Skip to content

Minimal permissions required for running CAPZ #5426

@tjungblu

Description

@tjungblu

/kind feature

Describe the solution you'd like

Currently the quickstart uses the Contributor role, which is very broad:

az ad sp create-for-rbac --role contributor --scopes="/subscriptions/${AZURE_SUBSCRIPTION_ID}"

It would be great if there could be a custom (or even builtin) role that contains all required permissions for running capz in production.

Environment:

  • cluster-api-provider-azure version: N/A
  • Kubernetes version: (use kubectl version): N/A
  • OS (e.g. from /etc/os-release): N/A

Metadata

Metadata

Assignees

No one assigned

    Labels

    kind/featureCategorizes issue or PR as related to a new feature.priority/backlogHigher priority than priority/awaiting-more-evidence.

    Type

    No type

    Projects

    Status

    Todo

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions