Why are the Azure permissions needed for deployment and CI so high and what can we do about it? #1610
-
For manual deployment to azure using However, the CI github pipeline uses both What is the expected way of handling these permissions? Is the RAG supposed to be on an entirely separate tenat from the rest of our critical infrustructure? Are we supposed to create custom roles with very specific permissions only for certain resource groups? I have read through the docs/ folder of the repo and I still seem very confused about this. Any help would be appreciated :) |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
Hey @Farmerobot, Thanks for your feedback. I want to ensure I’ve understood your query correctly. Below is based on my understanding. Yes, we are currently using the same tenant for azd up and azd down, but this is strictly for testing the Bicep template. We ensure that the resources are destroyed immediately after the deployment is successfully verified. Having a separate tenant for the CI pipeline is certainly an option, but we would like to understand the specific reason or concern behind this suggestion. Could you please elaborate? Additionally, we can create custom roles with permissions tailored specifically to certain resource groups (RGs) to enhance security and limit access. Could you let us know your expectations or preferences regarding this setup? This will help us brainstorm and identify the best approach to meet your requirements. Happy to Discuss! |
Beta Was this translation helpful? Give feedback.
Hey @Farmerobot, Thanks for your feedback.
I want to ensure I’ve understood your query correctly. Below is based on my understanding.
Yes, we are currently using the same tenant for azd up and azd down, but this is strictly for testing the Bicep template. We ensure that the resources are destroyed immediately after the deployment is successfully verified.
Having a separate tenant for the CI pipeline is certainly an option, but we would like to understand the specific reason or concern behind this suggestion. Could you please elaborate?
Additionally, we can create custom roles with permissions tailored specifically to certain resource groups (RGs) to enhance security and limit access.
Coul…