When possible, use the Commvault-provided custom roles, for least-privilege access. If there is no custom role for an Azure resource that you want to protect, you can create your own custom role or you can use Azure built-in roles.
For instructions to assign roles, see Assign Azure roles using the Azure portal.
Custom Roles
Important
In the JSON file, after "assignableScopes", change the subscription ID placeholder value to your Azure subscription ID.
Azure resource |
Azure Portal JSON |
Azure CLI/Azure PowerShell JSON |
---|---|---|
Azure databases:
|
Not available yet |
|
Azure VMs, encrypted |
Not available yet |
|
Azure VMs, unencrypted |
||
Azure object storage:
|
Not available yet |
|
Azure File Storage |
Not available yet |
Built-In Roles
Azure resource |
Roles to assign in the Azure portal |
---|---|
The following databases:
|
|
The following databases:
|
|
Azure VMs, encrypted |
Not available yet |
Azure VMs, unencrypted |
|
Azure Blob Storage |
|
Azure Data Lake Storage Gen2 |
|
Azure File Storage |
|