constants

package
v1.2.4 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Feb 13, 2023 License: GPL-3.0 Imports: 1 Imported by: 0

Documentation

Index

Constants

View Source
const (
	China   string = "china"
	Cloud   string = "cloud"
	Germany string = "germany"
	USGovL4 string = "usgovl4"
	USGovL5 string = "usgovl5"
)

Azure deployment regions

View Source
const (
	Name                 string = "azurehound"
	DisplayName          string = "AzureHound"
	Description          string = "The official tool for collecting Azure data for BloodHound and BloodHound Enterprise"
	AuthorRef            string = "Created by the BloodHound Enterprise team - https://bloodhoundenterprise.io"
	AzPowerShellClientID string = "1950a258-227b-4e31-a9cf-717495945fc2"
)
View Source
const (
	GraphApiBetaVersion string = "beta"
	GraphApiVersion     string = "v1.0"
)

Azure Services

View Source
const (
	// Can create and manage all aspects of app registrations and enterprise apps.
	ApplicationAdministratorRoleID string = "9b895d92-2cd3-44c7-9d02-a6ac2d5ea5c3"

	// Can create application registrations independent of the 'Users can register applications' setting.
	ApplicationDeveloperRoleID string = "cf1c38e5-3621-4004-a7cb-879624dced7c"

	// Can create attack payloads that an administrator can initiate later.
	AttackPayloadAuthorRoleID string = "9c6df0f2-1e7c-4dc3-b195-66dfbd24aa8f"

	// Can create and manage all aspects of attack simulation campaigns.
	AttackSimulationAdministratorRoleID string = "c430b396-e693-46cc-96f3-db01bf8bb62a"

	// Assign custom security attribute keys and values to supported Azure AD objects.
	AttributeAssignmentAdministratorRoleID string = "58a13ea3-c632-46ae-9ee0-9c0d43cd7f3d"

	// Read custom security attribute keys and values for supported Azure AD objects.
	AttributeAssignmentReaderRoleID string = "ffd52fa5-98dc-465c-991d-fc073eb59f8f"

	// Define and manage the definition of custom security attributes.
	AttributeDefinitionAdministratorRoleID string = "8424c6f0-a189-499e-bbd0-26c1753c96d4"

	// Read the definition of custom security attributes.
	AttributeDefinitionReaderRoleID string = "1d336d2c-4ae8-42ef-9711-b3604ce3fc2c"

	// Can access to view, set and reset authentication method information for any non-admin user.
	AuthenticationAdministratorRoleID string = "c4e39bd9-1100-46d3-8c65-fb160da0071f"

	// Can create and manage the authentication methods policy, tenant-wide MFA settings, password protection policy, and verifiable credentials.
	AuthenticationPolicyAdministratorRoleID string = "0526716b-113d-4c15-b2c8-68e3c22b9f80"

	// Users assigned to this role are added to the local administrators group on Azure AD-joined devices.
	AzureADJoinedDeviceLocalAdministratorRoleID string = "9f06204d-73c1-4d4c-880a-6edb90606fd8"

	// Can manage Azure DevOps organization policy and settings.
	AzureDevOpsAdministratorRoleID string = "e3973bdf-4987-49ae-837a-ba8e231c7286"

	// Can manage all aspects of the Azure Information Protection product.
	AzureInformationProtectionAdministratorRoleID string = "7495fdc4-34c4-4d15-a289-98788ce399fd"

	// Can manage secrets for federation and encryption in the Identity Experience Framework (IEF).
	B2CIEFKeysetAdministratorRoleID string = "aaf43236-0c0d-4d5f-883a-6955382ac081"

	// Can create and manage trust framework policies in the Identity Experience Framework (IEF).
	B2CIEFPolicyAdministratorRoleID string = "3edaf663-341e-4475-9f94-5c398ef6c070"

	// Can perform common billing related tasks like updating payment information.
	BillingAdministratorRoleID string = "b0f54661-2d74-4c50-afa3-1ec803f12efe"

	// Can manage all aspects of the Cloud App Security product.
	CloudAppSecurityAdministratorRoleID string = "892c5842-a9a6-463a-8041-72aa08ca3cf6"

	// Can create and manage all aspects of app registrations and enterprise apps except App Proxy.
	CloudApplicationAdministratorRoleID string = "158c047a-c907-4556-b7ef-446551a6b5f7"

	// Limited access to manage devices in Azure AD.
	CloudDeviceAdministratorRoleID string = "7698a772-787b-4ac8-901f-60d6b08affd2"

	// Can read and manage compliance configuration and reports in Azure AD and Microsoft 365.
	ComplianceAdministratorRoleID string = "17315797-102d-40b4-93e0-432062caca18"

	// Creates and manages compliance content.
	ComplianceDataAdministratorRoleID string = "e6d1a23a-da11-4be4-9570-befc86d067a7"

	// Can manage Conditional Access capabilities.
	ConditionalAccessAdministratorRoleID string = "b1be1c3e-b65d-4f19-8427-f6fa0d97feb9"

	// Can approve Microsoft support requests to access customer organizational data.
	CustomerLockBoxAccessApproverRoleID string = "5c4f9dcd-47dc-4cf7-8c9a-9e4207cbfc91"

	// Can access and manage Desktop management tools and services.
	DesktopAnalyticsAdministratorRoleID string = "38a96431-2bdf-4b4c-8b6e-5d3d8abac1a4"

	// Deprecated - Do Not Use.
	DeviceJoinRoleID string = "9c094953-4995-41c8-84c8-3ebb9b32c93f"

	// Deprecated - Do Not Use.
	DeviceManagersRoleID string = "2b499bcd-da44-4968-8aec-78e1674fa64d"

	// Deprecated - Do Not Use.
	DeviceUsersRoleID string = "d405c6df-0af8-4e3b-95e4-4d06e542189e"

	// Can read basic directory information. Commonly used to grant directory read access to applications and guests.
	DirectoryReadersRoleID string = "88d8e3e3-8f55-4a1e-953a-9b9898b8876b"

	// Only used by Azure AD Connect service.
	DirectorySynchronizationAccountsRoleID string = "d29b2b05-8046-44ba-8758-1e26182fcf32"

	// Can read and write basic directory information. For granting access to applications, not intended for users.
	DirectoryWritersRoleID string = "9360feb5-f418-4baa-8175-e2a00bac4301"

	// Can manage domain names in cloud and on-premises.
	DomainNameAdministratorRoleID string = "8329153b-31d0-4727-b945-745eb3bc5f31"

	// Can manage all aspects of the Dynamics 365 product.
	Dynamics365AdministratorRoleID string = "44367163-eba1-44c3-98af-f5787879f96a"

	// Manage all aspects of Microsoft Edge.
	EdgeAdministratorRoleID string = "3f1acade-1e04-4fbc-9b69-f0302cd84aef"

	// Can manage all aspects of the Exchange product.
	ExchangeAdministratorRoleID string = "29232cdf-9323-42fd-ade2-1d097af3e4de"

	// Can create or update Exchange Online recipients within the Exchange Online organization.
	ExchangeRecipientAdministratorRoleID string = "31392ffb-586c-42d1-9346-e59415a2cc4e"

	// Can create and manage all aspects of user flows.
	ExternalIDUserFlowAdministratorRoleID string = "6e591065-9bad-43ed-90f3-e9424366d2f0"

	// Can create and manage the attribute schema available to all user flows.
	ExternalIDUserFlowAttributeAdministratorRoleID string = "0f971eea-41eb-4569-a71e-57bb8a3eff1e"

	// Can configure identity providers for use in direct federation.
	ExternalIdentityProviderAdministratorRoleID string = "be2f45a1-457d-42af-a067-6ec1fa63bc45"

	// Can manage all aspects of Azure AD and Microsoft services that use Azure AD identities.
	GlobalAdministratorRoleID string = "62e90394-69f5-4237-9190-012177145e10"

	// Can read everything that a Global Administrator can, but not update anything.
	GlobalReaderRoleID string = "f2ef992c-3afb-46b9-b7cf-a126ee74c451"

	// Members of this role can create/manage groups, create/manage groups settings like naming and expiration policies, and view groups activity and audit reports.
	GroupsAdministratorRoleID string = "fdd7a751-b60b-444a-984c-02652fe8fa1c"

	// Can invite guest users independent of the 'members can invite guests' setting.
	GuestInviterRoleID string = "95e79109-95c0-4d8e-aee3-d01accf2d47b"

	// Default role for guest users. Can read a limited set of directory information.
	GuestUserRoleID string = "10dae51f-b6af-4016-8d66-8c2a99b929b3"

	// Can reset passwords for non-administrators and Helpdesk Administrators.
	HelpdeskAdministratorRoleID string = "729827e3-9c14-49f7-bb1b-9608f156bbb8"

	// Can manage AD to Azure AD cloud provisioning, Azure AD Connect, and federation settings.
	HybridIdentityAdministratorRoleID string = "8ac3fc64-6eca-42ea-9e69-59f4c7b60eb2"

	// Manage access using Azure AD for identity governance scenarios.
	IdentityGovernanceAdministratorRoleID string = "45d8d3c5-c802-45c6-b32a-1d70b5e1e86e"

	// Has administrative access in the Microsoft 365 Insights app.
	InsightsAdministratorRoleID string = "eb1f4a8d-243a-41f0-9fbd-c7cdf6c5ef7c"

	// Access the analytical capabilities in Microsoft Viva Insights and run custom queries.
	InsightsAnalystRoleID string = "25df335f-86eb-4119-b717-0ff02de207e9"

	// Can view and share dashboards and insights via the M365 Insights app.
	InsightsBusinessLeaderRoleID string = "31e939ad-9672-4796-9c2e-873181342d2d"

	// Can manage all aspects of the Intune product.
	IntuneAdministratorRoleID string = "3a2c62db-5318-420d-8d74-23affee5d9d5"

	// Can manage settings for Microsoft Kaizala.
	KaizalaAdministratorRoleID string = "74ef975b-6605-40af-a5d2-b9539d836353"

	// Can configure knowledge, learning, and other intelligent features.
	KnowledgeAdministratorRoleID string = "b5a8dcf3-09d5-43a9-a639-8e29ef291470"

	// Has access to topic management dashboard and can manage content.
	KnowledgeManagerRoleID string = "744ec460-397e-42ad-a462-8b3f9747a02c"

	// Can manage product licenses on users and groups.
	LicenseAdministratorRoleID string = "4d6ac14f-3453-41d0-bef9-a3e0c569773a"

	// Create and manage all aspects of workflows and tasks associated with Lifecycle Workflows in Azure AD.
	LifecycleWorkflowsAdministratorRoleID string = "59d46f88-662b-457b-bceb-5c3809e5908f"

	// Can read security messages and updates in Office 365 Message Center only.
	MessageCenterPrivacyReaderRoleID string = "ac16e43d-7b2d-40e0-ac05-243ff356ab5b"

	// Can read messages and updates for their organization in Office 365 Message Center only.
	MessageCenterReaderRoleID string = "790c1fb9-7f7d-4f88-86a1-ef1f95c05c1b"

	// Can manage network locations and review enterprise network design insights for Microsoft 365 Software as a Service applications.
	NetworkAdministratorRoleID string = "d37c8bed-0711-4417-ba38-b4abe66ce4c2"

	// Can manage Office apps cloud services, including policy and settings management, and manage the ability to select, unselect and publish 'what's new' feature content to end-user's devices.
	OfficeAppsAdministratorRoleID string = "2b745bdf-0803-4d80-aa65-822c4493daac"

	// Do not use - not intended for general use.
	PartnerTier1SupportRoleID string = "4ba39ca4-527c-499a-b93d-d9b492c50246"

	// Do not use - not intended for general use.
	PartnerTier2SupportRoleID string = "e00e864a-17c5-4a4b-9c06-f5b95a8d5bd8"

	// Can reset passwords for non-administrators and Password Administrators.
	PasswordAdministratorRoleID string = "966707d0-3269-4727-9be2-8c3a10f19b9d"

	// Manage all aspects of Entra Permissions Management.
	PermissionsManagementAdministratorRoleID string = "af78dc32-cf4d-46f9-ba4e-4428526346b5"

	// Can manage all aspects of the Power BI product.
	PowerBIAdministratorRoleID string = "a9ea8996-122f-4c74-9520-8edcd192826c"

	// Can create and manage all aspects of Microsoft Dynamics 365, PowerApps and Microsoft Flow.
	PowerPlatformAdministratorRoleID string = "11648597-926c-4cf3-9c36-bcebb0ba8dcc"

	// Can manage all aspects of printers and printer connectors.
	PrinterAdministratorRoleID string = "644ef478-e28f-4e28-b9dc-3fdde9aa0b1f"

	// Can register and unregister printers and update printer status.
	PrinterTechnicianRoleID string = "e8cef6f1-e4bd-4ea8-bc07-4b8d950f4477"

	// Can access to view, set and reset authentication method information for any user (admin or non-admin).
	PrivilegedAuthenticationAdministratorRoleID string = "7be44c8a-adaf-4e2a-84d6-ab2649e08a13"

	// Can manage role assignments in Azure AD, and all aspects of Privileged Identity Management.
	PrivilegedRoleAdministratorRoleID string = "e8611ab8-c189-46e8-94e1-60213ab1f814"

	// Can read sign-in and audit reports.
	ReportsReaderRoleID string = "4a5d8f65-41da-4de4-8968-e035b65339cf"

	// Restricted role for guest users. Can read a limited set of directory information.
	RestrictedGuestUserRoleID string = "2af84b1e-32c8-42b7-82bc-daa82404023b"

	// Can create and manage all aspects of Microsoft Search settings.
	SearchAdministratorRoleID string = "0964bb5e-9bdb-4d7b-ac29-58e794862a40"

	// Can create and manage the editorial content such as bookmarks, Q and As, locations, floorplan.
	SearchEditorRoleID string = "8835291a-918c-4fd7-a9ce-faa49f0cf7d9"

	// Can read security information and reports, and manage configuration in Azure AD and Office 365.
	SecurityAdministratorRoleID string = "194ae4cb-b126-40b2-bd5b-6091b380977d"

	// Creates and manages security events.
	SecurityOperatorRoleID string = "5f2222b1-57c3-48ba-8ad5-d4759f1fde6f"

	// Can read security information and reports in Azure AD and Office 365.
	SecurityReaderRoleID string = "5d6b6bb7-de71-4623-b4af-96380a352509"

	// Can read service health information and manage support tickets.
	ServiceSupportAdministratorRoleID string = "f023fd81-a637-4b56-95fd-791ac0226033"

	// Can manage all aspects of the SharePoint service.
	SharePointAdministratorRoleID string = "f28a1f50-f6e7-4571-818b-6a12f2af6b6c"

	// Can manage all aspects of the Skype for Business product.
	SkypeforBusinessAdministratorRoleID string = "75941009-915a-4869-abe7-691bff18279e"

	// Can manage the Microsoft Teams service.
	TeamsAdministratorRoleID string = "69091246-20e8-4a56-aa4d-066075b2a7a8"

	// Can manage calling and meetings features within the Microsoft Teams service.
	TeamsCommunicationsAdministratorRoleID string = "baf37b3a-610e-45da-9e62-d9d1e5e8914b"

	// Can troubleshoot communications issues within Teams using advanced tools.
	TeamsCommunicationsSupportEngineerRoleID string = "f70938a0-fc10-4177-9e90-2178f8765737"

	// Can troubleshoot communications issues within Teams using basic tools.
	TeamsCommunicationsSupportSpecialistRoleID string = "fcf91098-03e3-41a9-b5ba-6f0ec8188a12"

	// Can perform management related tasks on Teams certified devices.
	TeamsDevicesAdministratorRoleID string = "3d762c5a-1b6c-493f-843e-55a3b42923d4"

	// Can see only tenant level aggregates in Microsoft 365 Usage Analytics and Productivity Score.
	UsageSummaryReportsReaderRoleID string = "75934031-6c7e-415a-99d7-48dbd49e875e"

	// Default role for member users. Can read all and write a limited set of directory information.
	UserRoleID string = "a0b1b346-4d3e-4e8b-98f8-753987be4970"

	// Can manage all aspects of users and groups, including resetting passwords for limited admins.
	UserAdministratorRoleID string = "fe930be7-5e62-47db-91af-98c3a49a38b1"

	// Manage and share Virtual Visits information and metrics from admin centers or the Virtual Visits app.
	VirtualVisitsAdministratorRoleID string = "e300d9e7-4a2b-4295-9eff-f1c78b36cc98"

	// Can provision and manage all aspects of Cloud PCs.
	Windows365AdministratorRoleID string = "11451d60-acb2-45eb-a7d6-43d0f0125c13"

	// Can create and manage all aspects of Windows Update deployments through the Windows Update for Business deployment service.
	WindowsUpdateDeploymentAdministratorRoleID string = "32696413-001a-46ae-978c-ce0f6b3620d2"

	// Deprecated - Do Not Use.
	WorkplaceDeviceJoinRoleID string = "c34f683f-4d5a-4403-affd-6615e00e3a7f"

	// Manage all aspects of the Yammer service.
	YammerAdministratorRoleID string = "810a2642-a034-447f-a5e8-41beaa378541"
)

Azure AD built-in roles See https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference for more info.

View Source
const (
	// Can customize the developer portal, edit its content, and publish it.
	APIManagementDeveloperPortalContentEditorRoleID string = "c031e6a8-4391-4de0-8d69-4706a7ed3729"

	// Can manage service and the APIs
	APIManagementServiceContributorRoleID string = "312a565d-c81f-4fd8-895a-4e21e48d571c"

	// Can manage service but not the APIs
	APIManagementServiceOperatorRoleID string = "e022efe7-f5ba-4159-bbe4-b44f577e9b61"

	// Read-only access to service and APIs
	APIManagementServiceReaderRoleID string = "71522526-b88f-4d52-b57f-d31fc3546d0d"

	// Lets you grant Access Review System app permissions to discover and revoke access as needed by the access review process.
	AccessReviewOperatorServiceRoleID string = "76cc9ee4-d5d3-4a45-a930-26add3d73475"

	// acr delete
	AcrDeleteRoleID string = "c2f4ef07-c644-48eb-af81-4b1b4947fb11"

	// acr image signer
	AcrImageSignerRoleID string = "6cef56e8-d556-48e5-a04f-b8e64114680f"

	// acr pull
	AcrPullRoleID string = "7f951dda-4ed3-4680-a7ca-43fe172d538d"

	// acr push
	AcrPushRoleID string = "8311e382-0749-4cb8-b61a-304f252e45ec"

	// acr quarantine data reader
	AcrQuarantineReaderRoleID string = "cdda3590-29a3-44f6-95f2-9f980659eb04"

	// acr quarantine data writer
	AcrQuarantineWriterRoleID string = "c8d4ff99-41c3-41a8-9f60-21dfdad59608"

	// Provides contribute access to manage sensor related entities in AgFood Platform Service
	AgFoodPlatformSensorPartnerContributorRoleID string = "6b77f0a0-0d89-41cc-acd1-579c22c17a67"

	// Provides admin access to AgFood Platform Service
	AgFoodPlatformServiceAdminRoleID string = "f8da80de-1ff9-4747-ad80-a19b7f6079e3"

	// Provides contribute access to AgFood Platform Service
	AgFoodPlatformServiceContributorRoleID string = "8508508a-4469-4e45-963b-2518ee0bb728"

	// Provides read access to AgFood Platform Service
	AgFoodPlatformServiceReaderRoleID string = "7ec7ccdc-f61e-41fe-9aaf-980df0a44eba"

	// Basic user role for AnyBuild. This role allows listing of agent information and execution of remote build capabilities.
	AnyBuildBuilderRoleID string = "a2138dac-4907-4679-a376-736901ed8ad8"

	// Allows full access to App Configuration data.
	AppConfigurationDataOwnerRoleID string = "5ae67dd6-50cb-40e7-96ff-dc2bfa4b606b"

	// Allows read access to App Configuration data.
	AppConfigurationDataReaderRoleID string = "516239f1-63e1-4d78-a4de-a74fb236a071"

	// Contributor of the Application Group.
	ApplicationGroupContributorRoleID string = "ca6382a4-1721-4bcf-a114-ff0c70227b6b"

	// Can manage Application Insights components
	ApplicationInsightsComponentContributorRoleID string = "ae349356-3a1b-4a5e-921d-050484c6347e"

	// Gives user permission to use Application Insights Snapshot Debugger features
	ApplicationInsightsSnapshotDebuggerRoleID string = "08954f03-6346-4c2e-81c0-ec3a5cfae23b"

	// Can read write or delete the attestation provider instance
	AttestationContributorRoleID string = "bbf86eb8-f7b4-4cce-96e4-18cddf81d86e"

	// Can read the attestation provider properties
	AttestationReaderRoleID string = "fd1bd22b-8476-40bc-a0bc-69b95687b9f3"

	// Manage azure automation resources and other resources using azure automation.
	AutomationContributorRoleID string = "f353d9bd-d4a6-484e-a77a-8050b599b867"

	// Create and Manage Jobs using Automation Runbooks.
	AutomationJobOperatorRoleID string = "4fe576fe-1146-4730-92eb-48519fa6bf9f"

	// Automation Operators are able to start, stop, suspend, and resume jobs
	AutomationOperatorRoleID string = "d3881f73-407a-4167-8283-e981cbba0404"

	// Read Runbook properties - to be able to create Jobs of the runbook.
	AutomationRunbookOperatorRoleID string = "5fb5aef8-1081-4b8e-bb16-9d5d0385bab5"

	// Grants permissions to upload and manage new Autonomous Development Platform measurements.
	AutonomousDevelopmentPlatformDataContributorRoleID string = "b8b15564-4fa6-4a59-ab12-03e1d9594795"

	// Grants full access to Autonomous Development Platform data.
	AutonomousDevelopmentPlatformDataOwnerRoleID string = "27f8b550-c507-4db9-86f2-f4b8e816d59d"

	// Grants read access to Autonomous Development Platform data.
	AutonomousDevelopmentPlatformDataReaderRoleID string = "d63b75f7-47ea-4f27-92ac-e0d173aaf093"

	// Can create and manage an Avere vFXT cluster.
	AvereContributorRoleID string = "4f8fab4f-1852-4a58-a46a-8eaf358af14a"

	// Used by the Avere vFXT cluster to manage the cluster
	AvereOperatorRoleID string = "c025889f-8102-4ebf-b32c-fc0c6f0c6bd9"

	// List cluster user credentials action.
	AzureArcEnabledKubernetesClusterUserRoleID string = "00493d72-78f6-4148-b6c5-d3ce8e4799dd"

	// Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces.
	AzureArcKubernetesAdminRoleID string = "dffb1e0c-446f-4dde-a09f-99eb5cc68b96"

	// Lets you manage all resources in the cluster.
	AzureArcKubernetesClusterAdminRoleID string = "8393591c-06b9-48a2-a542-1bd6b377f6a2"

	// Lets you view all resources in cluster/namespace, except secrets.
	AzureArcKubernetesViewerRoleID string = "63f0a09d-1495-4db4-a681-037d84835eb4"

	// Lets you update everything in cluster/namespace, except (cluster)roles and (cluster)role bindings.
	AzureArcKubernetesWriterRoleID string = "5b999177-9696-4545-85c7-50de3797e5a1"

	// Arc ScVmm VM Administrator has permissions to perform all ScVmm actions.
	AzureArcScVmmAdministratorRoleID string = "a92dfd61-77f9-4aec-a531-19858b406c87"

	// Azure Arc ScVmm Private Cloud User has permissions to use the ScVmm resources to deploy VMs.
	AzureArcScVmmPrivateCloudUserRoleID string = "c0781e91-8102-4553-8951-97c6d4243cda"

	// Azure Arc ScVmm Private Clouds Onboarding role has permissions to provision all the required resources for onboard and deboard vmm server instances to Azure.
	AzureArcScVmmPrivateCloudsOnboardingRoleID string = "6aac74c4-6311-40d2-bbdd-7d01e7c6e3a9"

	// Arc ScVmm VM Contributor has permissions to perform all VM actions.
	AzureArcScVmmVMContributorRoleID string = "e582369a-e17b-42a5-b10c-874c387c530b"

	// Arc VMware VM Contributor has permissions to perform all connected VMwarevSphere actions.
	AzureArcVMwareAdministratorRoleID string = "ddc140ed-e463-4246-9145-7c664192013f"

	// Azure Arc VMware Private Cloud User has permissions to use the VMware cloud resources to deploy VMs.
	AzureArcVMwarePrivateCloudUserRoleID string = "ce551c02-7c42-47e0-9deb-e3b6fc3a9a83"

	// Azure Arc VMware Private Clouds Onboarding role has permissions to provision all the required resources for onboard and deboard vCenter instances to Azure.
	AzureArcVMwarePrivateCloudsOnboardingRoleID string = "67d33e57-3129-45e6-bb0b-7cc522f762fa"

	// Arc VMware VM Contributor has permissions to perform all VM actions.
	AzureArcVMwareVMContributorRoleID string = "b748a06d-6150-4f8a-aaa9-ce3940cd96cb"

	// Can onboard Azure Connected Machines.
	AzureConnectedMachineOnboardingRoleID string = "b64e21ea-ac4e-4cdf-9dc9-5b892992bee7"

	// Can read, write, delete and re-onboard Azure Connected Machines.
	AzureConnectedMachineResourceAdministratorRoleID string = "cd570a14-e51a-42ad-bac8-bafd67325302"

	// Microsoft.AzureArcData service role to access the resources of Microsoft.AzureArcData stored with RPSAAS.
	AzureConnectedSQLServerOnboardingRoleID string = "e8113dce-c529-4d33-91fa-e9b972617508"

	// Full access role for Digital Twins data-plane
	AzureDigitalTwinsDataOwnerRoleID string = "bcd981a7-7f74-457b-83e1-cceb9e632ffe"

	// Read-only role for Digital Twins data-plane properties
	AzureDigitalTwinsDataReaderRoleID string = "d57506d4-4c8d-48b1-8587-93c323f6a5a3"

	// Allows for full access to Azure Event Hubs resources.
	AzureEventHubsDataOwnerRoleID string = "f526a384-b230-433a-b45c-95f59c4a2dec"

	// Allows receive access to Azure Event Hubs resources.
	AzureEventHubsDataReceiverRoleID string = "a638d3c7-ab3a-418d-83e6-5f17a39d4fde"

	// Allows send access to Azure Event Hubs resources.
	AzureEventHubsDataSenderRoleID string = "2b629674-e913-4c01-ae53-ef4638d8f975"

	// List cluster admin credential action.
	AzureKubernetesServiceClusterAdminRoleID string = "0ab0b1a8-8aac-4efd-b8c2-3ee1fb270be8"

	// List cluster user credential action.
	AzureKubernetesServiceClusterUserRoleID string = "4abbcc35-e782-43d8-92c5-2d3f1bd2253f"

	// Grants access to read and write Azure Kubernetes Service clusters
	AzureKubernetesServiceContributorRoleID string = "ed7f3fbd-7b88-4dd4-9017-9adb7ce333f8"

	// Deploy the Azure Policy add-on on Azure Kubernetes Service clusters
	AzureKubernetesServicePolicyAddonDeploymentRoleID string = "18ed5180-3e48-46fd-8541-4ea054d57064"

	// Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces.
	AzureKubernetesServiceRBACAdminRoleID string = "3498e952-d568-435e-9b2c-8d77e338d7f7"

	// Lets you manage all resources in the cluster.
	AzureKubernetesServiceRBACClusterAdminRoleID string = "b1ff04bb-8a4e-4dc4-8eb5-8693973ce19b"

	// Allows read-only access to see most objects in a namespace. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces.
	AzureKubernetesServiceRBACReaderRoleID string = "7f6c6a51-bcf8-42ba-9220-52d62157d7db"

	// Allows read/write access to most objects in a namespace.This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets and running Pods as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces.
	AzureKubernetesServiceRBACWriterRoleID string = "a7ffa36f-339b-4b5c-8bdf-e2c188b2c0eb"

	// Grants access all Azure Maps resource management.
	AzureMapsContributorRoleID string = "dba33070-676a-4fb0-87fa-064dc56ff7fb"

	// Grants access to read, write, and delete access to map related data from an Azure maps account.
	AzureMapsDataContributorRoleID string = "8f5e0ce6-4f7b-4dcf-bddf-e6f48634a204"

	// Grants access to read map related data from an Azure maps account.
	AzureMapsDataReaderRoleID string = "423170ca-a8f6-4b0f-8487-9e4eb8f49bfa"

	// Grants access to very limited set of data APIs for common visual web SDK scenarios. Specifically, render and search data APIs.
	AzureMapsSearchandRenderDataReaderRoleID string = "6be48352-4f82-47c9-ad5e-0acacefdb005"

	// Allows for listen access to Azure Relay resources.
	AzureRelayListenerRoleID string = "26e0b698-aa6d-4085-9386-aadae190014d"

	// Allows for full access to Azure Relay resources.
	AzureRelayOwnerRoleID string = "2787bf04-f1f5-4bfe-8383-c8a24483ee38"

	// Allows for send access to Azure Relay resources.
	AzureRelaySenderRoleID string = "26baccc8-eea7-41f1-98f4-1762cc7f685d"

	// Allows for full access to Azure Service Bus resources.
	AzureServiceBusDataOwnerRoleID string = "090c5cfd-751d-490a-894a-3ce6f1109419"

	// Allows for receive access to Azure Service Bus resources.
	AzureServiceBusDataReceiverRoleID string = "4f6d3b9b-027b-4f4c-9142-0e5a2a2247e0"

	// Allows for send access to Azure Service Bus resources.
	AzureServiceBusDataSenderRoleID string = "69a216fc-b8fb-44d8-bc22-1f3c2cd27a39"

	// Allow read, write and delete access to Azure Spring Cloud Config Server
	AzureSpringCloudConfigServerContributorRoleID string = "a06f5c24-21a7-4e1a-aa2b-f19eb6684f5b"

	// Allow read access to Azure Spring Cloud Config Server
	AzureSpringCloudConfigServerReaderRoleID string = "d04c6db6-4947-4782-9e91-30a88feb7be7"

	// Allow read access to Azure Spring Cloud Data
	AzureSpringCloudDataReaderRoleID string = "b5537268-8956-4941-a8f0-646150406f0c"

	// Allow read, write and delete access to Azure Spring Cloud Service Registry
	AzureSpringCloudServiceRegistryContributorRoleID string = "f5880b48-c26d-48be-b172-7927bfa1c8f1"

	// Allow read access to Azure Spring Cloud Service Registry
	AzureSpringCloudServiceRegistryReaderRoleID string = "cff1b556-2399-4e7e-856d-a8f754be7b65"

	// Lets you manage Azure Stack registrations.
	AzureStackRegistrationOwnerRoleID string = "6f12a6df-dd06-4f3e-bcb1-ce8be600526a"

	// Azure VM Managed identities restore Contributors are allowed to perform Azure VM Restores with managed identities both user and system
	AzureVMManagedidentitiesrestoreContributorRoleID string = "6ae96244-5829-4925-a7d3-5975537d91dd"

	// Can perform all actions within an Azure Machine Learning workspace, except for creating or deleting compute resources and modifying the workspace itself.
	AzureMLDataScientistRoleID string = "f6c7c914-8db3-469d-8ca1-694a8f32e121"

	// Lets you write metrics to AzureML workspace
	AzureMLMetricsWriterRoleID string = "635dd51f-9968-44d3-b7fb-6d9a6bd613ae"

	// Lets you manage backup service,but can't create vaults and give access to others
	BackupContributorRoleID string = "5e467623-bb1f-42f4-a55d-6e525e11384b"

	// Lets you manage backup services, except removal of backup, vault creation and giving access to others
	BackupOperatorRoleID string = "00c29273-979b-4161-815c-10b084fb9324"

	// Can view backup services, but can't make changes
	BackupReaderRoleID string = "a795c7a0-d4a2-40c1-ae25-d81f01202912"

	// Allows read access to billing data
	BillingReaderRoleID string = "fa23ad8b-c56e-40d8-ac0c-ce449e1d2c64"

	// Lets you manage BizTalk services, but not access to them.
	BizTalkContributorRoleID string = "5e3c6656-6cfa-4708-81fe-0de47ac73342"

	// Allows for access to Blockchain Member nodes
	BlockchainMemberNodeAccessRoleID string = "31a002a1-acaf-453e-8a5b-297c9ca1ea24"

	// Can manage blueprint definitions, but not assign them.
	BlueprintContributorRoleID string = "41077137-e803-4205-871c-5a86e6a753b4"

	// Can assign existing published blueprints, but cannot create new blueprints. NOTE: this only works if the assignment is done with a user-assigned managed identity.
	BlueprintOperatorRoleID string = "437d2ced-4a38-4302-8479-ed2bcb43d090"

	// Can manage CDN endpoints, but can’t grant access to other users.
	CDNEndpointContributorRoleID string = "426e0c7f-0c7e-4658-b36f-ff54d6c29b45"

	// Can view CDN endpoints, but can’t make changes.
	CDNEndpointReaderRoleID string = "871e35f6-b5c1-49cc-a043-bde969a0f2cd"

	// Can manage CDN profiles and their endpoints, but can’t grant access to other users.
	CDNProfileContributorRoleID string = "ec156ff8-a8d1-4d15-830c-5b80698ca432"

	// Can view CDN profiles and their endpoints, but can’t make changes.
	CDNProfileReaderRoleID string = "8f96442b-4075-438f-813d-ad51ab4019af"

	// Lets you manage everything under your HPC Workbench chamber.
	ChamberAdminRoleID string = "4e9b8407-af2e-495b-ae54-bb60a55b1b5a"

	// Lets you view everything under your HPC Workbench chamber, but not make any changes.
	ChamberUserRoleID string = "4447db05-44ed-4da3-ae60-6cbece780e32"

	// Lets you manage classic networks, but not access to them.
	ClassicNetworkContributorRoleID string = "b34d265f-36f7-4a0d-a4d4-e158ca92e90f"

	// Lets you manage classic storage accounts, but not access to them.
	ClassicStorageAccountContributorRoleID string = "86e8f5dc-a6e9-4c67-9d15-de283e8eac25"

	// Classic Storage Account Key Operators are allowed to list and regenerate keys on Classic Storage Accounts
	ClassicStorageAccountKeyOperatorServiceRoleID string = "985d6b00-f706-48f5-a6fe-d0ca12fb668d"

	// Lets you manage classic virtual machines, but not access to them, and not the virtual network or storage account they’re connected to.
	ClassicVirtualMachineContributorRoleID string = "d73bb868-a0df-4d4d-bd69-98a00b01fccb"

	// Lets you manage ClearDB MySQL databases, but not access to them.
	ClearDBMySQLDBContributorRoleID string = "9106cda0-8a86-4e81-b686-29a22c54effe"

	// Manage identity or business verification requests. This role is in preview and subject to change.
	CodeSigningIdentityVerifierRoleID string = "4339b7cf-9826-4e41-b4ed-c7f4505dac08"

	// Sign files with a certificate profile. This role is in preview and subject to change.
	CodeSigningCertificateProfileSignerRoleID string = "2837e146-70d7-4cfd-ad55-7efa6464f958"

	// Lets you create, read, update, delete and manage keys of Cognitive Services.
	CognitiveServicesContributorRoleID string = "25fbc0a9-bd7c-42a3-aa1a-3b75d497ee68"

	// Full access to the project, including the ability to view, create, edit, or delete projects.
	CognitiveServicesCustomVisionContributorRoleID string = "c1ff6cc2-c111-46fe-8896-e0ef812ad9f3"

	// Publish, unpublish or export models. Deployment can view the project but can’t update.
	CognitiveServicesCustomVisionDeploymentRoleID string = "5c4089e1-6d96-4d2f-b296-c1bc7137275f"

	// View, edit training images and create, add, remove, or delete the image tags. Labelers can view the project but can’t update anything other than training images and tags.
	CognitiveServicesCustomVisionLabelerRoleID string = "88424f51-ebe7-446f-bc41-7fa16989e96c"

	// Read-only actions in the project. Readers can’t create or update the project.
	CognitiveServicesCustomVisionReaderRoleID string = "93586559-c37d-4a6b-ba08-b9f0940c2d73"

	// View, edit projects and train the models, including the ability to publish, unpublish, export the models. Trainers can’t create or delete the project.
	CognitiveServicesCustomVisionTrainerRoleID string = "0a5ae4ab-0d65-4eeb-be61-29fc9b54394b"

	// Lets you read Cognitive Services data.
	CognitiveServicesDataReaderRoleID string = "b59867f0-fa02-499b-be73-45a86b5b3e1c"

	// Lets you perform detect, verify, identify, group, and find similar operations on Face API. This role does not allow create or delete operations, which makes it well suited for endpoints that only need inferencing capabilities, following 'least privilege' best practices.
	CognitiveServicesFaceRecognizerRoleID string = "9894cab4-e18a-44aa-828b-cb588cd6f2d7"

	// Provides access to create Immersive Reader sessions and call APIs
	CognitiveServicesImmersiveReaderUserRoleID string = "b2de6794-95db-4659-8781-7e080d3f2b9d"

	//  Has access to all Read, Test, Write, Deploy and Delete functions under LUIS
	CognitiveServicesLUISOwnerRoleID string = "f72c8140-2111-481c-87ff-72b910f6e3f8"

	// Has access to Read and Test functions under LUIS.
	CognitiveServicesLUISReaderRoleID string = "18e81cdc-4e98-4e29-a639-e7d10c5a6226"

	// Has access to all Read, Test, and Write functions under LUIS
	CognitiveServicesLUISWriterRoleID string = "6322a993-d5c9-4bed-b113-e49bbea25b27"

	// Has access to all Read, Test, Write, Deploy and Delete functions under Language portal
	CognitiveServicesLanguageOwnerRoleID string = "f07febfe-79bc-46b1-8b37-790e26e6e498"

	// Has access to Read and Test functions under Language portal
	CognitiveServicesLanguageReaderRoleID string = "7628b7b8-a8b2-4cdc-b46f-e9b35248918e"

	//  Has access to all Read, Test, and Write functions under Language Portal
	CognitiveServicesLanguageWriterRoleID string = "f2310ca1-dc64-4889-bb49-c8e0fa3d47a8"

	// Full access to the project, including the system level configuration.
	CognitiveServicesMetricsAdvisorAdministratorRoleID string = "cb43c632-a144-4ec5-977c-e80c4affc34a"

	// Access to the project.
	CognitiveServicesMetricsAdvisorUserRoleID string = "3b20f47b-3825-43cb-8114-4bd2201156a8"

	// Let’s you create, edit, import and export a KB. You cannot publish or delete a KB.
	CognitiveServicesQnAMakerEditorRoleID string = "f4cc2bf9-21be-47a1-bdf1-5c5804381025"

	// Let’s you read and test a KB only.
	CognitiveServicesQnAMakerReaderRoleID string = "466ccd10-b268-4a11-b098-b4849f024126"

	// Full access to Speech projects, including read, write and delete all entities, for real-time speech recognition and batch transcription tasks, real-time speech synthesis and long audio tasks, custom speech and custom voice.
	CognitiveServicesSpeechContributorRoleID string = "0e75ca1e-0464-4b4d-8b93-68208a576181"

	// Access to the real-time speech recognition and batch transcription APIs, real-time speech synthesis and long audio APIs, as well as to read the data/test/model/endpoint for custom models, but can’t create, delete or modify the data/test/model/endpoint for custom models.
	CognitiveServicesSpeechUserRoleID string = "f2dc8367-1007-4938-bd23-fe263f013447"

	// Lets you read and list keys of Cognitive Services.
	CognitiveServicesUserRoleID string = "a97b65f3-24c7-4388-baec-2e87135dc908"

	// Can manage data packages of a collaborative.
	CollaborativeDataContributorRoleID string = "daa9e50b-21df-454c-94a6-a8050adab352"

	// Can manage resources created by AICS at runtime
	CollaborativeRuntimeOperatorRoleID string = "7a6f0e70-c033-4fb1-828c-08514e5f4102"

	// This role allows user to share gallery to another subscription/tenant or share it to the public.
	ComputeGallerySharingAdminRoleID string = "1ef6a3be-d0ac-425d-8c01-acb62866290b"

	// Grants full access to manage all resources, but does not allow you to assign roles in Azure RBAC, manage assignments in Azure Blueprints, or share image galleries.
	ContributorRoleID string = "b24988ac-6180-42a0-ab88-20f7382dd24c"

	// Can read Azure Cosmos DB Accounts data
	CosmosDBAccountReaderRoleID string = "fbdf93bf-df7d-467e-a4d2-9458aa1360c8"

	// Lets you manage Azure Cosmos DB accounts, but not access data in them. Prevents access to account keys and connection strings.
	CosmosDBOperatorRoleID string = "230815da-be43-4aae-9cb4-875f7bd000aa"

	// Can submit restore request for a Cosmos DB database or a container for an account
	CosmosBackupOperatorRoleID string = "db7b14f2-5adf-42da-9f96-f2ee17bab5cb"

	// Can perform restore action for Cosmos DB database account with continuous backup mode
	CosmosRestoreOperatorRoleID string = "5432c526-bc82-444a-b7ba-57c5b0b5b34f"

	// Can view costs and manage cost configuration (e.g. budgets, exports)
	CostManagementContributorRoleID string = "434105ed-43f6-45c7-a02f-909b2ba83430"

	// Can view cost data and configuration (e.g. budgets, exports)
	CostManagementReaderRoleID string = "72fafb9e-0641-4937-9268-a91bfd8191a3"

	// Full access to DICOM data.
	DICOMDataOwnerRoleID string = "58a3b984-7adf-4c20-983a-32417c86fbc8"

	// Read and search DICOM data.
	DICOMDataReaderRoleID string = "e89c7a3c-2f64-4fa1-a847-3e4c9ba4283a"

	// Lets you manage DNS resolver resources.
	DNSResolverContributorRoleID string = "0f2ebee7-ffd4-4fc0-b3b7-664099fdad5d"

	// Lets you manage DNS zones and record sets in Azure DNS, but does not let you control who has access to them.
	DNSZoneContributorRoleID string = "befefa01-2a29-4197-83a8-272ff33ce314"

	// Lets you manage everything under Data Box Service except giving access to others.
	DataBoxContributorRoleID string = "add466c9-e687-43fc-8d98-dfcf8d720be5"

	// Lets you manage Data Box Service except creating order or editing order details and giving access to others.
	DataBoxReaderRoleID string = "028f4ed7-e2a9-465e-a8f4-9c0ffdfdc027"

	// Create and manage data factories, as well as child resources within them.
	DataFactoryContributorRoleID string = "673868aa-7521-48a0-acc6-0f60742d39f5"

	// Lets you submit, monitor, and manage your own jobs but not create or delete Data Lake Analytics accounts.
	DataLakeAnalyticsDeveloperRoleID string = "47b7735b-770e-4598-a7da-8b91488b4c88"

	// Provides permissions to upload data to empty managed disks, read, or export data of managed disks (not attached to running VMs) and snapshots using SAS URIs and Azure AD authentication.
	DataOperatorforManagedDisksRoleID string = "959f8984-c045-4866-89c7-12bf9737be2e"

	// Can purge analytics data
	DataPurgerRoleID string = "150f5e0c-0603-4f03-8c7f-cf70034c4e90"

	// Contributor of the Desktop Virtualization Application Group.
	DesktopVirtualizationApplicationGroupContributorRoleID string = "86240b0e-9422-4c43-887b-b61143f32ba8"

	// Reader of the Desktop Virtualization Application Group.
	DesktopVirtualizationApplicationGroupReaderRoleID string = "aebf23d0-b568-4e86-b8f9-fe83a2c6ab55"

	// Contributor of Desktop Virtualization.
	DesktopVirtualizationContributorRoleID string = "082f0a83-3be5-4ba1-904c-961cca79b387"

	// Contributor of the Desktop Virtualization Host Pool.
	DesktopVirtualizationHostPoolContributorRoleID string = "e307426c-f9b6-4e81-87de-d99efb3c32bc"

	// Reader of the Desktop Virtualization Host Pool.
	DesktopVirtualizationHostPoolReaderRoleID string = "ceadfde2-b300-400a-ab7b-6143895aa822"

	// This role is in preview and subject to change. Provide permission to the Azure Virtual Desktop Resource Provider to start virtual machines.
	DesktopVirtualizationPowerOnContributorRoleID string = "489581de-a3bd-480d-9518-53dea7416b33"

	// This role is in preview and subject to change. Provide permission to the Azure Virtual Desktop Resource Provider to start and stop virtual machines.
	DesktopVirtualizationPowerOnOffContributorRoleID string = "40c5ff49-9181-41f8-ae61-143b0e78555e"

	// Reader of Desktop Virtualization.
	DesktopVirtualizationReaderRoleID string = "49a72310-ab8d-41df-bbb0-79b649203868"

	// Operator of the Desktop Virtualization Session Host.
	DesktopVirtualizationSessionHostOperatorRoleID string = "2ad6aaab-ead9-4eaa-8ac5-da422f562408"

	// Allows user to use the applications in an application group.
	DesktopVirtualizationUserRoleID string = "1d18fff3-a72a-46b5-b4a9-0b38a3cd7e63"

	// Operator of the Desktop Virtualization Uesr Session.
	DesktopVirtualizationUserSessionOperatorRoleID string = "ea4bfff8-7fb4-485a-aadd-d4129a0ffaa6"

	// This role is in preview and subject to change. Provide permission to the Azure Virtual Desktop Resource Provider to create, delete, update, start, and stop virtual machines.
	DesktopVirtualizationVirtualMachineContributorRoleID string = "a959dbd1-f747-45e3-8ba6-dd80f235f97c"

	// Contributor of the Desktop Virtualization Workspace.
	DesktopVirtualizationWorkspaceContributorRoleID string = "21efdde3-836f-432b-bf3d-3e8e734d4b2b"

	// Reader of the Desktop Virtualization Workspace.
	DesktopVirtualizationWorkspaceReaderRoleID string = "0fa44ee9-7a7d-466b-9bb2-2bf446b1204d"

	// Provides access to create and manage dev boxes.
	DevCenterDevBoxUserRoleID string = "45d50f46-0b78-4001-a660-4198cbe8cd05"

	// Provides access to manage project resources.
	DevCenterProjectAdminRoleID string = "331c37c6-af14-46d9-b9f4-e1909e1b95a0"

	// Lets you connect, start, restart, and shutdown your virtual machines in your Azure DevTest Labs.
	DevTestLabsUserRoleID string = "76283e04-6283-4c54-8f91-bcf1374a3c64"

	// Allows for full access to Device Provisioning Service data-plane operations.
	DeviceProvisioningServiceDataContributorRoleID string = "dfce44e4-17b7-4bd1-a6d1-04996ec95633"

	// Allows for full read access to Device Provisioning Service data-plane properties.
	DeviceProvisioningServiceDataReaderRoleID string = "10745317-c249-44a1-a5ce-3a4353c0bbd8"

	// Gives you full access to management and content operations
	DeviceUpdateAdministratorRoleID string = "02ca0879-e8e4-47a5-a61e-5c618b76e64a"

	// Gives you full access to content operations
	DeviceUpdateContentAdministratorRoleID string = "0378884a-3af5-44ab-8323-f5b22f9f3c98"

	// Gives you read access to content operations, but does not allow making changes
	DeviceUpdateContentReaderRoleID string = "d1ee9a80-8b14-47f0-bdc2-f4a351625a7b"

	// Gives you full access to management operations
	DeviceUpdateDeploymentsAdministratorRoleID string = "e4237640-0e3d-4a46-8fda-70bc94856432"

	// Gives you read access to management operations, but does not allow making changes
	DeviceUpdateDeploymentsReaderRoleID string = "49e2f5d2-7741-4835-8efa-19e1fe35e47f"

	// Gives you read access to management and content operations, but does not allow making changes
	DeviceUpdateReaderRoleID string = "e9dba6fb-3d52-4cf0-bce3-f06ce71b9e0f"

	// Provides permission to backup vault to perform disk backup.
	DiskBackupReaderRoleID string = "3e5e47e6-65f7-47ef-90b5-e5dd4d455f24"

	// Used by the StoragePool Resource Provider to manage Disks added to a Disk Pool.
	DiskPoolOperatorRoleID string = "60fc6e62-5479-42d4-8bf4-67625fcc2840"

	// Provides permission to backup vault to perform disk restore.
	DiskRestoreOperatorRoleID string = "b50d9833-a0cb-478e-945f-707fcc997c13"

	// Provides permission to backup vault to manage disk snapshots.
	DiskSnapshotContributorRoleID string = "7efff54f-a5b4-42b5-a1c5-5411624893ce"

	// Lets you manage DocumentDB accounts, but not access to them.
	DocumentDBAccountContributorRoleID string = "5bd9cd88-fe45-4216-938b-f97437e15450"

	// Can manage Azure AD Domain Services and related network configurations
	DomainServicesContributorRoleID string = "eeaeda52-9324-47f6-8069-5d5bade478b2"

	// Can view Azure AD Domain Services and related network configurations
	DomainServicesReaderRoleID string = "361898ef-9ed1-48c2-849c-a832951106bb"

	// Lets you manage elastic san accounts
	ElasticSanOwnerRoleID string = "80dcbedb-47ef-405d-95bd-188a1b4ac406"

	// Read Azure Elastic SAN and all sub-resources
	ElasticSanReaderRoleID string = "af6a70f8-3c9f-4105-acf1-d719e9fca4ca"

	// Lets you manage a volume group in elastic san account
	ElasticSanVolumeGroupOwnerRoleID string = "a8281131-f312-4f34-8d98-ae12be9f0d23"

	// Lets you manage EventGrid operations.
	EventGridContributorRoleID string = "1e241071-0855-49ea-94dc-649edcd759de"

	// Allows send access to event grid events.
	EventGridDataSenderRoleID string = "d5a91429-5739-47e2-a06b-3470a27159e7"

	// Lets you manage EventGrid event subscription operations.
	EventGridEventSubscriptionContributorRoleID string = "428e0ff0-5e57-4d9c-a221-2c70d0e0a443"

	// Lets you read EventGrid event subscriptions.
	EventGridEventSubscriptionReaderRoleID string = "2414bbcf-6497-4faf-8c65-045460748405"

	// Experimentation Administrator
	ExperimentationAdministratorRoleID string = "7f646f1b-fa08-80eb-a33b-edd6ce5c915c"

	// Experimentation Contributor
	ExperimentationContributorRoleID string = "7f646f1b-fa08-80eb-a22b-edd6ce5c915c"

	// Allows for creation, writes and reads to the metric set via the metrics service APIs.
	ExperimentationMetricContributorRoleID string = "6188b7c9-7d01-4f99-a59f-c88b630326c0"

	// Experimentation Reader
	ExperimentationReaderRoleID string = "49632ef5-d9ac-41f4-b8e7-bbe587fa74a1"

	// Role allows user or principal full access to FHIR Data
	FHIRDataContributorRoleID string = "5a1fc7df-4bf1-4951-a576-89034ee01acd"

	// Role allows user or principal to convert data from legacy format to FHIR
	FHIRDataConverterRoleID string = "a1705bd2-3a8f-45a5-8683-466fcfd5cc24"

	// Role allows user or principal to read and export FHIR Data
	FHIRDataExporterRoleID string = "3db33094-8700-4567-8da5-1501d4e7e843"

	// Role allows user or principal to read and import FHIR Data
	FHIRDataImporterRoleID string = "4465e953-8ced-4406-a58e-0f6e3f3b530b"

	// Role allows user or principal to read FHIR Data
	FHIRDataReaderRoleID string = "4c8d0bbc-75d3-4935-991f-5f3c56d81508"

	// Role allows user or principal to read and write FHIR Data
	FHIRDataWriterRoleID string = "3f88fce4-5892-4214-ae73-ba5294559913"

	// Built-in Grafana admin role
	GrafanaAdminRoleID string = "22926164-76b3-42b3-bc55-97df8dab3e41"

	// Built-in Grafana Editor role
	GrafanaEditorRoleID string = "a79a5197-3a5c-4973-a920-486035ffd60f"

	// Built-in Grafana Viewer role
	GrafanaViewerRoleID string = "60921a7e-fef1-4a43-9b16-a26c52ad4769"

	// Create and manage all aspects of the Enterprise Graph - Ontology, Schema mapping, Conflation and Conversational AI and Ingestions
	GraphOwnerRoleID string = "b60367af-1334-4454-b71e-769d9a4f83d9"

	// Lets you read, write Guest Configuration Resource.
	GuestConfigurationResourceContributorRoleID string = "088ab73d-1256-47ae-bea9-9de8e7131f31"

	// Lets you read and modify HDInsight cluster configurations.
	HDInsightClusterOperatorRoleID string = "61ed4efc-fab3-44fd-b111-e24485cc132a"

	// Can Read, Create, Modify and Delete Domain Services related operations needed for HDInsight Enterprise Security Package
	HDInsightDomainServicesContributorRoleID string = "8d8d5a11-05d3-4bda-a417-a08778121c7c"

	// Allows users to edit and delete Hierarchy Settings
	HierarchySettingsAdministratorRoleID string = "350f8d15-c687-4448-8ae1-157740a3936d"

	// Can onboard new Hybrid servers to the Hybrid Resource Provider.
	HybridServerOnboardingRoleID string = "5d1e5ee4-7c68-4a71-ac8b-0739630a3dfb"

	// Can read, write, delete, and re-onboard Hybrid servers to the Hybrid Resource Provider.
	HybridServerResourceAdministratorRoleID string = "48b40c6e-82e0-4eb3-90d5-19e40f49b624"

	// Lets you manage integration service environments, but not access to them.
	IntegrationServiceEnvironmentContributorRoleID string = "a41e2c5b-bd99-4a07-88f4-9bf657a760b8"

	// Allows developers to create and update workflows, integration accounts and API connections in integration service environments.
	IntegrationServiceEnvironmentDeveloperRoleID string = "c7aa55d3-1abb-444a-a5ca-5e51e485d6ec"

	// Lets you manage Intelligent Systems accounts, but not access to them.
	IntelligentSystemsAccountContributorRoleID string = "03a6d094-3444-4b3d-88af-7477090a9e5e"

	// Allows for full access to IoT Hub data plane operations.
	IoTHubDataContributorRoleID string = "4fc6c259-987e-4a07-842e-c321cc9d413f"

	// Allows for full read access to IoT Hub data-plane properties
	IoTHubDataReaderRoleID string = "b447c946-2db7-41ec-983d-d8bf3b1c77e3"

	// Allows for full access to IoT Hub device registry.
	IoTHubRegistryContributorRoleID string = "4ea46cd5-c1b2-4a8e-910b-273211f9ce47"

	// Allows for read and write access to all IoT Hub device and module twins.
	IoTHubTwinContributorRoleID string = "494bdba2-168f-4f31-a0a1-191d2f7c028c"

	// Perform all data plane operations on a key vault and all objects in it, including certificates, keys, and secrets. Cannot manage key vault resources or manage role assignments. Only works for key vaults that use the 'Azure role-based access control' permission model.
	KeyVaultAdministratorRoleID string = "00482a5a-887f-4fb3-b363-3b7fe8e74483"

	// Perform any action on the certificates of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model.
	KeyVaultCertificatesOfficerRoleID string = "a4417e6f-fecd-4de8-b567-7b0420556985"

	// Lets you manage key vaults, but not access to them.
	KeyVaultContributorRoleID string = "f25e0fa2-a7c8-4377-a976-54943a77a395"

	// Perform any action on the keys of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model.
	KeyVaultCryptoOfficerRoleID string = "14b46e9e-c2b7-41b4-b07b-48a6ebf60603"

	// Read metadata of keys and perform wrap/unwrap operations. Only works for key vaults that use the 'Azure role-based access control' permission model.
	KeyVaultCryptoServiceEncryptionUserRoleID string = "e147488a-f6f5-4113-8e2d-b22465e65bf6"

	// Perform cryptographic operations using keys. Only works for key vaults that use the 'Azure role-based access control' permission model.
	KeyVaultCryptoUserRoleID string = "12338af0-0e69-4776-bea7-57ae8d297424"

	// Read metadata of key vaults and its certificates, keys, and secrets. Cannot read sensitive values such as secret contents or key material. Only works for key vaults that use the 'Azure role-based access control' permission model.
	KeyVaultReaderRoleID string = "21090545-7ca7-4776-b22c-e363652d74d2"

	// Perform any action on the secrets of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model.
	KeyVaultSecretsOfficerRoleID string = "b86a8fe4-44ce-4948-aee5-eccb2c155cd7"

	// Read secret contents. Only works for key vaults that use the 'Azure role-based access control' permission model.
	KeyVaultSecretsUserRoleID string = "4633458b-17de-408a-b874-0445c86b69e6"

	// Knowledge Read permission to consume Enterprise Graph Knowledge using entity search and graph query
	KnowledgeConsumerRoleID string = "ee361c5d-f7b5-4119-b4b6-892157c8f64c"

	// Role definition to authorize any user/service to create connectedClusters resource
	KubernetesClusterAzureArcOnboardingRoleID string = "34e09817-6cbe-4d01-b1a2-e0eac5743d41"

	// Can create, update, get, list and delete Kubernetes Extensions, and get extension async operations
	KubernetesExtensionContributorRoleID string = "85cb6faf-e071-4c9b-8136-154b5a04f717"

	// The lab assistant role
	LabAssistantRoleID string = "ce40b423-cede-4313-a93f-9b28290b72e1"

	// The lab contributor role
	LabContributorRoleID string = "5daaa2af-1fe8-407c-9122-bba179798270"

	// Lets you create new labs under your Azure Lab Accounts.
	LabCreatorRoleID string = "b97fb8bc-a8b2-4522-a38b-dd33c7e65ead"

	// The lab operator role
	LabOperatorRoleID string = "a36e6959-b6be-4b12-8e9f-ef4b474d304d"

	// The lab services contributor role
	LabServicesContributorRoleID string = "f69b8690-cc87-41d6-b77a-a4bc3c0a966f"

	// The lab services reader role
	LabServicesReaderRoleID string = "2a5c394f-5eb7-4d4f-9c8e-e8eae39faebc"

	// View, create, update, delete and execute load tests. View and list load test resources but can not make any changes.
	LoadTestContributorRoleID string = "749a398d-560b-491b-bb21-08924219302e"

	// Execute all operations on load test resources and load tests
	LoadTestOwnerRoleID string = "45bb0b16-2f0c-4e78-afaa-a07599b003f6"

	// View and list all load tests and load test resources but can not make any changes
	LoadTestReaderRoleID string = "3ae3fb29-0000-4ccd-bf80-542e7b26e081"

	// Log Analytics Contributor can read all monitoring data and edit monitoring settings. Editing monitoring settings includes adding the VM extension to VMs; reading storage account keys to be able to configure collection of logs from Azure Storage; adding solutions; and configuring Azure diagnostics on all Azure resources.
	LogAnalyticsContributorRoleID string = "92aaf0da-9dab-42b6-94a3-d43ce8d16293"

	// Log Analytics Reader can view and search all monitoring data as well as and view monitoring settings, including viewing the configuration of Azure diagnostics on all Azure resources.
	LogAnalyticsReaderRoleID string = "73c42c96-874c-492b-b04d-ab87d138a893"

	// Lets you manage logic app, but not access to them.
	LogicAppContributorRoleID string = "87a39d53-fc1b-424a-814c-f7e04687dc9e"

	// Lets you read, enable and disable logic app.
	LogicAppOperatorRoleID string = "515c2055-d9d4-4321-b1b9-bd0c9a0f79fe"

	// Allows for creating managed application resources.
	ManagedApplicationContributorRoleID string = "641177b8-a67a-45b9-a033-47bc880bb21e"

	// Lets you read and perform actions on Managed Application resources
	ManagedApplicationOperatorRoleID string = "c7393b34-138c-406f-901b-d8cf2b17e6ae"

	// Lets you read resources in a managed app and request JIT access.
	ManagedApplicationsReaderRoleID string = "b9331d33-8a36-4f8c-b097-4f54124fdb44"

	// Lets you manage managed HSM pools, but not access to them.
	ManagedHSMcontributorRoleID string = "18500a29-7fe2-46b2-a342-b16a415e101d"

	// Create, Read, Update, and Delete User Assigned Identity
	ManagedIdentityContributorRoleID string = "e40ec5ca-96e0-45a2-b4ff-59039f2c2b59"

	// Read and Assign User Assigned Identity
	ManagedIdentityOperatorRoleID string = "f1a07417-d97a-45cb-824c-7a7467783830"

	// Managed Services Registration Assignment Delete Role allows the managing tenant users to delete the registration assignment assigned to their tenant.
	ManagedServicesRegistrationassignmentDeleteRoleID string = "91c1777a-f3dc-4fae-b103-61d183457e46"

	// Management Group Contributor Role
	ManagementGroupContributorRoleID string = "5d58bcaf-24a5-4b20-bdb6-eed9f69fbe4c"

	// Management Group Reader Role
	ManagementGroupReaderRoleID string = "ac63b705-f282-497d-ac71-919bf39d939d"

	// Marketplace Admin grants full access to manage Private Azure Marketplace, including read and take action for private marketplace notifications, but does not allow to assign Marketplace Admin role to others
	MarketplaceAdminRoleID string = "dd920d6d-f481-47f1-b461-f338c46b2d9f"

	// Create, read, modify, and delete Media Services accounts; read-only access to other Media Services resources.
	MediaServicesAccountAdministratorRoleID string = "054126f8-9a2b-4f1c-a9ad-eca461f08466"

	// Create, read, modify, and delete Live Events, Assets, Asset Filters, and Streaming Locators; read-only access to other Media Services resources.
	MediaServicesLiveEventsAdministratorRoleID string = "532bc159-b25e-42c0-969e-a1d439f60d77"

	// Create, read, modify, and delete Assets, Asset Filters, Streaming Locators, and Jobs; read-only access to other Media Services resources.
	MediaServicesMediaOperatorRoleID string = "e4395492-1534-4db2-bedf-88c14621589c"

	// Create, read, modify, and delete Account Filters, Streaming Policies, Content Key Policies, and Transforms; read-only access to other Media Services resources. Cannot create Jobs, Assets or Streaming resources.
	MediaServicesPolicyAdministratorRoleID string = "c4bba371-dacd-4a26-b320-7250bca963ae"

	// Create, read, modify, and delete Streaming Endpoints; read-only access to other Media Services resources.
	MediaServicesStreamingEndpointsAdministratorRoleID string = "99dba123-b5fe-44d5-874c-ced7199a5804"

	// Microsoft Sentinel Automation Contributor
	MicrosoftSentinelAutomationContributorRoleID string = "f4c81013-99ee-4d62-a7ee-b3f1f648599a"

	// Microsoft Sentinel Contributor
	MicrosoftSentinelContributorRoleID string = "ab8e14d6-4a74-4a29-9ba8-549422addade"

	// Microsoft Sentinel Reader
	MicrosoftSentinelReaderRoleID string = "8d289c81-5878-46d4-8554-54e1e3d8b5cb"

	// Microsoft Sentinel Responder
	MicrosoftSentinelResponderRoleID string = "3e150937-b8fe-4cfb-8069-0eaf05ecd056"

	// Microsoft.Kubernetes connected cluster role.
	MicrosoftKubernetesConnectedClusterRoleID string = "5548b2cf-c94c-4228-90ba-30851930a12f"

	// Can read and update Monitored Objects and associated Data Collection Rules.
	MonitoredObjectsContributorRoleID string = "56be40e2-4db1-4ccf-93c3-7e44c597135b"

	// Can read all monitoring data and update monitoring settings.
	MonitoringContributorRoleID string = "749f88d5-cbae-40b8-bcfc-e573ddc772fa"

	// Enables publishing metrics against Azure resources
	MonitoringMetricsPublisherRoleID string = "3913510d-42f4-4e42-8a64-420c390055eb"

	// Can read all monitoring data.
	MonitoringReaderRoleID string = "43d0d8ad-25c7-4714-9337-8ba259a9fe05"

	// Lets you manage networks, but not access to them.
	NetworkContributorRoleID string = "4d97b98b-1d4f-4787-a291-c67834d212e7"

	// Lets you manage New Relic Application Performance Management accounts and applications, but not access to them.
	NewRelicAPMAccountContributorRoleID string = "5d28c62d-5b37-4476-8438-e587778df237"

	// Provides user with ingestion capabilities for an object anchors account.
	ObjectAnchorsAccountOwnerRoleID string = "ca0835dd-bacc-42dd-8ed2-ed5e7230d15b"

	// Lets you read ingestion jobs for an object anchors account.
	ObjectAnchorsAccountReaderRoleID string = "4a167cdf-cb95-4554-9203-2347fe489bd9"

	// Provides user with ingestion capabilities for Azure Object Understanding.
	ObjectUnderstandingAccountOwnerRoleID string = "4dd61c23-6743-42fe-a388-d8bdd41cb745"

	// Lets you read ingestion jobs for an object understanding account.
	ObjectUnderstandingAccountReaderRoleID string = "d18777c0-1514-4662-8490-608db7d334b6"

	// Grants full access to manage all resources, including the ability to assign roles in Azure RBAC.
	OwnerRoleID string = "8e3af657-a8ff-443c-a75c-2fe8c4bcb635"

	// Provides contributor access to PlayFab resources
	PlayFabContributorRoleID string = "0c8b84dc-067c-4039-9615-fa1a4b77c726"

	// Provides read access to PlayFab resources
	PlayFabReaderRoleID string = "a9a19cc5-31f4-447c-901f-56c0bb18fcaf"

	// Allows read access to resource policies and write access to resource component policy events.
	PolicyInsightsDataWriterRoleID string = "66bb4e9e-b016-4a94-8249-4c0511c2be84"

	// The user has access to perform administrative actions on all PowerApps resources within the tenant.
	PowerAppsAdministratorRoleID string = "53be45b2-ad40-43ab-bc1f-2c962ac99ded"

	// PowerAppsReadersWithReshare can use the resource and re-share it with other users, but cannot edit the resource or re-share it with edit permissions.
	PowerAppsReaderWithReshareRoleID string = "6877c72c-edd3-4048-9b4b-cf8e514477b0"

	// Lets you manage private DNS zone resources, but not the virtual networks they are linked to.
	PrivateDNSZoneContributorRoleID string = "b12aa53e-6015-4669-85d0-8515ebb3ae7f"

	// The Microsoft.ProjectBabylon data curator can create, read, modify and delete catalog data objects and establish relationships between objects. This role is in preview and subject to change.
	ProjectBabylonDataCuratorRoleID string = "9ef4ef9c-a049-46b0-82ab-dd8ac094c889"

	// The Microsoft.ProjectBabylon data reader can read catalog data objects. This role is in preview and subject to change.
	ProjectBabylonDataReaderRoleID string = "c8d896ba-346d-4f50-bc1d-7d1c84130446"

	// The Microsoft.ProjectBabylon data source administrator can manage data sources and data scans. This role is in preview and subject to change.
	ProjectBabylonDataSourceAdministratorRoleID string = "05b7651b-dc44-475e-b74d-df3db49fae0f"

	// Deprecated role.
	Purview1DeprecatedRoleID string = "8a3c2885-9b38-4fd2-9d99-91af537c1347"

	// Deprecated role.
	Purview2DeprecatedRoleID string = "200bba9e-f0c8-430f-892b-6f0794863803"

	// Deprecated role.
	Purview3DeprecatedRoleID string = "ff100721-1b9d-43d8-af52-42b69c1272db"

	// Read and create quota requests, get quota request status, and create support tickets.
	QuotaRequestOperatorRoleID string = "0e5f05e5-9ab9-446b-b98d-1e2157c94125"

	// View all resources, but does not allow you to make any changes.
	ReaderRoleID string = "acdd72a7-3385-48ef-bd42-f606fba81ae7"

	// Lets you view everything but will not let you delete or create a storage account or contained resource. It will also allow read/write access to all data contained in a storage account via access to storage account keys.
	ReaderandDataAccessRoleID string = "c12c1c16-33a1-487b-954d-41c89c60f349"

	// Lets you manage Redis caches, but not access to them.
	RedisCacheContributorRoleID string = "e0f68234-74aa-48ed-b826-c38b57376e17"

	// Provides user with conversion, manage session, rendering and diagnostics capabilities for Azure Remote Rendering
	RemoteRenderingAdministratorRoleID string = "3df8b902-2a6f-47c7-8cc5-360e9b272a7e"

	// Provides user with manage session, rendering and diagnostics capabilities for Azure Remote Rendering.
	RemoteRenderingClientRoleID string = "d39065c4-c120-43c9-ab0a-63eed9795f0a"

	// Lets you purchase reservations
	ReservationPurchaserRoleID string = "f7b75c60-3036-4b75-91c3-6b41c27c1689"

	// Lets one read and manage all the reservations in a tenant
	ReservationsAdministratorRoleID string = "a8889054-8d42-49c9-bc1c-52486c10e7cd"

	// Lets one read all the reservations in a tenant
	ReservationsReaderRoleID string = "582fc458-8989-419f-a480-75249bc5db7e"

	// Users with rights to create/modify resource policy, create support ticket and read resources/hierarchy.
	ResourcePolicyContributorRoleID string = "36243c78-bf99-498c-9df9-86d9f8d28608"

	// Lets you manage SQL databases, but not access to them. Also, you can't manage their security-related policies or their parent SQL servers.
	SQLDBContributorRoleID string = "9b7fa17d-e63e-47b0-bb0a-15c516ac86ec"

	// Lets you manage SQL Managed Instances and required network configuration, but can’t give access to others.
	SQLManagedInstanceContributorRoleID string = "4939a1f6-9ae0-4e48-a1e0-f2cbe897382d"

	// Lets you manage the security-related policies of SQL servers and databases, but not access to them.
	SQLSecurityManagerRoleID string = "056cd41c-7e88-42e1-933e-88ba6a50c9c3"

	// Lets you manage SQL servers and databases, but not access to them, and not their security -related policies.
	SQLServerContributorRoleID string = "6d8ee4ec-f05a-4a1d-8b00-a9b17e38b437"

	// Provides access to manage maintenance configurations with maintenance scope InGuestPatch and corresponding configuration assignments
	ScheduledPatchingContributorRoleID string = "cd08ab90-6b14-449c-ad9a-8f8e549482c6"

	// Lets you manage Scheduler job collections, but not access to them.
	SchedulerJobCollectionsContributorRoleID string = "188a0f2f-5c9e-469b-ae67-2aa5ce574b94"

	// Read, write, and delete Schema Registry groups and schemas.
	SchemaRegistryContributorRoleID string = "5dffeca3-4936-4216-b2bc-10343a5abb25"

	// Read and list Schema Registry groups and schemas.
	SchemaRegistryReaderRoleID string = "2c56ea50-c6b3-40a6-83c0-9d98858bc7d2"

	// Grants full access to Azure Cognitive Search index data.
	SearchIndexDataContributorRoleID string = "8ebe5a00-799e-43f5-93ac-243d3dce84a7"

	// Grants read access to Azure Cognitive Search index data.
	SearchIndexDataReaderRoleID string = "1407120a-92aa-4202-b7e9-c0e197c71c8f"

	// Lets you manage Search services, but not access to them.
	SearchServiceContributorRoleID string = "7ca78c08-252a-4471-8644-bb5ff32d4ba0"

	// Security Admin Role
	SecurityAdminRoleID string = "fb1c8493-542b-48eb-b624-b4c8fea62acd"

	// Lets you push assessments to Security Center
	SecurityAssessmentContributorRoleID string = "612c2aa1-cb24-443b-ac28-3ab7272de6f5"

	// Allowed to publish and modify platforms, workflows and toolsets to Security Detonation Chamber
	SecurityDetonationChamberPublisherRoleID string = "352470b3-6a9c-4686-b503-35deb827e500"

	// Allowed to query submission info and files from Security Detonation Chamber
	SecurityDetonationChamberReaderRoleID string = "28241645-39f8-410b-ad48-87863e2951d5"

	// Allowed to create and manage submissions to Security Detonation Chamber
	SecurityDetonationChamberSubmissionManagerRoleID string = "a37b566d-3efa-4beb-a2f2-698963fa42ce"

	// Allowed to create submissions to Security Detonation Chamber
	SecurityDetonationChamberSubmitterRoleID string = "0b555d9b-b4a7-4f43-b330-627f0e5be8f0"

	// This is a legacy role. Please use Security Administrator instead
	SecurityManagerLegacyRoleID string = "e3d13bf0-dd5a-482e-ba6b-9b8433878d10"

	// Security Reader Role
	SecurityReaderARMRoleID string = "39bc4728-0917-49c7-9d2c-d95423bc2eb4"

	// Services Hub Operator allows you to perform all read, write, and deletion operations related to Services Hub Connectors.
	ServicesHubOperatorRoleID string = "82200a5b-e217-47a5-b665-6d8765ee745b"

	// Read SignalR Service Access Keys
	SignalRAccessKeyReaderRoleID string = "04165923-9d83-45d5-8227-78b77b0a687e"

	// Lets your app server access SignalR Service with AAD auth options.
	SignalRAppServerRoleID string = "420fcaa2-552c-430f-98ca-3264be4806c7"

	// Full access to Azure SignalR Service REST APIs
	SignalRRESTAPIOwnerRoleID string = "fd53cd77-2268-407a-8f46-7e7863d0f521"

	// Read-only access to Azure SignalR Service REST APIs
	SignalRRESTAPIReaderRoleID string = "ddde6b66-c0df-4114-a159-3618637b3035"

	// Full access to Azure SignalR Service REST APIs
	SignalRServiceOwnerRoleID string = "7e4f1700-ea5a-4f59-8f37-079cfe29dce3"

	// Create, Read, Update, and Delete SignalR service resources
	SignalRWebPubSubContributorRoleID string = "8cf5e20a-e4b2-4e9d-b3a1-5ceb692c2761"

	// Lets you manage Site Recovery service except vault creation and role assignment
	SiteRecoveryContributorRoleID string = "6670b86e-a3f7-4917-ac9b-5d6ab1be4567"

	// Lets you failover and failback but not perform other Site Recovery management operations
	SiteRecoveryOperatorRoleID string = "494ae006-db33-4328-bf46-533a6560a3ca"

	// Lets you view Site Recovery status but not perform other management operations
	SiteRecoveryReaderRoleID string = "dbaa88c4-0c30-4179-9fb3-46319faa6149"

	// Lets you manage spatial anchors in your account, but not delete them
	SpatialAnchorsAccountContributorRoleID string = "8bbe83f1-e2a6-4df7-8cb4-4e04d4e5c827"

	// Lets you manage spatial anchors in your account, including deleting them
	SpatialAnchorsAccountOwnerRoleID string = "70bbe301-9835-447d-afdd-19eb3167307c"

	// Lets you locate and read properties of spatial anchors in your account
	SpatialAnchorsAccountReaderRoleID string = "5d51204f-eb77-4b1c-b86a-2ec626c49413"

	// Lets you perform backup and restore operations using Azure Backup on the storage account.
	StorageAccountBackupContributorRoleID string = "e5e2a7ff-d759-4cd2-bb51-3152d37e2eb1"

	// Lets you manage storage accounts, including accessing storage account keys which provide full access to storage account data.
	StorageAccountContributorRoleID string = "17d1049b-9a84-46fb-8f53-869881c3d3ab"

	// Storage Account Key Operators are allowed to list and regenerate keys on Storage Accounts
	StorageAccountKeyOperatorServiceRoleID string = "81a9662b-bebf-436f-a333-f67b29880f12"

	// Allows for read, write and delete access to Azure Storage blob containers and data
	StorageBlobDataContributorRoleID string = "ba92f5b4-2d11-453d-a403-e96b0029c9fe"

	// Allows for full access to Azure Storage blob containers and data, including assigning POSIX access control.
	StorageBlobDataOwnerRoleID string = "b7e6dc6d-f1e8-4753-8033-0f276bb0955b"

	// Allows for read access to Azure Storage blob containers and data
	StorageBlobDataReaderRoleID string = "2a2b9908-6ea1-4ae2-8e65-a410df84e7d1"

	// Allows for generation of a user delegation key which can be used to sign SAS tokens
	StorageBlobDelegatorRoleID string = "db58b8e5-c6ad-4a2a-8342-4190687cbf4a"

	// Allows for read, write, and delete access in Azure Storage file shares over SMB
	StorageFileDataSMBShareContributorRoleID string = "0c867c2a-1d8c-454a-a3db-ab2ea1bdc8bb"

	// Allows for read, write, delete and modify NTFS permission access in Azure Storage file shares over SMB
	StorageFileDataSMBShareElevatedContributorRoleID string = "a7264617-510b-434b-a828-9731dc254ea7"

	// Allows for read access to Azure File Share over SMB
	StorageFileDataSMBShareReaderRoleID string = "aba4ae5f-2193-4029-9191-0cb91df5e314"

	// Allows for read, write, and delete access to Azure Storage queues and queue messages
	StorageQueueDataContributorRoleID string = "974c5e8b-45b9-4653-ba55-5f855dd0fb88"

	// Allows for peek, receive, and delete access to Azure Storage queue messages
	StorageQueueDataMessageProcessorRoleID string = "8a0f0c08-91a1-4084-bc3d-661d67233fed"

	// Allows for sending of Azure Storage queue messages
	StorageQueueDataMessageSenderRoleID string = "c6a89b2d-59bc-44d0-9896-0f6e12d7b80a"

	// Allows for read access to Azure Storage queues and queue messages
	StorageQueueDataReaderRoleID string = "19e7f393-937e-4f77-808e-94535e297925"

	// Allows for read, write and delete access to Azure Storage tables and entities
	StorageTableDataContributorRoleID string = "0a9a7e1f-b9d0-4cc4-a60d-0319b160aaa3"

	// Allows for read access to Azure Storage tables and entities
	StorageTableDataReaderRoleID string = "76199698-9eea-4c19-bc75-cec21354c6b6"

	// Lets you perform query testing without creating a stream analytics job first
	StreamAnalyticsQueryTesterRoleID string = "1ec5b3c1-b17e-4e25-8312-2acb3c3c5abf"

	// Lets you create and manage Support requests
	SupportRequestContributorRoleID string = "cfd33db0-3dd1-45e3-aa9d-cdbdf3b6f24e"

	// Lets you manage tags on entities, without providing access to the entities themselves.
	TagContributorRoleID string = "4a9ae827-6dc8-4573-8ac7-8239d42aa03f"

	// Let you view and download packages and test results.
	TestBaseReaderRoleID string = "15e0f5a1-3450-4248-8e25-e2afe88a9e85"

	// Lets you manage Traffic Manager profiles, but does not let you control who has access to them.
	TrafficManagerContributorRoleID string = "a4b10055-b0c7-44c2-b00f-c7b5b3550cf7"

	// Lets you manage user access to Azure resources.
	UserAccessAdminRoleID string = "18d7d88d-d35e-4fb5-a5c3-7773c20a72d9"

	// Role that provides access to disk snapshot for security analysis.
	VMScannerOperatorRoleID string = "d24ecba3-c1f4-40fa-a7bb-4588a071e8fd"

	// Has access to view and search through all video's insights and transcription in the Video Indexer portal. No access to model customization, embedding of widget, downloading videos, or sharing the account.
	VideoIndexerRestrictedViewerRoleID string = "a2c4a527-7dc0-4ee3-897b-403ade70fafb"

	// View Virtual Machines in the portal and login as administrator
	VirtualMachineAdministratorLoginRoleID string = "1c0163c0-47e6-4577-8991-ea5c82e286e4"

	// Deprecated. Use VirtualMachineAdministratorLoginRoleID instead.
	AdminLoginRoleID string = "1c0163c0-47e6-4577-8991-ea5c82e286e4"

	// Lets you manage virtual machines, but not access to them, and not the virtual network or storage account they're connected to.
	VirtualMachineContributorRoleID string = "9980e02c-c2be-4d73-94e8-173b1dc7cf3c"

	// View Virtual Machines in the portal and login as a local user configured on the arc server
	VirtualMachineLocalUserLoginRoleID string = "602da2ba-a5c2-41da-b01d-5360126ab525"

	// View Virtual Machines in the portal and login as a regular user.
	VirtualMachineUserLoginRoleID string = "fb879df8-f326-4884-b1cf-06f3ad86be52"

	// Lets you manage the web plans for websites, but not access to them.
	WebPlanContributorRoleID string = "2cc479cb-7b4d-49a8-b449-8c00fd0f0a4b"

	// Full access to Azure Web PubSub Service REST APIs
	WebPubSubServiceOwnerRoleID string = "12cf5a90-567b-43ae-8102-96cf46c7d9b4"

	// Read-only access to Azure Web PubSub Service REST APIs
	WebPubSubServiceReaderRoleID string = "bfb1c7d2-fb1a-466b-b2ba-aee63b92deaf"

	// Lets you manage websites (not web plans), but not access to them.
	WebsiteContributorRoleID string = "de139f84-1756-47ae-9be6-808fbbe84772"

	// Let's you manage the OS of your resource via Windows Admin Center as an administrator.
	WindowsAdminCenterAdministratorLoginRoleID string = "a6333a3e-0164-44c3-b281-7a577aff287f"

	// Can save shared workbooks.
	WorkbookContributorRoleID string = "e8ddcd69-c73f-4f9f-9844-4100522f16ad"

	// Can read workbooks.
	WorkbookReaderRoleID string = "b279062a-9be3-42a0-92ae-8b3cf002ec4d"

	// WorkloadBuilder Migration Agent Role.
	WorkloadBuilderMigrationAgentRoleID string = "d17ce0a2-0697-43bc-aac5-9113337ab61c"
)

Azure ARM roles See https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles

Variables

View Source
var Version string = "v0.0.0"

AzureHound version This gets populated at build time when the command being run uses the following flag: -ldflags "-X github.com/bloodhoundad/azurehound/constants.Version=`git describe --tags --exact-match 2> /dev/null || git rev-parse HEAD`"

Functions

func UserAgent

func UserAgent() string

Returns a properly formatted value for the User-Agent header

Types

type Environment

type Environment struct {
	ActiveDirectoryAuthority string
	MicrosoftGraphUrl        string
	ResourceManagerUrl       string
}

func AzureChina

func AzureChina() Environment

func AzureCloud

func AzureCloud() Environment

func AzureGermany

func AzureGermany() Environment

func AzureUSGovernment

func AzureUSGovernment() Environment

func AzureUSGovernmentL5

func AzureUSGovernmentL5() Environment

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL