Claude-skill-registry azure-rbac

Query Azure RBAC role assignments and definitions (read-only)

install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/azure-rbac" ~/.claude/skills/majiayu000-claude-skill-registry-azure-rbac && rm -rf "$T"
manifest: skills/data/azure-rbac/SKILL.md
source content

Azure RBAC Skill (Read-Only)

Inspect role-based access control assignments and definitions.

See also: Shared Conventions | Safety Guidelines

Purpose

Query who has access to what in Azure without making changes.

Commands

az role assignment list -o json
az role assignment list --assignee <principal> -o json
az role assignment list --scope <scope> -o json
az role assignment list --resource-group <rg> -o json
az role definition list -o json
az role definition show --name <role-name> -o json

Output Format

Always use

-o json
for consistent, parseable output.

Workflow Examples

List All Role Assignments

az role assignment list -o json

Check User's Permissions

az role assignment list --assignee "user@example.com" -o json

Check Service Principal Access

az role assignment list --assignee <app-id-or-object-id> -o json

List Assignments at Scope

# Resource group scope
az role assignment list --resource-group my-rg -o json

# Subscription scope
az role assignment list --scope "/subscriptions/<sub-id>" -o json

# Resource scope
az role assignment list --scope "/subscriptions/.../resourceGroups/.../providers/..." -o json

Inspect Role Definition

# Built-in role
az role definition show --name "Contributor" -o json

# List all role definitions
az role definition list -o json

# Custom roles only
az role definition list --custom-role-only true -o json

Common Built-in Roles

RoleDescription
OwnerFull access including RBAC
ContributorFull access except RBAC
ReaderRead-only access
User Access AdministratorManage RBAC only

Understanding Output

Role assignment includes:

  • principalId
    - who has access
  • roleDefinitionName
    - what role
  • scope
    - where it applies

Policies

  • Read-only only - no role assignment create/delete
  • Always use JSON output
  • If asked to grant/revoke access: stop, explain read-only scope, show required command, require explicit confirmation