Creating Custom Role for Azure and Azure Stack Hub Accounts
Granular permissions differ depending on whether you create an Azure Stack Hub account, or Azure Compute account using a new Microsoft Entra ID (formerly Azure Active Directory) application, or Azure Compute account using an existing Microsoft Entra application.
Note |
This section describes permissions required for Veeam Backup & Replication to perform tasks. If you need to perform other tasks, for example create virtual networks, add the required permissions for those tasks manually. Instead of granular permissions, you can use built-in roles. For more information, see Permissions. |
Permissions for Azure Compute Account (Existing Application)
If you plan to add an Azure Compute account using an existing Microsoft Entra ID (formerly Azure Active Directory) application (select the Use the existing account option at the Access Type step of the wizard), and you do not want to use built-in Azure roles, you can create a custom role with granular permissions:
- In the Azure Portal, go to subscription properties and open Access control (IAM).
- Create a custom role from a JSON file as described in Microsoft Docs. Use the following JSON. In the assignableScopes field, specify your subscription ID.
JSON — Permissions for Existing Application
|
- Assign the created role to the required Microsoft Entra application. For details, see the Manage access to Azure resources using RBAC and the Azure portal section in the RBAC for Azure resources documentation.
- At the Account Type step of the Microsoft Azure Compute Account wizard, select Use existing account.
- At the Subscription step of the wizard, specify the Azure Microsoft Entra application with the assigned role.
Permissions for Azure Compute Account (New Application)
If you plan to add an Azure Compute account using a new Microsoft Entra ID (formerly Azure Active Directory) application (select the Create a new account option at the Subscription step of the wizard), and you do not want to use built-in Azure roles, you can create a custom role with granular permissions:
- In the Azure Portal, go to subscription properties and open Access control (IAM).
- Create a custom role from a JSON file as described in Microsoft Docs. Use the following JSON. In the assignableScopes field, specify your subscription ID.
JSON — Permissions for New Application
|
- Assign the created role to the required Microsoft Entra user. For details, see the Manage access to Azure resources using RBAC and the Azure portal section in the RBAC for Azure resources documentation.
- At the Account Type step of the Microsoft Azure Compute Account wizard, select Create a new account.
- At the Subscription step, configure the account as described in section Creating New Entra ID Application. On the Microsoft Azure device authentication page, specify an Microsoft Entra user account with the assigned role.
Note |
The described permissions are required for assigning a role on the subscription level for the registered application. Also, privileges to register applications are required. For more information, see Permissions. |
Permissions for Azure Stack Hub Compute Account (Existing Application)
If you plan to add an Azure Stack Hub account using an existing Microsoft Entra application (select the Use the existing account option at the Subscription step of the wizard), and you do not want to use built-in Azure roles, you can create a custom role with granular permissions:
- In the Azure Stack Hub management portal, go to subscription properties and open Access control (IAM).
- Create a custom role from a JSON file as described in Microsoft Docs. Use the following JSON. In the assignableScopes field, specify your subscription ID.
JSON — Permissions for Existing Application
|
- Assign the created role to the required Microsoft Entra application. For details, see the Manage access to Azure resources using RBAC and the Azure portal section in the RBAC for Azure resources documentation.
- At the Account Type step of the Microsoft Azure Compute Account wizard, select Use existing account.
- At the Subscription step of the wizard, specify the Microsoft Entra application with the assigned role.
Permissions for Azure Stack Hub Compute Account (New Application)
If you plan to add an Azure Stack Hub account using a new Microsoft Entra ID (formerly Azure Active Directory) application (select the Create a new account option at the Subscription step of the wizard), and you do not want to use built-in Azure roles, you can create a custom role with granular permissions:
- In the Azure Stack Hub management portal, go to subscription properties and open Access control (IAM).
- Create a custom role from a JSON file as described in Microsoft Docs. Use the following JSON. In the assignableScopes field, specify your subscription ID.
JSON — Permissions for New Application
|
- Assign the created role to the required Microsoft Entra user. For details, see the Manage access to Azure resources using RBAC and the Azure portal section in the RBAC for Azure resources documentation.
- At the Account Type step of the Microsoft Azure Compute Account wizard, select Create a new account.
- At the Subscription step, configure the account as described in section Creating New Entra ID Application. On the Microsoft Azure device authentication page, specify an Microsoft Entra user account with the assigned role.
Note |
The described permissions are required for assigning a role on the subscription level for the registered application. Also, privileges to register applications are required. For more information, see Permissions. |