActions
없음
DataActions
Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read controllerrevisions를 읽습니다.
Microsoft.Kubernetes/connectedClusters/apps/daemonsets/read daemonsets를 읽습니다.
Microsoft.Kubernetes/connectedClusters/apps/deployments/read deployments를 읽습니다.
Microsoft.Kubernetes/connectedClusters/apps/replicasets/read replicasets를 읽습니다.
Microsoft.Kubernetes/connectedClusters/apps/statefulsets/read statefulsets를 읽습니다.
Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/read horizontalpodautoscalers를 읽습니다.
Microsoft.Kubernetes/connectedClusters/batch/cronjobs/read cronjobs를 읽습니다.
Microsoft.Kubernetes/connectedClusters/batch/jobs/read 작업을 읽습니다.
Microsoft.Kubernetes/connectedClusters/configmaps/read configmaps를 읽습니다.
Microsoft.Kubernetes/connectedClusters/endpoints/read 엔드포인트를 읽습니다.
Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read events를 읽습니다.
Microsoft.Kubernetes/connectedClusters/events/read events를 읽습니다.
Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/read daemonsets를 읽습니다.
Microsoft.Kubernetes/connectedClusters/extensions/deployments/read deployments를 읽습니다.
Microsoft.Kubernetes/connectedClusters/extensions/ingresses/read ingresses를 읽습니다.
Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/read networkpolicies를 읽습니다.
Microsoft.Kubernetes/connectedClusters/extensions/replicasets/read replicasets를 읽습니다.
Microsoft.Kubernetes/connectedClusters/limitranges/read limitranges를 읽습니다.
Microsoft.Kubernetes/connectedClusters/namespaces/read 네임스페이스를 읽습니다.
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/read ingresses를 읽습니다.
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/read networkpolicies를 읽습니다.
Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/read persistentvolumeclaims를 읽습니다.
Microsoft.Kubernetes/connectedClusters/pods/read pods를 읽습니다.
Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/read poddisruptionbudgets를 읽습니다.
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/read replicationcontrollers를 읽습니다.
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/read replicationcontrollers를 읽습니다.
Microsoft.Kubernetes/connectedClusters/resourcequotas/read resourcequotas를 읽습니다.
Microsoft.Kubernetes/connectedClusters/serviceaccounts/read serviceaccounts를 읽습니다.
Microsoft.Kubernetes/connectedClusters/services/read services를 읽습니다.
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you view all resources in cluster/namespace, except secrets.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/63f0a09d-1495-4db4-a681-037d84835eb4",
  "name": "63f0a09d-1495-4db4-a681-037d84835eb4",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/write",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read",
        "Microsoft.Kubernetes/connectedClusters/apps/daemonsets/read",
        "Microsoft.Kubernetes/connectedClusters/apps/deployments/read",
        "Microsoft.Kubernetes/connectedClusters/apps/replicasets/read",
        "Microsoft.Kubernetes/connectedClusters/apps/statefulsets/read",
        "Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/read",
        "Microsoft.Kubernetes/connectedClusters/batch/cronjobs/read",
        "Microsoft.Kubernetes/connectedClusters/batch/jobs/read",
        "Microsoft.Kubernetes/connectedClusters/configmaps/read",
        "Microsoft.Kubernetes/connectedClusters/endpoints/read",
        "Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read",
        "Microsoft.Kubernetes/connectedClusters/events/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/deployments/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/ingresses/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/replicasets/read",
        "Microsoft.Kubernetes/connectedClusters/limitranges/read",
        "Microsoft.Kubernetes/connectedClusters/namespaces/read",
        "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/read",
        "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/read",
        "Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/read",
        "Microsoft.Kubernetes/connectedClusters/pods/read",
        "Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/read",
        "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/read",
        "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/read",
        "Microsoft.Kubernetes/connectedClusters/resourcequotas/read",
        "Microsoft.Kubernetes/connectedClusters/serviceaccounts/read",
        "Microsoft.Kubernetes/connectedClusters/services/read"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Arc Kubernetes Viewer",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Arc Kubernetes 작성자

(클러스터)역할 및 (클러스터)역할 바인딩을 제외하고 클러스터/네임스페이스의 모든 항목을 업데이트할 수 있습니다.

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Insights/alertRules/* 클래식 메트릭 경고를 만들고 관리합니다.
Microsoft.Resources/deployments/write 배포를 만들거나 업데이트합니다.
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.Support/* 지원 티켓을 만들거나 업데이트합니다.
NotActions
없음
DataActions
Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read controllerrevisions를 읽습니다.
Microsoft.Kubernetes/connectedClusters/apps/daemonsets/*
Microsoft.Kubernetes/connectedClusters/apps/deployments/*
Microsoft.Kubernetes/connectedClusters/apps/replicasets/*
Microsoft.Kubernetes/connectedClusters/apps/statefulsets/*
Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/*
Microsoft.Kubernetes/connectedClusters/batch/cronjobs/*
Microsoft.Kubernetes/connectedClusters/batch/jobs/*
Microsoft.Kubernetes/connectedClusters/configmaps/*
Microsoft.Kubernetes/connectedClusters/endpoints/*
Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read events를 읽습니다.
Microsoft.Kubernetes/connectedClusters/events/read events를 읽습니다.
Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/*
Microsoft.Kubernetes/connectedClusters/extensions/deployments/*
Microsoft.Kubernetes/connectedClusters/extensions/ingresses/*
Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/*
Microsoft.Kubernetes/connectedClusters/extensions/replicasets/*
Microsoft.Kubernetes/connectedClusters/limitranges/read limitranges를 읽습니다.
Microsoft.Kubernetes/connectedClusters/namespaces/read 네임스페이스를 읽습니다.
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/*
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/*
Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/*
Microsoft.Kubernetes/connectedClusters/pods/*
Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/*
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*
Microsoft.Kubernetes/connectedClusters/resourcequotas/read resourcequotas를 읽습니다.
Microsoft.Kubernetes/connectedClusters/secrets/*
Microsoft.Kubernetes/connectedClusters/serviceaccounts/*
Microsoft.Kubernetes/connectedClusters/services/*
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you update everything in cluster/namespace, except (cluster)roles and (cluster)role bindings.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/5b999177-9696-4545-85c7-50de3797e5a1",
  "name": "5b999177-9696-4545-85c7-50de3797e5a1",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/write",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read",
        "Microsoft.Kubernetes/connectedClusters/apps/daemonsets/*",
        "Microsoft.Kubernetes/connectedClusters/apps/deployments/*",
        "Microsoft.Kubernetes/connectedClusters/apps/replicasets/*",
        "Microsoft.Kubernetes/connectedClusters/apps/statefulsets/*",
        "Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/*",
        "Microsoft.Kubernetes/connectedClusters/batch/cronjobs/*",
        "Microsoft.Kubernetes/connectedClusters/batch/jobs/*",
        "Microsoft.Kubernetes/connectedClusters/configmaps/*",
        "Microsoft.Kubernetes/connectedClusters/endpoints/*",
        "Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read",
        "Microsoft.Kubernetes/connectedClusters/events/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/deployments/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/ingresses/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/replicasets/*",
        "Microsoft.Kubernetes/connectedClusters/limitranges/read",
        "Microsoft.Kubernetes/connectedClusters/namespaces/read",
        "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/*",
        "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/*",
        "Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/*",
        "Microsoft.Kubernetes/connectedClusters/pods/*",
        "Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/*",
        "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*",
        "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*",
        "Microsoft.Kubernetes/connectedClusters/resourcequotas/read",
        "Microsoft.Kubernetes/connectedClusters/secrets/*",
        "Microsoft.Kubernetes/connectedClusters/serviceaccounts/*",
        "Microsoft.Kubernetes/connectedClusters/services/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Arc Kubernetes Writer",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Container Storage 기여자

Azure Container Storage를 설치하고 해당 스토리지 리소스를 관리합니다. 역할 할당을 제한하는 ABAC 조건을 포함합니다.

actions 설명
Microsoft.KubernetesConfiguration/extensions/write 확장 리소스를 만들거나 업데이트합니다.
Microsoft.KubernetesConfiguration/extensions/read 확장 인스턴스 리소스를 가져옵니다.
Microsoft.KubernetesConfiguration/extensions/delete 확장 인스턴스 리소스를 삭제합니다.
Microsoft.KubernetesConfiguration/extensions/operations/read 비동기 작업 상태를 가져옵니다.
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Management/managementGroups/read 인증된 사용자의 관리 그룹을 나열합니다.
Microsoft.Resources/deployments/* 배포를 만들고 관리합니다.
Microsoft.Support/* 지원 티켓을 만들거나 업데이트합니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
actions
Microsoft.Authorization/roleAssignments/write 지정된 범위에서 역할 할당을 만듭니다.
Microsoft.Authorization/roleAssignments/delete 지정된 범위에서 역할 할당을 삭제합니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
Condition
((! (ActionMatches{'Microsoft.Authorization/roleAssignments/write'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619})) AND ((!( ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619}) 다음 역할에 대한 역할 할당을 추가하거나 제거합니다.
Azure Container Storage 연산자
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you install Azure Container Storage and manage its storage resources",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/95dd08a6-00bd-4661-84bf-f6726f83a4d0",
  "name": "95dd08a6-00bd-4661-84bf-f6726f83a4d0",
  "permissions": [
    {
      "actions": [
        "Microsoft.KubernetesConfiguration/extensions/write",
        "Microsoft.KubernetesConfiguration/extensions/read",
        "Microsoft.KubernetesConfiguration/extensions/delete",
        "Microsoft.KubernetesConfiguration/extensions/operations/read",
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Management/managementGroups/read",
        "Microsoft.Resources/deployments/*",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    },
    {
      "actions": [
        "Microsoft.Authorization/roleAssignments/write",
        "Microsoft.Authorization/roleAssignments/delete"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": [],
      "conditionVersion": "2.0",
      "condition": "((!(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619})) AND ((!(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619}))"
    }
  ],
  "roleName": "Azure Container Storage Contributor",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Container Storage 연산자

관리 ID를 사용하도록 설정하여 가상 머신 관리 및 가상 네트워크 관리와 같은 Azure Container Storage 작업을 수행합니다.

actions 설명
Microsoft.ElasticSan/elasticSans/*
Microsoft.ElasticSan/locations/asyncoperations/read 비동기 작업의 상태를 폴링합니다.
Microsoft.Network/routeTables/join/action 경로 테이블을 조인합니다. 경고할 수 없습니다.
Microsoft.Network/networkSecurityGroups/join/action 네트워크 보안 그룹을 조인합니다. 경고할 수 없습니다.
Microsoft.Network/virtualNetworks/write 가상 네트워크를 만들거나 기존 가상 네트워크를 업데이트합니다.
Microsoft.Network/virtualNetworks/delete 가상 네트워크를 삭제합니다.
Microsoft.Network/virtualNetworks/join/action 가상 네트워크를 조인합니다. 경고할 수 없습니다.
Microsoft.Network/virtualNetworks/subnets/read 가상 네트워크 서브넷 정의를 가져옵니다.
Microsoft.Network/virtualNetworks/subnets/write 가상 네트워크 서브넷을 만들거나 기존 가상 네트워크 서브넷을 업데이트합니다.
Microsoft.Compute/virtualMachines/read 가상 머신의 속성을 가져옵니다.
Microsoft.Compute/virtualMachines/write 새 가상 머신을 만들거나 기존 가상 머신을 업데이트합니다.
Microsoft.Compute/virtualMachineScaleSets/read Virtual Machine Scale Set의 속성 가져오기
Microsoft.Compute/virtualMachineScaleSets/write 새 가상 머신 확장 집합을 만들거나 기존 가상 머신 확장 집합을 업데이트합니다.
Microsoft.Compute/virtualMachineScaleSets/virtualMachines/write VM 확장 집합에서 Virtual Machine의 속성을 업데이트합니다.
Microsoft.Compute/virtualMachineScaleSets/virtualMachines/read VM 확장 집합에서 Virtual Machine의 속성을 검색합니다.
Microsoft.Resources/subscriptions/providers/read 리소스 공급자를 가져오거나 나열합니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.Network/virtualNetworks/read 가상 네트워크 정의를 가져옵니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Role required by a Managed Identity for Azure Container Storage operations",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/08d4c71a-cc63-4ce4-a9c8-5dd251b4d619",
  "name": "08d4c71a-cc63-4ce4-a9c8-5dd251b4d619",
  "permissions": [
    {
      "actions": [
        "Microsoft.ElasticSan/elasticSans/*",
        "Microsoft.ElasticSan/locations/asyncoperations/read",
        "Microsoft.Network/routeTables/join/action",
        "Microsoft.Network/networkSecurityGroups/join/action",
        "Microsoft.Network/virtualNetworks/write",
        "Microsoft.Network/virtualNetworks/delete",
        "Microsoft.Network/virtualNetworks/join/action",
        "Microsoft.Network/virtualNetworks/subnets/read",
        "Microsoft.Network/virtualNetworks/subnets/write",
        "Microsoft.Compute/virtualMachines/read",
        "Microsoft.Compute/virtualMachines/write",
        "Microsoft.Compute/virtualMachineScaleSets/read",
        "Microsoft.Compute/virtualMachineScaleSets/write",
        "Microsoft.Compute/virtualMachineScaleSets/virtualMachines/write",
        "Microsoft.Compute/virtualMachineScaleSets/virtualMachines/read",
        "Microsoft.Resources/subscriptions/providers/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Network/virtualNetworks/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Container Storage Operator",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Container Storage 소유자

Azure Container Storage를 설치하고, 스토리지 리소스에 대한 액세스 권한을 부여하고, AZURE SAN(Elastic Storage 영역 네트워크)을 구성합니다. 역할 할당을 제한하는 ABAC 조건을 포함합니다.

actions 설명
Microsoft.ElasticSan/elasticSans/*
Microsoft.ElasticSan/locations/*
Microsoft.ElasticSan/elasticSans/volumeGroups/*
Microsoft.ElasticSan/elasticSans/volumeGroups/volumes/*
Microsoft.ElasticSan/locations/asyncoperations/read 비동기 작업의 상태를 폴링합니다.
Microsoft.KubernetesConfiguration/extensions/write 확장 리소스를 만들거나 업데이트합니다.
Microsoft.KubernetesConfiguration/extensions/read 확장 인스턴스 리소스를 가져옵니다.
Microsoft.KubernetesConfiguration/extensions/delete 확장 인스턴스 리소스를 삭제합니다.
Microsoft.KubernetesConfiguration/extensions/operations/read 비동기 작업 상태를 가져옵니다.
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Management/managementGroups/read 인증된 사용자의 관리 그룹을 나열합니다.
Microsoft.Resources/deployments/* 배포를 만들고 관리합니다.
Microsoft.Support/* 지원 티켓을 만들거나 업데이트합니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
actions
Microsoft.Authorization/roleAssignments/write 지정된 범위에서 역할 할당을 만듭니다.
Microsoft.Authorization/roleAssignments/delete 지정된 범위에서 역할 할당을 삭제합니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
Condition
((! (ActionMatches{'Microsoft.Authorization/roleAssignments/write'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619})) AND ((!( ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619}) 다음 역할에 대한 역할 할당을 추가하거나 제거합니다.
Azure Container Storage 연산자
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you install Azure Container Storage and grants access to its storage resources",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/95de85bd-744d-4664-9dde-11430bc34793",
  "name": "95de85bd-744d-4664-9dde-11430bc34793",
  "permissions": [
    {
      "actions": [
        "Microsoft.ElasticSan/elasticSans/*",
        "Microsoft.ElasticSan/locations/*",
        "Microsoft.ElasticSan/elasticSans/volumeGroups/*",
        "Microsoft.ElasticSan/elasticSans/volumeGroups/volumes/*",
        "Microsoft.ElasticSan/locations/asyncoperations/read",
        "Microsoft.KubernetesConfiguration/extensions/write",
        "Microsoft.KubernetesConfiguration/extensions/read",
        "Microsoft.KubernetesConfiguration/extensions/delete",
        "Microsoft.KubernetesConfiguration/extensions/operations/read",
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Management/managementGroups/read",
        "Microsoft.Resources/deployments/*",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    },
    {
      "actions": [
        "Microsoft.Authorization/roleAssignments/write",
        "Microsoft.Authorization/roleAssignments/delete"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": [],
      "conditionVersion": "2.0",
      "condition": "((!(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619})) AND ((!(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619}))"
    }
  ],
  "roleName": "Azure Container Storage Owner",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Fleet Manager 기여자 역할

플릿, 플릿 멤버, 함대 업데이트 전략, 플릿 업데이트 실행 등을 포함하여 Azure Kubernetes Fleet Manager에서 제공하는 Azure 리소스에 대한 읽기/쓰기 권한을 부여합니다.

actions 설명
Microsoft.ContainerService/fleets/*
Microsoft.Resources/deployments/* 배포를 만들고 관리합니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants read/write access to Azure resources provided by Azure Kubernetes Fleet Manager, including fleets, fleet members, fleet update strategies, fleet update runs, etc.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/63bb64ad-9799-4770-b5c3-24ed299a07bf",
  "name": "63bb64ad-9799-4770-b5c3-24ed299a07bf",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerService/fleets/*",
        "Microsoft.Resources/deployments/*"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Fleet Manager Contributor Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Fleet Manager RBAC 관리자

Fleet 관리형 허브 클러스터의 네임스페이스 내에서 Kubernetes 리소스에 대한 읽기/쓰기 권한을 부여합니다. ResourceQuota 개체와 네임스페이스 개체 자체를 제외하고 네임스페이스 내의 대부분의 개체에 대한 쓰기 권한을 제공합니다. 클러스터 범위에서 이 역할을 적용하면 모든 네임스페이스에 대한 액세스 권한이 부여됩니다.

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.ContainerService/fleets/read 플릿을 가져옵니다.
Microsoft.ContainerService/fleets/listCredentials/action 플릿 자격 증명을 나열합니다.
NotActions
없음
DataActions
Microsoft.ContainerService/fleets/apps/controllerrevisions/read controllerrevisions를 읽습니다.
Microsoft.ContainerService/fleets/apps/daemonsets/*
Microsoft.ContainerService/fleets/apps/deployments/*
Microsoft.ContainerService/fleets/apps/statefulsets/*
Microsoft.ContainerService/fleets/authorization.k8s.io/localsubjectaccessreviews/write localsubjectaccessreviews를 씁니다.
Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/*
Microsoft.ContainerService/fleets/batch/cronjobs/*
Microsoft.ContainerService/fleets/batch/jobs/*
Microsoft.ContainerService/fleets/configmaps/*
Microsoft.ContainerService/fleets/endpoints/*
Microsoft.ContainerService/fleets/events.k8s.io/events/read events를 읽습니다.
Microsoft.ContainerService/fleets/events/read events를 읽습니다.
Microsoft.ContainerService/fleets/extensions/daemonsets/*
Microsoft.ContainerService/fleets/extensions/deployments/*
Microsoft.ContainerService/fleets/extensions/ingresses/*
Microsoft.ContainerService/fleets/extensions/networkpolicies/*
Microsoft.ContainerService/fleets/limitranges/read limitranges를 읽습니다.
Microsoft.ContainerService/fleets/namespaces/read 네임스페이스를 읽습니다.
Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/*
Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/*
Microsoft.ContainerService/fleets/persistentvolumeclaims/*
Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/*
Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/rolebindings/*
Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/roles/*
Microsoft.ContainerService/fleets/replicationcontrollers/*
Microsoft.ContainerService/fleets/replicationcontrollers/*
Microsoft.ContainerService/fleets/resourcequotas/read resourcequotas를 읽습니다.
Microsoft.ContainerService/fleets/secrets/*
Microsoft.ContainerService/fleets/serviceaccounts/*
Microsoft.ContainerService/fleets/services/*
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants read/write access to Kubernetes resources within a namespace in the fleet-managed hub cluster - provides write permissions on most objects within a a namespace, with the exception of ResourceQuota object and the namespace object itself. Applying this role at cluster scope will give access across all namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/434fb43a-c01c-447e-9f67-c3ad923cfaba",
  "name": "434fb43a-c01c-447e-9f67-c3ad923cfaba",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.ContainerService/fleets/read",
        "Microsoft.ContainerService/fleets/listCredentials/action"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/fleets/apps/controllerrevisions/read",
        "Microsoft.ContainerService/fleets/apps/daemonsets/*",
        "Microsoft.ContainerService/fleets/apps/deployments/*",
        "Microsoft.ContainerService/fleets/apps/statefulsets/*",
        "Microsoft.ContainerService/fleets/authorization.k8s.io/localsubjectaccessreviews/write",
        "Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/*",
        "Microsoft.ContainerService/fleets/batch/cronjobs/*",
        "Microsoft.ContainerService/fleets/batch/jobs/*",
        "Microsoft.ContainerService/fleets/configmaps/*",
        "Microsoft.ContainerService/fleets/endpoints/*",
        "Microsoft.ContainerService/fleets/events.k8s.io/events/read",
        "Microsoft.ContainerService/fleets/events/read",
        "Microsoft.ContainerService/fleets/extensions/daemonsets/*",
        "Microsoft.ContainerService/fleets/extensions/deployments/*",
        "Microsoft.ContainerService/fleets/extensions/ingresses/*",
        "Microsoft.ContainerService/fleets/extensions/networkpolicies/*",
        "Microsoft.ContainerService/fleets/limitranges/read",
        "Microsoft.ContainerService/fleets/namespaces/read",
        "Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/*",
        "Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/*",
        "Microsoft.ContainerService/fleets/persistentvolumeclaims/*",
        "Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/*",
        "Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/rolebindings/*",
        "Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/roles/*",
        "Microsoft.ContainerService/fleets/replicationcontrollers/*",
        "Microsoft.ContainerService/fleets/replicationcontrollers/*",
        "Microsoft.ContainerService/fleets/resourcequotas/read",
        "Microsoft.ContainerService/fleets/secrets/*",
        "Microsoft.ContainerService/fleets/serviceaccounts/*",
        "Microsoft.ContainerService/fleets/services/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Fleet Manager RBAC Admin",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Fleet Manager RBAC 클러스터 관리자

집합 관리 허브 클러스터의 모든 Kubernetes 리소스에 대한 읽기/쓰기 권한을 부여합니다.

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.ContainerService/fleets/read 플릿을 가져옵니다.
Microsoft.ContainerService/fleets/listCredentials/action 플릿 자격 증명을 나열합니다.
NotActions
없음
DataActions
Microsoft.ContainerService/fleets/*
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants read/write access to all Kubernetes resources in the fleet-managed hub cluster.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/18ab4d3d-a1bf-4477-8ad9-8359bc988f69",
  "name": "18ab4d3d-a1bf-4477-8ad9-8359bc988f69",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.ContainerService/fleets/read",
        "Microsoft.ContainerService/fleets/listCredentials/action"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/fleets/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Fleet Manager RBAC Cluster Admin",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Fleet Manager RBAC 읽기 권한자

집합 관리 허브 클러스터의 네임스페이스 내 대부분의 Kubernetes 리소스에 대한 읽기 전용 액세스 권한을 부여합니다. 역할이나 역할 바인딩 보기는 허용되지 않습니다. 비밀의 콘텐츠를 읽으면 네임스페이스의 ServiceAccount 자격 증명에 액세스할 수 있으므로 이 역할은 비밀 보기를 허용하지 않습니다. 그러면 네임스페이스의 모든 ServiceAccount로 API 액세스가 허용됩니다(권한 상승의 한 형태). 클러스터 범위에서 이 역할을 적용하면 모든 네임스페이스에 대한 액세스 권한이 부여됩니다.

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.ContainerService/fleets/read 플릿을 가져옵니다.
Microsoft.ContainerService/fleets/listCredentials/action 플릿 자격 증명을 나열합니다.
NotActions
없음
DataActions
Microsoft.ContainerService/fleets/apps/controllerrevisions/read controllerrevisions를 읽습니다.
Microsoft.ContainerService/fleets/apps/daemonsets/read daemonsets를 읽습니다.
Microsoft.ContainerService/fleets/apps/deployments/read deployments를 읽습니다.
Microsoft.ContainerService/fleets/apps/statefulsets/read statefulsets를 읽습니다.
Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/read horizontalpodautoscalers를 읽습니다.
Microsoft.ContainerService/fleets/batch/cronjobs/read cronjobs를 읽습니다.
Microsoft.ContainerService/fleets/batch/jobs/read 작업을 읽습니다.
Microsoft.ContainerService/fleets/configmaps/read configmaps를 읽습니다.
Microsoft.ContainerService/fleets/endpoints/read 엔드포인트를 읽습니다.
Microsoft.ContainerService/fleets/events.k8s.io/events/read events를 읽습니다.
Microsoft.ContainerService/fleets/events/read events를 읽습니다.
Microsoft.ContainerService/fleets/extensions/daemonsets/read daemonsets를 읽습니다.
Microsoft.ContainerService/fleets/extensions/deployments/read deployments를 읽습니다.
Microsoft.ContainerService/fleets/extensions/ingresses/read ingresses를 읽습니다.
Microsoft.ContainerService/fleets/extensions/networkpolicies/read networkpolicies를 읽습니다.
Microsoft.ContainerService/fleets/limitranges/read limitranges를 읽습니다.
Microsoft.ContainerService/fleets/namespaces/read 네임스페이스를 읽습니다.
Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/read ingresses를 읽습니다.
Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/read networkpolicies를 읽습니다.
Microsoft.ContainerService/fleets/persistentvolumeclaims/read persistentvolumeclaims를 읽습니다.
Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/read poddisruptionbudgets를 읽습니다.
Microsoft.ContainerService/fleets/replicationcontrollers/read replicationcontrollers를 읽습니다.
Microsoft.ContainerService/fleets/replicationcontrollers/read replicationcontrollers를 읽습니다.
Microsoft.ContainerService/fleets/resourcequotas/read resourcequotas를 읽습니다.
Microsoft.ContainerService/fleets/serviceaccounts/read serviceaccounts를 읽습니다.
Microsoft.ContainerService/fleets/services/read services를 읽습니다.
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants read-only access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation).  Applying this role at cluster scope will give access across all namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/30b27cfc-9c84-438e-b0ce-70e35255df80",
  "name": "30b27cfc-9c84-438e-b0ce-70e35255df80",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.ContainerService/fleets/read",
        "Microsoft.ContainerService/fleets/listCredentials/action"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/fleets/apps/controllerrevisions/read",
        "Microsoft.ContainerService/fleets/apps/daemonsets/read",
        "Microsoft.ContainerService/fleets/apps/deployments/read",
        "Microsoft.ContainerService/fleets/apps/statefulsets/read",
        "Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/read",
        "Microsoft.ContainerService/fleets/batch/cronjobs/read",
        "Microsoft.ContainerService/fleets/batch/jobs/read",
        "Microsoft.ContainerService/fleets/configmaps/read",
        "Microsoft.ContainerService/fleets/endpoints/read",
        "Microsoft.ContainerService/fleets/events.k8s.io/events/read",
        "Microsoft.ContainerService/fleets/events/read",
        "Microsoft.ContainerService/fleets/extensions/daemonsets/read",
        "Microsoft.ContainerService/fleets/extensions/deployments/read",
        "Microsoft.ContainerService/fleets/extensions/ingresses/read",
        "Microsoft.ContainerService/fleets/extensions/networkpolicies/read",
        "Microsoft.ContainerService/fleets/limitranges/read",
        "Microsoft.ContainerService/fleets/namespaces/read",
        "Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/read",
        "Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/read",
        "Microsoft.ContainerService/fleets/persistentvolumeclaims/read",
        "Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/read",
        "Microsoft.ContainerService/fleets/replicationcontrollers/read",
        "Microsoft.ContainerService/fleets/replicationcontrollers/read",
        "Microsoft.ContainerService/fleets/resourcequotas/read",
        "Microsoft.ContainerService/fleets/serviceaccounts/read",
        "Microsoft.ContainerService/fleets/services/read"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Fleet Manager RBAC Reader",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Fleet Manager RBAC 작성자

Fleet 관리형 허브 클러스터의 네임스페이스 내에서 대부분의 Kubernetes 리소스에 대한 읽기/쓰기 권한을 부여합니다. 이 역할은 보기 또는 수정 역할 또는 역할 바인딩을 허용하지 않습니다. 그러나 이 역할을 사용하여 네임스페이스의 ServiceAccount로 비밀에 액세스할 수 있으므로 네임스페이스에 있는 모든 ServiceAccount의 API 액세스 수준을 얻을 수 있습니다.  클러스터 범위에서 이 역할을 적용하면 모든 네임스페이스에 대한 액세스 권한이 부여됩니다.

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.ContainerService/fleets/read 플릿을 가져옵니다.
Microsoft.ContainerService/fleets/listCredentials/action 플릿 자격 증명을 나열합니다.
NotActions
없음
DataActions
Microsoft.ContainerService/fleets/apps/controllerrevisions/read controllerrevisions를 읽습니다.
Microsoft.ContainerService/fleets/apps/daemonsets/*
Microsoft.ContainerService/fleets/apps/deployments/*
Microsoft.ContainerService/fleets/apps/statefulsets/*
Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/*
Microsoft.ContainerService/fleets/batch/cronjobs/*
Microsoft.ContainerService/fleets/batch/jobs/*
Microsoft.ContainerService/fleets/configmaps/*
Microsoft.ContainerService/fleets/endpoints/*
Microsoft.ContainerService/fleets/events.k8s.io/events/read events를 읽습니다.
Microsoft.ContainerService/fleets/events/read events를 읽습니다.
Microsoft.ContainerService/fleets/extensions/daemonsets/*
Microsoft.ContainerService/fleets/extensions/deployments/*
Microsoft.ContainerService/fleets/extensions/ingresses/*
Microsoft.ContainerService/fleets/extensions/networkpolicies/*
Microsoft.ContainerService/fleets/limitranges/read limitranges를 읽습니다.
Microsoft.ContainerService/fleets/namespaces/read 네임스페이스를 읽습니다.
Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/*
Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/*
Microsoft.ContainerService/fleets/persistentvolumeclaims/*
Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/*
Microsoft.ContainerService/fleets/replicationcontrollers/*
Microsoft.ContainerService/fleets/replicationcontrollers/*
Microsoft.ContainerService/fleets/resourcequotas/read resourcequotas를 읽습니다.
Microsoft.ContainerService/fleets/secrets/*
Microsoft.ContainerService/fleets/serviceaccounts/*
Microsoft.ContainerService/fleets/services/*
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants read/write access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace.  Applying this role at cluster scope will give access across all namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/5af6afb3-c06c-4fa4-8848-71a8aee05683",
  "name": "5af6afb3-c06c-4fa4-8848-71a8aee05683",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.ContainerService/fleets/read",
        "Microsoft.ContainerService/fleets/listCredentials/action"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/fleets/apps/controllerrevisions/read",
        "Microsoft.ContainerService/fleets/apps/daemonsets/*",
        "Microsoft.ContainerService/fleets/apps/deployments/*",
        "Microsoft.ContainerService/fleets/apps/statefulsets/*",
        "Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/*",
        "Microsoft.ContainerService/fleets/batch/cronjobs/*",
        "Microsoft.ContainerService/fleets/batch/jobs/*",
        "Microsoft.ContainerService/fleets/configmaps/*",
        "Microsoft.ContainerService/fleets/endpoints/*",
        "Microsoft.ContainerService/fleets/events.k8s.io/events/read",
        "Microsoft.ContainerService/fleets/events/read",
        "Microsoft.ContainerService/fleets/extensions/daemonsets/*",
        "Microsoft.ContainerService/fleets/extensions/deployments/*",
        "Microsoft.ContainerService/fleets/extensions/ingresses/*",
        "Microsoft.ContainerService/fleets/extensions/networkpolicies/*",
        "Microsoft.ContainerService/fleets/limitranges/read",
        "Microsoft.ContainerService/fleets/namespaces/read",
        "Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/*",
        "Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/*",
        "Microsoft.ContainerService/fleets/persistentvolumeclaims/*",
        "Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/*",
        "Microsoft.ContainerService/fleets/replicationcontrollers/*",
        "Microsoft.ContainerService/fleets/replicationcontrollers/*",
        "Microsoft.ContainerService/fleets/resourcequotas/read",
        "Microsoft.ContainerService/fleets/secrets/*",
        "Microsoft.ContainerService/fleets/serviceaccounts/*",
        "Microsoft.ContainerService/fleets/services/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Fleet Manager RBAC Writer",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service Arc 클러스터 관리자 역할

클러스터 관리자 자격 증명 작업을 나열합니다.

자세한 정보

작업 설명
Microsoft.HybridContainerService/provisionedClusterInstances/read 연결된 클러스터와 연결된 하이브리드 AKS 프로비전된 클러스터 인스턴스를 가져옵니다.
Microsoft.HybridContainerService/provisionedClusterInstances/listAdminKubeconfig/action 직접 모드에서만 사용되는 프로비전된 클러스터 인스턴스의 관리자 자격 증명을 나열합니다.
Microsoft.Kubernetes/connectedClusters/Read connectedClusters를 읽습니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "List cluster admin credential action.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/b29efa5f-7782-4dc3-9537-4d5bc70a5e9f",
  "name": "b29efa5f-7782-4dc3-9537-4d5bc70a5e9f",
  "permissions": [
    {
      "actions": [
        "Microsoft.HybridContainerService/provisionedClusterInstances/read",
        "Microsoft.HybridContainerService/provisionedClusterInstances/listAdminKubeconfig/action",
        "Microsoft.Kubernetes/connectedClusters/Read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Arc Cluster Admin Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service Arc 클러스터 사용자 역할

클러스터 사용자 자격 증명 작업을 나열합니다.

자세한 정보

작업 설명
Microsoft.HybridContainerService/provisionedClusterInstances/read 연결된 클러스터와 연결된 하이브리드 AKS 프로비전된 클러스터 인스턴스를 가져옵니다.
Microsoft.HybridContainerService/provisionedClusterInstances/listUserKubeconfig/action 직접 모드에서만 사용되는 프로비전된 클러스터 인스턴스의 AAD 사용자 자격 증명을 나열합니다.
Microsoft.Kubernetes/connectedClusters/Read connectedClusters를 읽습니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "List cluster user credential action.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/233ca253-b031-42ff-9fba-87ef12d6b55f",
  "name": "233ca253-b031-42ff-9fba-87ef12d6b55f",
  "permissions": [
    {
      "actions": [
        "Microsoft.HybridContainerService/provisionedClusterInstances/read",
        "Microsoft.HybridContainerService/provisionedClusterInstances/listUserKubeconfig/action",
        "Microsoft.Kubernetes/connectedClusters/Read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Arc Cluster User Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service Arc 기여자 역할

Azure Kubernetes Services 하이브리드 클러스터를 읽고 쓸 수 있는 액세스 권한 부여

자세한 정보

작업 설명
Microsoft.HybridContainerService/Locations/operationStatuses/read operationStatuses 읽기
Microsoft.HybridContainerService/Operations/read 읽기 작업
Microsoft.HybridContainerService/kubernetesVersions/read 기본 사용자 지정 위치에서 지원되는 kubernetes 버전을 나열합니다.
Microsoft.HybridContainerService/kubernetesVersions/write kubernetes 버전 리소스 종류 배치
Microsoft.HybridContainerService/kubernetesVersions/delete kubernetes 버전 리소스 종류 삭제
Microsoft.HybridContainerService/provisionedClusterInstances/read 연결된 클러스터와 연결된 하이브리드 AKS 프로비전된 클러스터 인스턴스를 가져옵니다.
Microsoft.HybridContainerService/provisionedClusterInstances/write 하이브리드 AKS 프로비저닝된 클러스터 인스턴스를 만듭니다.
Microsoft.HybridContainerService/provisionedClusterInstances/delete 하이브리드 AKS 프로비전된 클러스터 인스턴스를 삭제합니다.
Microsoft.HybridContainerService/provisionedClusterInstances/agentPools/read 하이브리드 AKS 프로비저닝된 클러스터 인스턴스의 에이전트 풀을 가져옵니다.
Microsoft.HybridContainerService/provisionedClusterInstances/agentPools/write 하이브리드 AKS 프로비전된 클러스터 인스턴스에서 에이전트 풀을 업데이트합니다.
Microsoft.HybridContainerService/provisionedClusterInstances/agentPools/delete 하이브리드 AKS 프로비전된 클러스터 인스턴스에서 에이전트 풀을 삭제합니다.
Microsoft.HybridContainerService/provisionedClusterInstances/upgradeProfiles/read upgradeProfiles 읽기
Microsoft.HybridContainerService/skus/read 기본 사용자 지정 위치에서 지원되는 VM SKU를 나열합니다.
Microsoft.HybridContainerService/sus/write VM SKU 리소스 종류 배치
Microsoft.HybridContainerService/sus/delete Vm Sku 리소스 유형을 삭제합니다.
Microsoft.HybridContainerService/virtualNetworks/read 구독별 하이브리드 AKS 가상 네트워크 나열
Microsoft.HybridContainerService/virtualNetworks/write 하이브리드 AKS 가상 네트워크 패치
Microsoft.HybridContainerService/virtualNetworks/delete 하이브리드 AKS 가상 네트워크를 삭제합니다.
Microsoft.ExtendedLocation/customLocations/deploy/action 사용자 지정 위치 리소스에 대한 권한을 배포합니다.
Microsoft.ExtendedLocation/customLocations/read 사용자 지정 위치 리소스를 가져옵니다.
Microsoft.Kubernetes/connectedClusters/Read connectedClusters를 읽습니다.
Microsoft.Kubernetes/connectedClusters/Write connectedClusters를 씁니다.
Microsoft.Kubernetes/connectedClusters/Delete connectedClusters를 삭제합니다.
Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action clusterUser 자격 증명 나열
Microsoft.AzureStackHCI/clusters/read 클러스터를 가져옵니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants access to read and write Azure Kubernetes Services hybrid clusters",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/5d3f1697-4507-4d08-bb4a-477695db5f82",
  "name": "5d3f1697-4507-4d08-bb4a-477695db5f82",
  "permissions": [
    {
      "actions": [
        "Microsoft.HybridContainerService/Locations/operationStatuses/read",
        "Microsoft.HybridContainerService/Operations/read",
        "Microsoft.HybridContainerService/kubernetesVersions/read",
        "Microsoft.HybridContainerService/kubernetesVersions/write",
        "Microsoft.HybridContainerService/kubernetesVersions/delete",
        "Microsoft.HybridContainerService/provisionedClusterInstances/read",
        "Microsoft.HybridContainerService/provisionedClusterInstances/write",
        "Microsoft.HybridContainerService/provisionedClusterInstances/delete",
        "Microsoft.HybridContainerService/provisionedClusterInstances/agentPools/read",
        "Microsoft.HybridContainerService/provisionedClusterInstances/agentPools/write",
        "Microsoft.HybridContainerService/provisionedClusterInstances/agentPools/delete",
        "Microsoft.HybridContainerService/provisionedClusterInstances/upgradeProfiles/read",
        "Microsoft.HybridContainerService/skus/read",
        "Microsoft.HybridContainerService/skus/write",
        "Microsoft.HybridContainerService/skus/delete",
        "Microsoft.HybridContainerService/virtualNetworks/read",
        "Microsoft.HybridContainerService/virtualNetworks/write",
        "Microsoft.HybridContainerService/virtualNetworks/delete",
        "Microsoft.ExtendedLocation/customLocations/deploy/action",
        "Microsoft.ExtendedLocation/customLocations/read",
        "Microsoft.Kubernetes/connectedClusters/Read",
        "Microsoft.Kubernetes/connectedClusters/Write",
        "Microsoft.Kubernetes/connectedClusters/Delete",
        "Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action",
        "Microsoft.AzureStackHCI/clusters/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Arc Contributor Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service 클러스터 관리자 역할

클러스터 관리자 자격 증명 작업을 나열합니다.

자세한 정보

작업 설명
Microsoft.ContainerService/managedClusters/listClusterAdminCredential/action 관리형 클러스터의 clusterAdmin 자격 증명 나열
Microsoft.ContainerService/managedClusters/accessProfiles/listCredential/action 목록 자격 증명을 사용하여 역할 이름으로 관리형 클러스터 액세스 프로필 가져오기
Microsoft.ContainerService/managedClusters/read 관리형 클러스터 가져오기
Microsoft.ContainerService/managedClusters/runcommand/action 관리되는 kubernetes 서버에 대해 사용자가 실행한 명령을 실행합니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "List cluster admin credential action.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/0ab0b1a8-8aac-4efd-b8c2-3ee1fb270be8",
  "name": "0ab0b1a8-8aac-4efd-b8c2-3ee1fb270be8",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerService/managedClusters/listClusterAdminCredential/action",
        "Microsoft.ContainerService/managedClusters/accessProfiles/listCredential/action",
        "Microsoft.ContainerService/managedClusters/read",
        "Microsoft.ContainerService/managedClusters/runcommand/action"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Cluster Admin Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service 클러스터 모니터링 사용자

클러스터 모니터링 사용자 자격 증명 작업을 나열합니다.

actions 설명
Microsoft.ContainerService/managedClusters/listClusterMonitoringUserCredential/action 관리형 클러스터의 clusterMonitoringUser 자격 증명을 나열합니다.
Microsoft.ContainerService/managedClusters/read 관리형 클러스터 가져오기
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "List cluster monitoring user credential action.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/1afdec4b-e479-420e-99e7-f82237c7c5e6",
  "name": "1afdec4b-e479-420e-99e7-f82237c7c5e6",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerService/managedClusters/listClusterMonitoringUserCredential/action",
        "Microsoft.ContainerService/managedClusters/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Cluster Monitoring User",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service 클러스터 사용자 역할

클러스터 사용자 자격 증명 작업을 나열합니다.

자세한 정보

작업 설명
Microsoft.ContainerService/managedClusters/listClusterUserCredential/action 관리형 클러스터의 clusterUser 자격 증명 나열
Microsoft.ContainerService/managedClusters/read 관리형 클러스터 가져오기
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "List cluster user credential action.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/4abbcc35-e782-43d8-92c5-2d3f1bd2253f",
  "name": "4abbcc35-e782-43d8-92c5-2d3f1bd2253f",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerService/managedClusters/listClusterUserCredential/action",
        "Microsoft.ContainerService/managedClusters/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Cluster User Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service 기여자 역할

Azure Kubernetes Service 클러스터를 읽고 쓰기 위한 액세스 권한을 부여합니다.

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.ContainerService/locations/* ContainerService 리소스에 사용할 수 있는 위치 읽기
Microsoft.ContainerService/managedClusters/* 관리형 클러스터 만들기 및 관리
Microsoft.ContainerService/managedclustersnapshots/* 관리형 클러스터 스냅샷 만들기 및 관리
Microsoft.ContainerService/snapshots/* 스냅샷 만들기 및 관리
Microsoft.Insights/alertRules/* 클래식 메트릭 경고를 만들고 관리합니다.
Microsoft.Resources/deployments/* 배포를 만들고 관리합니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants access to read and write Azure Kubernetes Service clusters",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/ed7f3fbd-7b88-4dd4-9017-9adb7ce333f8",
  "name": "ed7f3fbd-7b88-4dd4-9017-9adb7ce333f8",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.ContainerService/locations/*",
        "Microsoft.ContainerService/managedClusters/*",
        "Microsoft.ContainerService/managedclustersnapshots/*",
        "Microsoft.ContainerService/snapshots/*",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/*",
        "Microsoft.Resources/subscriptions/resourceGroups/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Contributor Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service RBAC 관리자

리소스 할당량 및 네임스페이스 업데이트 또는 삭제를 제외하고 클러스터/네임스페이스의 모든 리소스를 관리할 수 있습니다.

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.ContainerService/managedClusters/listClusterUserCredential/action 관리형 클러스터의 clusterUser 자격 증명 나열
NotActions
없음
DataActions
Microsoft.ContainerService/managedClusters/*
NotDataActions
Microsoft.ContainerService/managedClusters/resourcequotas/write resourcequotas를 씁니다.
Microsoft.ContainerService/managedClusters/resourcequotas/delete resourcequotas를 삭제합니다.
Microsoft.ContainerService/managedClusters/namespaces/write 네임스페이스를 씁니다.
Microsoft.ContainerService/managedClusters/namespaces/delete 네임스페이스를 삭제합니다.
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/3498e952-d568-435e-9b2c-8d77e338d7f7",
  "name": "3498e952-d568-435e-9b2c-8d77e338d7f7",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.ContainerService/managedClusters/listClusterUserCredential/action"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/managedClusters/*"
      ],
      "notDataActions": [
        "Microsoft.ContainerService/managedClusters/resourcequotas/write",
        "Microsoft.ContainerService/managedClusters/resourcequotas/delete",
        "Microsoft.ContainerService/managedClusters/namespaces/write",
        "Microsoft.ContainerService/managedClusters/namespaces/delete"
      ]
    }
  ],
  "roleName": "Azure Kubernetes Service RBAC Admin",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service RBAC 클러스터 관리자

클러스터의 모든 리소스를 관리할 수 있습니다.

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.ContainerService/managedClusters/listClusterUserCredential/action 관리형 클러스터의 clusterUser 자격 증명 나열
NotActions
없음
DataActions
Microsoft.ContainerService/managedClusters/*
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you manage all resources in the cluster.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/b1ff04bb-8a4e-4dc4-8eb5-8693973ce19b",
  "name": "b1ff04bb-8a4e-4dc4-8eb5-8693973ce19b",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.ContainerService/managedClusters/listClusterUserCredential/action"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/managedClusters/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service RBAC Cluster Admin",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service RBAC 읽기 권한자

네임스페이스에 있는 대부분의 개체를 볼 수 있는 읽기 전용 권한을 허용합니다. 역할이나 역할 바인딩 보기는 허용되지 않습니다. 비밀의 콘텐츠를 읽으면 네임스페이스의 ServiceAccount 자격 증명에 액세스할 수 있으므로 이 역할은 비밀 보기를 허용하지 않습니다. 그러면 네임스페이스의 모든 ServiceAccount로 API 액세스가 허용됩니다(권한 상승의 한 형태). 클러스터 범위에서 이 역할을 적용하면 모든 네임스페이스에 대한 액세스 권한이 부여됩니다.

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
NotActions
없음
DataActions
Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read controllerrevisions를 읽습니다.
Microsoft.ContainerService/managedClusters/apps/daemonsets/read daemonsets를 읽습니다.
Microsoft.ContainerService/managedClusters/apps/deployments/read deployments를 읽습니다.
Microsoft.ContainerService/managedClusters/apps/replicasets/read replicasets를 읽습니다.
Microsoft.ContainerService/managedClusters/apps/statefulsets/read statefulsets를 읽습니다.
Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/read horizontalpodautoscalers를 읽습니다.
Microsoft.ContainerService/managedClusters/batch/cronjobs/read cronjobs를 읽습니다.
Microsoft.ContainerService/managedClusters/batch/jobs/read 작업을 읽습니다.
Microsoft.ContainerService/managedClusters/configmaps/read configmaps를 읽습니다.
Microsoft.ContainerService/managedClusters/discovery.k8s.io/endpointslices/read 엔드포인트를 읽습니다.
Microsoft.ContainerService/managedClusters/endpoints/read 엔드포인트를 읽습니다.
Microsoft.ContainerService/managedClusters/events.k8s.io/events/read events를 읽습니다.
Microsoft.ContainerService/managedClusters/events/read events를 읽습니다.
Microsoft.ContainerService/managedClusters/extensions/daemonsets/read daemonsets를 읽습니다.
Microsoft.ContainerService/managedClusters/extensions/deployments/read deployments를 읽습니다.
Microsoft.ContainerService/managedClusters/extensions/ingresses/read ingresses를 읽습니다.
Microsoft.ContainerService/managedClusters/extensions/networkpolicies/read networkpolicies를 읽습니다.
Microsoft.ContainerService/managedClusters/extensions/replicasets/read replicasets를 읽습니다.
Microsoft.ContainerService/managedClusters/limitranges/read limitranges를 읽습니다.
Microsoft.ContainerService/managedClusters/metrics.k8s.io/pods/read pods를 읽습니다.
Microsoft.ContainerService/managedClusters/metrics.k8s.io/nodes/read nodes를 읽습니다.
Microsoft.ContainerService/managedClusters/namespaces/read 네임스페이스를 읽습니다.
Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/read ingresses를 읽습니다.
Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/read networkpolicies를 읽습니다.
Microsoft.ContainerService/managedClusters/persistentvolumeclaims/read persistentvolumeclaims를 읽습니다.
Microsoft.ContainerService/managedClusters/pods/read pods를 읽습니다.
Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/read poddisruptionbudgets를 읽습니다.
Microsoft.ContainerService/managedClusters/replicationcontrollers/read replicationcontrollers를 읽습니다.
Microsoft.ContainerService/managedClusters/resourcequotas/read resourcequotas를 읽습니다.
Microsoft.ContainerService/managedClusters/serviceaccounts/read serviceaccounts를 읽습니다.
Microsoft.ContainerService/managedClusters/services/read services를 읽습니다.
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Allows read-only access to see most objects in a namespace. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/7f6c6a51-bcf8-42ba-9220-52d62157d7db",
  "name": "7f6c6a51-bcf8-42ba-9220-52d62157d7db",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read",
        "Microsoft.ContainerService/managedClusters/apps/daemonsets/read",
        "Microsoft.ContainerService/managedClusters/apps/deployments/read",
        "Microsoft.ContainerService/managedClusters/apps/replicasets/read",
        "Microsoft.ContainerService/managedClusters/apps/statefulsets/read",
        "Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/read",
        "Microsoft.ContainerService/managedClusters/batch/cronjobs/read",
        "Microsoft.ContainerService/managedClusters/batch/jobs/read",
        "Microsoft.ContainerService/managedClusters/configmaps/read",
        "Microsoft.ContainerService/managedClusters/discovery.k8s.io/endpointslices/read",
        "Microsoft.ContainerService/managedClusters/endpoints/read",
        "Microsoft.ContainerService/managedClusters/events.k8s.io/events/read",
        "Microsoft.ContainerService/managedClusters/events/read",
        "Microsoft.ContainerService/managedClusters/extensions/daemonsets/read",
        "Microsoft.ContainerService/managedClusters/extensions/deployments/read",
        "Microsoft.ContainerService/managedClusters/extensions/ingresses/read",
        "Microsoft.ContainerService/managedClusters/extensions/networkpolicies/read",
        "Microsoft.ContainerService/managedClusters/extensions/replicasets/read",
        "Microsoft.ContainerService/managedClusters/limitranges/read",
        "Microsoft.ContainerService/managedClusters/metrics.k8s.io/pods/read",
        "Microsoft.ContainerService/managedClusters/metrics.k8s.io/nodes/read",
        "Microsoft.ContainerService/managedClusters/namespaces/read",
        "Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/read",
        "Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/read",
        "Microsoft.ContainerService/managedClusters/persistentvolumeclaims/read",
        "Microsoft.ContainerService/managedClusters/pods/read",
        "Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/read",
        "Microsoft.ContainerService/managedClusters/replicationcontrollers/read",
        "Microsoft.ContainerService/managedClusters/resourcequotas/read",
        "Microsoft.ContainerService/managedClusters/serviceaccounts/read",
        "Microsoft.ContainerService/managedClusters/services/read"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service RBAC Reader",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service RBAC 쓰기 권한자

네임스페이스에 있는 대부분의 개체에 대해 읽기/쓰기 액세스 권한을 허용합니다. 이 역할은 보기 또는 수정 역할 또는 역할 바인딩을 허용하지 않습니다. 하지만 이 역할을 사용하면 네임스페이스의 모든 ServiceAccount로 보안 비밀에 액세스하고 Pod를 실행할 수 있으므로 네임스페이스에 있는 모든 ServiceAccount의 API 액세스 수준을 얻는 데 사용할 수 있습니다. 클러스터 범위에서 이 역할을 적용하면 모든 네임스페이스에 대한 액세스 권한이 부여됩니다.

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
NotActions
없음
DataActions
Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read controllerrevisions를 읽습니다.
Microsoft.ContainerService/managedClusters/apps/daemonsets/*
Microsoft.ContainerService/managedClusters/apps/deployments/*
Microsoft.ContainerService/managedClusters/apps/replicasets/*
Microsoft.ContainerService/managedClusters/apps/statefulsets/*
Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/*
Microsoft.ContainerService/managedClusters/batch/cronjobs/*
Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/read 임대를 읽습니다.
Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/write 임대를 씁니다.
Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/delete 임대를 삭제합니다.
Microsoft.ContainerService/managedClusters/discovery.k8s.io/endpointslices/read 엔드포인트를 읽습니다.
Microsoft.ContainerService/managedClusters/batch/jobs/*
Microsoft.ContainerService/managedClusters/configmaps/*
Microsoft.ContainerService/managedClusters/endpoints/*
Microsoft.ContainerService/managedClusters/events.k8s.io/events/read events를 읽습니다.
Microsoft.ContainerService/managedClusters/events/*
Microsoft.ContainerService/managedClusters/extensions/daemonsets/*
Microsoft.ContainerService/managedClusters/extensions/deployments/*
Microsoft.ContainerService/managedClusters/extensions/ingresses/*
Microsoft.ContainerService/managedClusters/extensions/networkpolicies/*
Microsoft.ContainerService/managedClusters/extensions/replicasets/*
Microsoft.ContainerService/managedClusters/limitranges/read limitranges를 읽습니다.
Microsoft.ContainerService/managedClusters/metrics.k8s.io/pods/read pods를 읽습니다.
Microsoft.ContainerService/managedClusters/metrics.k8s.io/nodes/read nodes를 읽습니다.
Microsoft.ContainerService/managedClusters/namespaces/read 네임스페이스를 읽습니다.
Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/*
Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/*
Microsoft.ContainerService/managedClusters/persistentvolumeclaims/*
Microsoft.ContainerService/managedClusters/pods/*
Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/*
Microsoft.ContainerService/managedClusters/replicationcontrollers/*
Microsoft.ContainerService/managedClusters/resourcequotas/read resourcequotas를 읽습니다.
Microsoft.ContainerService/managedClusters/secrets/*
Microsoft.ContainerService/managedClusters/serviceaccounts/*
Microsoft.ContainerService/managedClusters/services/*
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Allows read/write access to most objects in a namespace.This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets and running Pods as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/a7ffa36f-339b-4b5c-8bdf-e2c188b2c0eb",
  "name": "a7ffa36f-339b-4b5c-8bdf-e2c188b2c0eb",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read",
        "Microsoft.ContainerService/managedClusters/apps/daemonsets/*",
        "Microsoft.ContainerService/managedClusters/apps/deployments/*",
        "Microsoft.ContainerService/managedClusters/apps/replicasets/*",
        "Microsoft.ContainerService/managedClusters/apps/statefulsets/*",
        "Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/*",
        "Microsoft.ContainerService/managedClusters/batch/cronjobs/*",
        "Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/read",
        "Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/write",
        "Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/delete",
        "Microsoft.ContainerService/managedClusters/discovery.k8s.io/endpointslices/read",
        "Microsoft.ContainerService/managedClusters/batch/jobs/*",
        "Microsoft.ContainerService/managedClusters/configmaps/*",
        "Microsoft.ContainerService/managedClusters/endpoints/*",
        "Microsoft.ContainerService/managedClusters/events.k8s.io/events/read",
        "Microsoft.ContainerService/managedClusters/events/*",
        "Microsoft.ContainerService/managedClusters/extensions/daemonsets/*",
        "Microsoft.ContainerService/managedClusters/extensions/deployments/*",
        "Microsoft.ContainerService/managedClusters/extensions/ingresses/*",
        "Microsoft.ContainerService/managedClusters/extensions/networkpolicies/*",
        "Microsoft.ContainerService/managedClusters/extensions/replicasets/*",
        "Microsoft.ContainerService/managedClusters/limitranges/read",
        "Microsoft.ContainerService/managedClusters/metrics.k8s.io/pods/read",
        "Microsoft.ContainerService/managedClusters/metrics.k8s.io/nodes/read",
        "Microsoft.ContainerService/managedClusters/namespaces/read",
        "Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/*",
        "Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/*",
        "Microsoft.ContainerService/managedClusters/persistentvolumeclaims/*",
        "Microsoft.ContainerService/managedClusters/pods/*",
        "Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/*",
        "Microsoft.ContainerService/managedClusters/replicationcontrollers/*",
        "Microsoft.ContainerService/managedClusters/resourcequotas/read",
        "Microsoft.ContainerService/managedClusters/secrets/*",
        "Microsoft.ContainerService/managedClusters/serviceaccounts/*",
        "Microsoft.ContainerService/managedClusters/services/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service RBAC Writer",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

연결된 클러스터 관리 ID CheckAccess 판독기

연결된 클러스터 관리 ID가 checkAccess API를 호출할 수 있도록 하는 기본 제공 역할

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Built-in role that allows a Connected Cluster managed identity to call the checkAccess API",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/65a14201-8f6c-4c28-bec4-12619c5a9aaa",
  "name": "65a14201-8f6c-4c28-bec4-12619c5a9aaa",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Connected Cluster Managed Identity CheckAccess Reader",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Kubernetes 에이전트 없는 운영자

Azure Kubernetes Services에 대한 클라우드용 Microsoft Defender 액세스 권한을 부여합니다.

자세한 정보

작업 설명
Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/write 관리형 클러스터에 대한 신뢰할 수 있는 액세스 역할 바인딩 만들기 또는 업데이트
Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/read 관리형 클러스터에 대한 신뢰할 수 있는 액세스 역할 바인딩 가져오기
Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/delete 관리형 클러스터에 대한 신뢰할 수 있는 액세스 역할 바인딩 삭제
Microsoft.ContainerService/managedClusters/read 관리형 클러스터 가져오기
Microsoft.Features/features/read 구독의 기능을 가져옵니다.
Microsoft.Features/providers/features/read 지정된 리소스 공급자에서 구독의 기능을 가져옵니다.
Microsoft.Features/providers/features/register/action 지정된 리소스 공급자에 구독에 대한 기능을 등록합니다.
Microsoft.Security/pricings/securityoperators/read 범위에 대한 보안 연산자를 가져옵니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants Microsoft Defender for Cloud access to Azure Kubernetes Services",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/d5a2ae44-610b-4500-93be-660a0c5f5ca6",
  "name": "d5a2ae44-610b-4500-93be-660a0c5f5ca6",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/write",
        "Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/read",
        "Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/delete",
        "Microsoft.ContainerService/managedClusters/read",
        "Microsoft.Features/features/read",
        "Microsoft.Features/providers/features/read",
        "Microsoft.Features/providers/features/register/action",
        "Microsoft.Security/pricings/securityoperators/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Kubernetes Agentless Operator",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Kubernetes 클러스터 - Azure Arc 온보딩

ConnectedClusters 리소스를 만들기 위해 모든 사용자/서비스에 권한을 부여하는 역할 정의

자세한 정보

작업 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Insights/alertRules/* 클래식 메트릭 경고를 만들고 관리합니다.
Microsoft.Resources/deployments/write 배포를 만들거나 업데이트합니다.
Microsoft.Resources/subscriptions/operationresults/read 구독 작업 결과를 가져옵니다.
Microsoft.Resources/subscriptions/read 구독 목록을 가져옵니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.Kubernetes/connectedClusters/Write connectedClusters를 씁니다.
Microsoft.Kubernetes/connectedClusters/read connectedClusters를 읽습니다.
Microsoft.Support/* 지원 티켓을 만들거나 업데이트합니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Role definition to authorize any user/service to create connectedClusters resource",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/34e09817-6cbe-4d01-b1a2-e0eac5743d41",
  "name": "34e09817-6cbe-4d01-b1a2-e0eac5743d41",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/write",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Kubernetes/connectedClusters/Write",
        "Microsoft.Kubernetes/connectedClusters/read",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Kubernetes Cluster - Azure Arc Onboarding",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Kubernetes 확장 기여자

Kubernetes 확장을 만들고, 업데이트하고, 가져오고, 나열 및 삭제하고, 확장 비동기 작업을 가져올 수 있습니다.

actions 설명
Microsoft.Authorization/*/read 역할 및 역할 할당 읽기
Microsoft.Insights/alertRules/* 클래식 메트릭 경고를 만들고 관리합니다.
Microsoft.Resources/deployments/* 배포를 만들고 관리합니다.
Microsoft.Resources/subscriptions/resourceGroups/read 리소스 그룹을 가져오거나 나열합니다.
Microsoft.KubernetesConfiguration/extensions/write 확장 리소스를 만들거나 업데이트합니다.
Microsoft.KubernetesConfiguration/extensions/read 확장 인스턴스 리소스를 가져옵니다.
Microsoft.KubernetesConfiguration/extensions/delete 확장 인스턴스 리소스를 삭제합니다.
Microsoft.KubernetesConfiguration/extensions/operations/read 비동기 작업 상태를 가져옵니다.
NotActions
없음
DataActions
없음
NotDataActions
없음
{
  "assignableScopes": [
    "/"
  ],
  "description": "Can create, update, get, list and delete Kubernetes Extensions, and get extension async operations",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/85cb6faf-e071-4c9b-8136-154b5a04f717",
  "name": "85cb6faf-e071-4c9b-8136-154b5a04f717",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/*",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.KubernetesConfiguration/extensions/write",
        "Microsoft.KubernetesConfiguration/extensions/read",
        "Microsoft.KubernetesConfiguration/extensions/delete",
        "Microsoft.KubernetesConfiguration/extensions/operations/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Kubernetes Extension Contributor",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

다음 단계