Assigning Azure Permissions for Dynamic Permissioning
- Print
- PDF
Assigning Azure Permissions for Dynamic Permissioning
- Print
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
Within Azure, there are management groups and subscriptions. To read them, you need to assign Azure permissions to the tenant root group.
Perform the following steps to assign Azure permissions at the Tenant Root Group:
- Login to Azure with administrator privileges.
- From the Home page, select Management groups.
- Click on Tenant Root Group from the list.
- Click Access control (IAM) from the navigation menu.
- Click Role assignments tab.
- Click Add -> Add custom role.
- Enter the role name as Britive-Integration-Role in Custom role name.
- Click Next.
- Click +Add permissions.
- Search for Microsoft Authorization.
- Click the Microsoft Authorization tile.
- Select the following permissions from the displayed list:
- Read: Get Role Assignment
- Write: Create Role Assignment
- Delete: Delete Role Assignment
- Click Add.
- Click Next.
- Click Add assignable scopes.
- Select all the subscriptions and resource groups under the subscriptions.
- Click Add.
- Click Next.
- Click Edit.
- Under permissions > actions, add the following permission: "*/read",
- Click Save. A message is displayed that the role assignment is being added.
- Click Next.
- Review the role settings and click Create.
- Click the Role Assignments tab.
- Click Add.
- Click Add Role Assignment.
- Select the role created above (Britive-Integration-Role).
- Select Britive from the “select” field.
- Click Save.
The new role assignment is visible from the Role Assignments tab.
For more information about assigning Azure permissions, see Create or update Azure custom roles using the Azure portal.
Was this article helpful?