When possible, use the Commvault-provided custom roles, for least-privilege access. If there is no custom role for an Azure resource that you want to protect, you can create your own custom role or you can use Azure built-in roles.
For instructions to assign roles, see Assign Azure roles using the Azure portal.
Custom Roles
Important
In the JSON file, after "assignableScopes", change the subscription ID placeholder value to your Azure subscription ID.
Azure resources |
Custom role JSONs |
---|---|
|
|
Azure VMs, encrypted |
|
Azure VMs, unencrypted |
|
|
|
Azure File Storage |
Built-In Roles
Azure resources | Roles to assign to the subscription | Roles to assign to the storage account |
---|---|---|
|
|
None |
|
|
None |
Azure VMs, encrypted | None | None |
Azure VMs, unencrypted |
|
None |
|
|
None |
Azure File Storage | Storage Account Contributor |
|