it:ad:azure:security:role:why_move_to_builtin_roles

IT:AD:Azure:Security:Role:Why Move To Builtin Roles

Summary

The Administration Roles were introduced when Azure first was introduced (ie with the IT:AD:Azure:Portal:Classic Portal).

But its simplicity caused issues.

Any Azure Service Management required full IT:AD:Azure:Security:Role:Administration:Service Administrator (SA) or IT:AD:Azure:Security:Role:Administration:Service Co-Administrator (CA) access to a IT:AD:Azure:Subscription which provided the user with full permission to do anything provisioned there-in.

This meant that a subscription typically became a security container.

For example you could provision a subscription for an application or you could provide a subscription for an environment (such as Dev / Test / Prod). Or you could provision a subscription for an application, in an environment. Either way, one ended up with many co-administrators with full control.

Obviously, not a good scenario.

The above issue is why RBAC and Resource Groups were introduced (along with the new Service Portal).

The use of Account Administrator (AA) and Service Administrator (SA) will continue, but the Co-Administrator (CA) is deprecated in favour of the use of the Contributor or Owner Role.

I suspect that now when you are defined as one of the classic *Administrator roles, you are assigned Roles from the built in roles (eg: Owner, Contributor, etc) 1) but maybe not. I have not seen a map of this.


  • /home/skysigal/public_html/data/pages/it/ad/azure/security/role/why_move_to_builtin_roles.txt
  • Last modified: 2023/11/04 23:18
  • by 127.0.0.1