This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Get-Az Role Assignment

Lists Azure RBAC role assignments at the specified scope. By default it lists all role assignments in the selected Azure subscription. Use respective parameters to list assignments to a specific user, or to list assignments on a specific resource group or resource.

The cmdlet may call below Microsoft Graph API according to input parameters:

  • GET /users/{id}
  • GET /servicePrincipals/{id}
  • GET /groups/{id}
  • GET /directoryObjects/{id}
  • POST /directoryObjects/getByIds

Please notice that this cmdlet will mark ObjectType as Unknown in output if the object of role assignment is not found or current account has insufficient privileges to get object type.

Description

Use the Get-AzRoleAssignment command to list all role assignments that are effective on a scope. Without any parameters, this command returns all the role assignments made under the subscription. This list can be filtered using filtering parameters for principal, role and scope. The subject of the assignment must be specified. To specify a user, use SignInName or Microsoft Entra ObjectId parameters. To specify a security group, use Microsoft Entra ObjectId parameter. And to specify a Microsoft Entra application, use ServicePrincipalName or ObjectId parameters. The role that is being assigned must be specified using the RoleDefinitionName parameter. The scope at which access is being granted may be specified. It defaults to the selected subscription. The scope of the assignment can be specified using one of the following parameter combinations a. Scope - This is the fully qualified scope starting with /subscriptions/<subscriptionId>. This will filter assignments that are effective at that particular scope i.e. all assignments at that scope and above. b. ResourceGroupName - Name of any resource group under the subscription. This will filter assignments effective at the specified resource group c. ResourceName, ResourceType, ResourceGroupName and (optionally) ParentResource - Identifies a particular resource under the subscription and will filter assignments effective at that resource scope. To determine what access a particular user has in the subscription, use the ExpandPrincipalGroups switch. This will list all roles assigned to the user, and to the groups that the user is member of. Use the IncludeClassicAdministrators switch to also display the subscription admins and co-admins.

List all role assignments in the subscription

Gets all role assignments made to user [email protected], and the groups of which he is member, at the testRG scope or above.

Gets all role assignments of the specified service principal

Gets role assignments at the 'site1' website scope.

-DefaultProfile

The credentials, account, tenant, and subscription used for communication with azure

-ExpandPrincipalGroups

If specified, returns roles directly assigned to the user and to the groups of which the user is a member (transitively). Supported only for a user principal.

-IncludeClassicAdministrators

If specified, also lists subscription classic administrators (co-admins, service admins, etc.) role assignments.

The Microsoft Entra ObjectId of the User, Group or Service Principal. Filters all assignments that are made to the specified principal.

-ParentResource

The parent resource in the hierarchy of the resource specified using ResourceName parameter. Must be used in conjunction with ResourceGroupName, ResourceType, and ResourceName parameters.

-ResourceGroupName

The resource group name. Lists role assignments that are effective at the specified resource group. When used in conjunction with ResourceName, ResourceType, and ParentResource parameters, the command lists assignments effective at resources within the resource group.

-ResourceName

The resource name. For e.g. storageaccountprod. Must be used in conjunction with ResourceGroupName, ResourceType, and (optionally)ParentResource parameters.

-ResourceType

The resource type. For e.g. Microsoft.Network/virtualNetworks. Must be used in conjunction with ResourceGroupName, ResourceName, and (optionally)ParentResource parameters.

-RoleDefinitionId

Id of the Role that is assigned to the principal.

-RoleDefinitionName

Role that is assigned to the principal i.e. Reader, Contributor, Virtual Network Administrator, etc.

The Scope of the role assignment. In the format of relative URI. For e.g. /subscriptions/9004a9fd-d58e-48dc-aeb2-4a4aec58606f/resourceGroups/TestRG. It must start with "/subscriptions/{id}". The command filters all assignments that are effective at that scope.

-ServicePrincipalName

The ServicePrincipalName of the service principal. Filters all assignments that are made to the specified Microsoft Entra application.

-SignInName

The email address or the user principal name of the user. Filters all assignments that are made to the specified user.

-SkipClientSideScopeValidation

If specified, skip client side scope validation.

PSRoleAssignment

Keywords: azure, azurerm, arm, resource, management, manager, resource, group, template, deployment

Related Links

  • New-AzRoleAssignment
  • Remove-AzRoleAssignment
  • Get-AzRoleDefinition

Additional resources

PowerShell Basics: Query Azure Role Based Access Control Assignments

SoniaCuff's avatar

No Comments Be the first to comment

IMAGES

  1. List Azure AD role assignments

    azure get role assignments

  2. List Azure AD role assignments for a user

    azure get role assignments

  3. List Azure role assignments using the Azure portal

    azure get role assignments

  4. Assign Azure AD roles to groups

    azure get role assignments

  5. List Azure role assignments using the Azure portal

    azure get role assignments

  6. Assign Azure AD roles to groups

    azure get role assignments

VIDEO

  1. How to assign a role in azure azure RBAC role assignment

  2. What is PPAC

  3. How to Create and Review Role Assignments in Azure Privileged Identity Management PIM

  4. IAM and Role Assignments for Azure EventHubs and other Azure Resources

  5. Azure Resources Administration through PowerShell

  6. Privileged Identity Management with Azure AD by Dr. Abhilasha Vyas