Claude-skill-registry azure-rbac
Query Azure RBAC role assignments and definitions (read-only)
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/azure-rbac" ~/.claude/skills/majiayu000-claude-skill-registry-azure-rbac && rm -rf "$T"
manifest:
skills/data/azure-rbac/SKILL.mdsource content
Azure RBAC Skill (Read-Only)
Inspect role-based access control assignments and definitions.
See also: Shared Conventions | Safety Guidelines
Purpose
Query who has access to what in Azure without making changes.
Commands
az role assignment list -o json az role assignment list --assignee <principal> -o json az role assignment list --scope <scope> -o json az role assignment list --resource-group <rg> -o json az role definition list -o json az role definition show --name <role-name> -o json
Output Format
Always use
for consistent, parseable output.-o json
Workflow Examples
List All Role Assignments
az role assignment list -o json
Check User's Permissions
az role assignment list --assignee "user@example.com" -o json
Check Service Principal Access
az role assignment list --assignee <app-id-or-object-id> -o json
List Assignments at Scope
# Resource group scope az role assignment list --resource-group my-rg -o json # Subscription scope az role assignment list --scope "/subscriptions/<sub-id>" -o json # Resource scope az role assignment list --scope "/subscriptions/.../resourceGroups/.../providers/..." -o json
Inspect Role Definition
# Built-in role az role definition show --name "Contributor" -o json # List all role definitions az role definition list -o json # Custom roles only az role definition list --custom-role-only true -o json
Common Built-in Roles
| Role | Description |
|---|---|
| Owner | Full access including RBAC |
| Contributor | Full access except RBAC |
| Reader | Read-only access |
| User Access Administrator | Manage RBAC only |
Understanding Output
Role assignment includes:
- who has accessprincipalId
- what roleroleDefinitionName
- where it appliesscope
Policies
- Read-only only - no role assignment create/delete
- Always use JSON output
- If asked to grant/revoke access: stop, explain read-only scope, show required command, require explicit confirmation