Azure Add App Role Assignment To Service Principal
Grants an application role to a service principal, allowing it to act with that role's permissions within the application.
All events with tag Azure.
Grants an application role to a service principal, allowing it to act with that role's permissions within the application.
Creates and registers a new application in Microsoft Entra ID, establishing an identity that can authenticate and request access tokens.
Adds a user as an eligible member for a privileged role in Azure PIM, allowing them to activate the role on demand.
Adds a federated identity credential to an application, enabling secretless persistent access via workload identity federation.
Directly assigns a user or service principal to an Entra ID directory role, granting that role's permissions.
Adds an owner to an Entra ID application registration, granting them management rights over the application.
Adds an owner to a group, granting the ability to modify group membership for lateral movement.
Creates a new custom Azure RBAC role definition with specified allowed and denied actions.
Creates a service principal in Entra ID, representing the identity instance of an application within a tenant.
Creates a new user account in Microsoft Entra ID.
Adds a custom domain to a Microsoft Entra ID tenant and initiates the domain verification process.
Records an administrator registering authentication methods (e.g., MFA) on behalf of another user in Entra ID.
Records an admin or user granting an Entra ID application permission to access resources via an OAuth 2.0 consent grant.
Copies a blob within or between Azure Storage accounts or containers.
Disables multi-factor authentication for a user account, weakening authentication security.
Sends a B2B guest invitation to an external user, granting them access to the tenant's resources.
Lists the access keys for an Azure App Configuration store, exposing credentials used to read or write configuration data.
Global Admin elevates to User Access Administrator at root scope, granting control over all Azure subscriptions.
Deletes a resource lock, removing protection against deletion or modification of critical resources.
Deletes a role assignment, removing access for legitimate users and disrupting operations.
Creates or updates an Azure RBAC role assignment, granting a principal specific permissions on a resource or scope.
Reads credential assets stored in an Azure Automation account, potentially exposing sensitive authentication data.
Creates or starts a runbook job in an Azure Automation account.
Creates or updates a runbook in an Azure Automation account.
Triggers an Azure Automation runbook via a webhook invocation.
Creates or updates a webhook that can trigger an Azure Automation runbook remotely.
Lists the access keys for an Azure Batch account, exposing credentials used to authenticate Batch API calls.
Generates a time-limited SAS URL to access or download the data of an Azure managed disk.
Generates a time-limited SAS URL to access or download the data from an Azure VM disk snapshot.
Creates or updates an SSH public key resource in Azure, used to authenticate to Linux virtual machines.
Permanently deletes an Azure virtual machine.
Installs or updates a VM extension on an Azure virtual machine, which can run scripts or install software agents.
Executes a script or command on an Azure VM without requiring network-based access such as SSH or RDP.
Creates or updates an Azure VM with a Custom Script Extension, executing a script on the VM at provisioning time.
Lists the admin credentials for an Azure Container Registry, exposing the username and password for registry access.
Retrieves the cluster-admin kubeconfig for an AKS cluster, granting full administrative access to the cluster.
Retrieves the user-level kubeconfig for an AKS cluster.
Executes a command against an AKS cluster's Kubernetes API without requiring direct network connectivity to the API server.
Adds or removes members from an Entra ID security group or Microsoft 365 group.
Adds or updates credentials (client secrets or certificates) for an Entra ID service principal.
Permanently deletes an Azure Event Hub entity within a namespace.
Removes an extension from an Azure Arc-enabled server.
Deletes an activity log alert rule, disabling security detection and notification capabilities.
Deletes an Azure Monitor diagnostic setting, stopping the forwarding of logs and metrics to a configured destination.
Deletes an Azure Monitor metric alert rule.
Modifies Key Vault access policies, potentially granting unauthorized access to secrets, keys, and certificates.
Reads a certificate stored in an Azure Key Vault.
Permanently deletes an Azure Key Vault; without soft-delete, all secrets, keys, and certificates are unrecoverable.
Reads a cryptographic key from an Azure Key Vault.
Deletes a secret from an Azure Key Vault.
Reads a secret value from an Azure Key Vault.
Assigns a user-assigned managed identity to an Azure resource, enabling it to authenticate to other Azure services.
Deletes a network security group, removing network access controls from associated resources.
Creates or updates a security rule in an Azure Network Security Group, controlling inbound or outbound traffic.
Deletes an NSG flow log configuration, stopping the capture of network traffic metadata for a network security group.
Creates or modifies a virtual network peering, enabling network connectivity for lateral movement across VNets.
Permanently deletes a Log Analytics workspace and its stored data.
Retrieves the primary and secondary access keys for a Log Analytics workspace.
Removes a protected item from Azure Backup, stopping protection and deleting associated backup data.
Creates or updates a suppression rule in Microsoft Defender for Cloud, hiding matching security alerts.
Modifies auto-provisioning settings, potentially disabling automatic deployment of security monitoring agents.
Changes the pricing tier (plan) for Microsoft Defender for Cloud on a subscription or specific resource type.
Removes a security solution integrated with Microsoft Defender for Cloud.
Connects to the serial console of an Azure VM, providing low-level access without requiring network connectivity.
Lists the access keys for an Azure Service Bus namespace authorization rule, exposing connection strings for messaging.
Permanently deletes an Azure SQL Database.
Exports an Azure SQL Database to a BACPAC file stored in Azure Blob Storage.
Permanently deletes a blob container from an Azure Storage account.
Permanently deletes an Azure Storage account and all of its data.
Lists the access keys for an Azure Storage account, exposing credentials that provide full data-plane access.
Regenerates one of the two access keys for an Azure Storage account, invalidating the previous key.
Stops logging for an Azure Storage account, disabling the collection of storage analytics logs.
Lists the host keys for an Azure App Service or Azure Functions app, exposing function-level and master access keys.
Resets an Entra ID user's password through an administrative action.
Modifies an existing Conditional Access policy, changing the conditions or controls that govern how users authenticate.
Updates a named location definition (IP ranges or countries) used in Entra ID Conditional Access policy conditions.
Modifies an existing custom Azure RBAC role definition, updating its allowed or denied actions.
Changes the MFA or passwordless authentication methods registered for a user in Microsoft Entra ID.
Updates the properties of an Azure Key Vault, such as its access policies, network rules, or soft-delete configuration.