Skip to main content

Minimal Permissions for cross account imports

By default, the Cado platform uses Azure contributor roles for cross-account permissions, it is possible to use custom roles to granularly scope the permissions required.

Valid Scopes

There are three ways to assign scope to the following permissions, these and their effects are explained below:

Assignable ScopeEffect
/providers/Microsoft.Management/managementGroups/<<GROUP ID>>Allows access to all resources in the management group where the Cado app registration was created, typically allows access at the root of an Azure tenancy.
/subscription/<<Subscription ID>>Allows access to all resources, within a given subscription, in the tenant where the Cado app registration was created.
/subscription/<<Subscription ID>>/resourceGroups/<<Resource Group>>Allows access to a specific resource group, within a given subscription, in the tenant where the Cado app registration was created.

Storage Account

This is a scoped down replacement for the Storage Account Contributor role, the following are a list of permissions required for Azure blob storage acquisitions:

PermissionPurpose
Microsoft.Resources/subscriptions/resourceGroups/readRetrieves or lists resource groups.
Microsoft.Storage/storageAccounts/readRetrieves the storage account with the given account.
Microsoft.Storage/storageAccounts/listKeys/actionRetrieves access keys for the storage account.

Example

{
"properties": {
"roleName": "Cado Storage Role",
"description": "Required by Cado for blob based acquisitions",
"assignableScopes": [
"<<YOUR SCOPE HERE>>"
],
"permissions": [
{
"actions": [
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Storage/storageAccounts/read",
"Microsoft.Storage/storageAccounts/listKeys/action"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
]
}
}

Compute and Activity Logs

This is a scoped down replacement for the Virtual Machine Contributor, Disk Snapshot Contributor, and Monitoring Contributor roles. The following are the permissions needed for virtual machine and activity log acquisitions:

PermissionEffect
Microsoft.Compute/snapshots/writeCreate a new snapshot, or update an existing one.
Microsoft.Compute/snapshots/readRetrieve the properties of a snapshot.
Microsoft.Compute/snapshots/deleteDelete a snapshot.
Microsoft.Compute/snapshots/beginGetAccess/actionGet the SAS URI of a snapshot for download.
endGetAccess/actionMicrosoft.Compute/snapshots/Revoke a SAS URI of a given snapshot.
Microsoft.Compute/disks/beginGetAccess/actionGet the SAS URI of a disk for download.
Microsoft.Compute/disks/readRetrieve the properties of a disk.
Microsoft.Compute/virtualMachines/readRetrieve the properties of a virtual machine
Microsoft.Compute/virtualMachines/runCommand/actionExecute a predefined script on a virtual machine.
Microsoft.Insights/eventtypes/values/readRetrieve activity log events.

Example

{
"properties": {
"roleName": "Cado Compute and Activity Log Role",
"description": "Required by Cado for virtual machine based acquisitions",
"assignableScopes": [
"<<YOUR SCOPE HERE>>"
],
"permissions": [
{
"actions": [
"Microsoft.Compute/snapshots/read",
"Microsoft.Compute/snapshots/write",
"Microsoft.Compute/snapshots/delete",
"Microsoft.Compute/snapshots/beginGetAccess/action",
"Microsoft.Compute/snapshots/endGetAccess/action",
"Microsoft.Compute/disks/beginGetAccess/action",
"Microsoft.Compute/disks/read",
"Microsoft.Compute/virtualMachines/read",
"Microsoft.Compute/virtualMachines/runCommand/action",
"Microsoft.Insights/eventtypes/values/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
]
}
}

Azure Kubernetes Service

PermissionEffect
Microsoft.Resources/subscriptions/operationresults/readRetrieve subscription operation results.
Microsoft.Resources/subscriptions/readRetrieve a list of subscriptions.
Microsoft.Resources/subscriptions/resourceGroups/readRetrieve or list resource groups.
Microsoft.ContainerService/managedClusters/readRetrieve a managed cluster.
Microsoft.ContainerService/managedClusters/runCommand/actionRun a command against a managed kubernetes cluster.
Microsoft.ContainerService/managedClusters/commandResults/readRetrieve the result of a previously issued command.
Microsoft.ContainerService/managedClusters/privateEndpointConnections/readRetrieve a private endpoint connection.
Microsoft.ContainerService/managedClusters/listClusterAdminCredential/actionList the cluster admin credential of a managed cluster.

Example

{
"properties": {
"roleName": "Cado Kubernetes role",
"description": "Required by Cado for AKS based acquisitions",
"assignableScopes": [
"<<YOUR SCOPE HERE>>"
],
"permissions": [
{
"actions": [
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.ContainerService/managedClusters/read",
"Microsoft.ContainerService/managedClusters/runCommand/action",
"Microsoft.ContainerService/managedClusters/commandResults/read",
"Microsoft.ContainerService/managedClusters/privateEndpointConnections/read",
"Microsoft.ContainerService/managedClusters/listClusterAdminCredential/action"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
]
}
}