Skip to content

Bug: Permission differences for custom roles #341

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
1 task done
marshalexander99 opened this issue Apr 11, 2025 · 0 comments
Open
1 task done

Bug: Permission differences for custom roles #341

marshalexander99 opened this issue Apr 11, 2025 · 0 comments
Labels
Needs: Triage 🔍 Needs triaging by the team Type: Bug 🪲 Something isn't working

Comments

@marshalexander99
Copy link

Is there an existing issue for this?

  • I have searched the existing issues

Infrastructure as Code Type? (Required)

terraform

PowerShell Module Version (Optional)

No response

Bootstrap Module Version (Optional)

4.3.5

Starter Module? (Required)

terraform - platform_landing_zone

Starter Module Version (Optional)

5.5.2

Input arguments of the ALZ-PowerShell-Module (Optional)

No response

Debug Output/Panic Output (Optional)

Expected Behaviour (Required)

The apply user managed identity created by bootstrap should be able to deploy policies to the root management group via DevOps pipelines with the custom role also created by the bootstrap

Actual Behaviour (Required)

The deployment pipeline just hangs providing no feedback to DevOps of a failure (simply times out). Running apply locally with an account/identity with owner rights to root management group completes deployment.
Policies are unable to be created by the apply UMI due to missing the policy write authorisation actions. Providing the additional permissions to the custom role solves the problem.
The BICEP custom role does seem to have the required policy write actions assigned to it for some reason.

Steps to Reproduce (Optional)

Run pipeline created by bootstrap to deploy accelerator. Pipeline seems to hang when performing the create/assign policies step and eventually times out.

Important Factoids (Optional)

We are targeting a management group a couple of layers below the tenant root for this deployment, however the account/service principal provided by the customer has full owner rights to the target root group when running the bootstrap process.

References (Optional)

No response

@marshalexander99 marshalexander99 added Needs: Triage 🔍 Needs triaging by the team Type: Bug 🪲 Something isn't working labels Apr 11, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Needs: Triage 🔍 Needs triaging by the team Type: Bug 🪲 Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant