Azure: Assign Roles via ARM Template to storage container The 2019 Stack Overflow Developer Survey Results Are InRBAC assignment via ARM template errors out with InvalidCreateRoleAssignmentRequestARM Error: The Template Resource is not found using resource(), copyIndex()Alert rule in Azure ARM template not enabled in web testOutput Azure SQL Database ConnectionString after template deploymentARM template vs Azure SDK feature compatibilityAzure RBAC Rest API call to get Object TypeHow to create an Azure AKS service through ARM TemplateApply Azure RBAC to a resource using ARMChecking azure CDN resource usage needs contributor rights in subscriptionAzure: get user email by principal idRole assignment authorization failed for new resource group created from ARM template in Azure DevOps

Can't find the latex code for the ⍎ (down tack jot) symbol

How to make payment on the internet without leaving a money trail?

"Riffle" two strings

Does it makes sense to buy a new cycle to learn riding?

How can I create a character who can assume the widest possible range of creature sizes?

Why is my p-value correlated to difference between means in two sample tests?

What function has this graph?

"To split hairs" vs "To be pedantic"

Idiomatic way to prevent slicing?

Why can Shazam do this?

Is there a name of the flying bionic bird?

Understanding the implication of what "well-defined" means for the operation in quotient group

Why isn't airport relocation done gradually?

How to manage monthly salary

Is bread bad for ducks?

What is this 4-propeller plane?

Can distinct morphisms between curves induce the same morphism on singular cohomology?

A poker game description that does not feel gimmicky

Falsification in Math vs Science

JSON.serialize: is it possible to suppress null values of a map?

I looked up a future colleague on LinkedIn before I started a job. I told my colleague about it and he seemed surprised. Should I apologize?

Is three citations per paragraph excessive for undergraduate research paper?

Manuscript was "unsubmitted" because the manuscript was deposited in Arxiv Preprints

What is a mixture ratio of propellant?



Azure: Assign Roles via ARM Template to storage container



The 2019 Stack Overflow Developer Survey Results Are InRBAC assignment via ARM template errors out with InvalidCreateRoleAssignmentRequestARM Error: The Template Resource is not found using resource(), copyIndex()Alert rule in Azure ARM template not enabled in web testOutput Azure SQL Database ConnectionString after template deploymentARM template vs Azure SDK feature compatibilityAzure RBAC Rest API call to get Object TypeHow to create an Azure AKS service through ARM TemplateApply Azure RBAC to a resource using ARMChecking azure CDN resource usage needs contributor rights in subscriptionAzure: get user email by principal idRole assignment authorization failed for new resource group created from ARM template in Azure DevOps



.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















I'm trying to assign the role "Storage Blob Data Contributor (Preview)" to a specific storage container via arm template. But I just can't figure out the correct syntax.



This is what I have:




"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters":
"principalId":
"type": "string",
"metadata":
"description": "The principal to assign the role to"

,
"builtInRoleType":
"type": "string",
"allowedValues": [
"Contributor",
"Reader",
"StorageBlobDataContributor"
],
"metadata":
"description": "Built-in role to assign"


,
"variables":
"apiVersion": "2017-05-01",
"Owner": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', '8e3af657-a8ff-443c-a75c-2fe8c4bcb635')]",
"Contributor": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', 'b24988ac-6180-42a0-ab88-20f7382dd24c')]",
"Reader": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', 'acdd72a7-3385-48ef-bd42-f606fba81ae7')]",
"StorageBlobDataContributor": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', 'ba92f5b4-2d11-453d-a403-e96b0029c9fe')]",
"TestVariable": "[concat('STORAGEACCOUNTNAME','/Microsoft.Authorization/',guid(subscription().subscriptionId))]"
,
"resources": [

"type": "Microsoft.Storage/storageAccounts/providers/roleAssignments",
"apiVersion": "[variables('apiVersion')]",
"name": "[variables('TestVariable')]",
"properties":
"roleDefinitionId": "[variables('Reader')]",
"principalId": "[parameters('principalId')]"

,

"type": "Microsoft.Storage/storageAccounts/STORAGEACCOUNTNAME/blobServices/containers/blobCONTAINERNAME/providers/Microsoft.Authorization/roleAssignments",
"apiVersion": "[variables('apiVersion')]",
"name": "STORAGEACCOUNTNAME/blobServices/containers/default/blobCONTAINERNAME/Microsoft.Authorization/NEW-GUID",
"properties":
"roleDefinitionId": "[variables('StorageBlobDataContributor')]",
"principalId": "[parameters('principalId')]"


],
"outputs":



I can attach the reader role to the storage account itself succesfully.
But for the container I get the following error:



 new-AzResourceGroupDeployment : 09:21:24 - Error: Code=InvalidTemplate; Message=Deployment template validation failed: 'The template resource
'STORAGEACCOUNTNAME/blobServices/containers/CONTAINERNAME/Microsoft.Authorization/GUID' for type
'Microsoft.Storage/storageAccounts/STORAGEACCOUNTNAME/blobServices/default/containers/CONTAINERNAME/providers/Microsoft.Authorization/roleAssignments' at line '44' and column '9' has incorrect
segment lengths. A nested resource type must have identical number of segments as its resource name. A root resource type must have segment length one greater than its resource name. Please see
https://aka.ms/arm-template/#resources for usage details.'.


I have tried so many ways trying to attach the role, that I out of idea's.
Can someone help me?










share|improve this question




























    0















    I'm trying to assign the role "Storage Blob Data Contributor (Preview)" to a specific storage container via arm template. But I just can't figure out the correct syntax.



    This is what I have:




    "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
    "contentVersion": "1.0.0.0",
    "parameters":
    "principalId":
    "type": "string",
    "metadata":
    "description": "The principal to assign the role to"

    ,
    "builtInRoleType":
    "type": "string",
    "allowedValues": [
    "Contributor",
    "Reader",
    "StorageBlobDataContributor"
    ],
    "metadata":
    "description": "Built-in role to assign"


    ,
    "variables":
    "apiVersion": "2017-05-01",
    "Owner": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', '8e3af657-a8ff-443c-a75c-2fe8c4bcb635')]",
    "Contributor": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', 'b24988ac-6180-42a0-ab88-20f7382dd24c')]",
    "Reader": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', 'acdd72a7-3385-48ef-bd42-f606fba81ae7')]",
    "StorageBlobDataContributor": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', 'ba92f5b4-2d11-453d-a403-e96b0029c9fe')]",
    "TestVariable": "[concat('STORAGEACCOUNTNAME','/Microsoft.Authorization/',guid(subscription().subscriptionId))]"
    ,
    "resources": [

    "type": "Microsoft.Storage/storageAccounts/providers/roleAssignments",
    "apiVersion": "[variables('apiVersion')]",
    "name": "[variables('TestVariable')]",
    "properties":
    "roleDefinitionId": "[variables('Reader')]",
    "principalId": "[parameters('principalId')]"

    ,

    "type": "Microsoft.Storage/storageAccounts/STORAGEACCOUNTNAME/blobServices/containers/blobCONTAINERNAME/providers/Microsoft.Authorization/roleAssignments",
    "apiVersion": "[variables('apiVersion')]",
    "name": "STORAGEACCOUNTNAME/blobServices/containers/default/blobCONTAINERNAME/Microsoft.Authorization/NEW-GUID",
    "properties":
    "roleDefinitionId": "[variables('StorageBlobDataContributor')]",
    "principalId": "[parameters('principalId')]"


    ],
    "outputs":



    I can attach the reader role to the storage account itself succesfully.
    But for the container I get the following error:



     new-AzResourceGroupDeployment : 09:21:24 - Error: Code=InvalidTemplate; Message=Deployment template validation failed: 'The template resource
    'STORAGEACCOUNTNAME/blobServices/containers/CONTAINERNAME/Microsoft.Authorization/GUID' for type
    'Microsoft.Storage/storageAccounts/STORAGEACCOUNTNAME/blobServices/default/containers/CONTAINERNAME/providers/Microsoft.Authorization/roleAssignments' at line '44' and column '9' has incorrect
    segment lengths. A nested resource type must have identical number of segments as its resource name. A root resource type must have segment length one greater than its resource name. Please see
    https://aka.ms/arm-template/#resources for usage details.'.


    I have tried so many ways trying to attach the role, that I out of idea's.
    Can someone help me?










    share|improve this question
























      0












      0








      0


      1






      I'm trying to assign the role "Storage Blob Data Contributor (Preview)" to a specific storage container via arm template. But I just can't figure out the correct syntax.



      This is what I have:




      "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
      "contentVersion": "1.0.0.0",
      "parameters":
      "principalId":
      "type": "string",
      "metadata":
      "description": "The principal to assign the role to"

      ,
      "builtInRoleType":
      "type": "string",
      "allowedValues": [
      "Contributor",
      "Reader",
      "StorageBlobDataContributor"
      ],
      "metadata":
      "description": "Built-in role to assign"


      ,
      "variables":
      "apiVersion": "2017-05-01",
      "Owner": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', '8e3af657-a8ff-443c-a75c-2fe8c4bcb635')]",
      "Contributor": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', 'b24988ac-6180-42a0-ab88-20f7382dd24c')]",
      "Reader": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', 'acdd72a7-3385-48ef-bd42-f606fba81ae7')]",
      "StorageBlobDataContributor": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', 'ba92f5b4-2d11-453d-a403-e96b0029c9fe')]",
      "TestVariable": "[concat('STORAGEACCOUNTNAME','/Microsoft.Authorization/',guid(subscription().subscriptionId))]"
      ,
      "resources": [

      "type": "Microsoft.Storage/storageAccounts/providers/roleAssignments",
      "apiVersion": "[variables('apiVersion')]",
      "name": "[variables('TestVariable')]",
      "properties":
      "roleDefinitionId": "[variables('Reader')]",
      "principalId": "[parameters('principalId')]"

      ,

      "type": "Microsoft.Storage/storageAccounts/STORAGEACCOUNTNAME/blobServices/containers/blobCONTAINERNAME/providers/Microsoft.Authorization/roleAssignments",
      "apiVersion": "[variables('apiVersion')]",
      "name": "STORAGEACCOUNTNAME/blobServices/containers/default/blobCONTAINERNAME/Microsoft.Authorization/NEW-GUID",
      "properties":
      "roleDefinitionId": "[variables('StorageBlobDataContributor')]",
      "principalId": "[parameters('principalId')]"


      ],
      "outputs":



      I can attach the reader role to the storage account itself succesfully.
      But for the container I get the following error:



       new-AzResourceGroupDeployment : 09:21:24 - Error: Code=InvalidTemplate; Message=Deployment template validation failed: 'The template resource
      'STORAGEACCOUNTNAME/blobServices/containers/CONTAINERNAME/Microsoft.Authorization/GUID' for type
      'Microsoft.Storage/storageAccounts/STORAGEACCOUNTNAME/blobServices/default/containers/CONTAINERNAME/providers/Microsoft.Authorization/roleAssignments' at line '44' and column '9' has incorrect
      segment lengths. A nested resource type must have identical number of segments as its resource name. A root resource type must have segment length one greater than its resource name. Please see
      https://aka.ms/arm-template/#resources for usage details.'.


      I have tried so many ways trying to attach the role, that I out of idea's.
      Can someone help me?










      share|improve this question














      I'm trying to assign the role "Storage Blob Data Contributor (Preview)" to a specific storage container via arm template. But I just can't figure out the correct syntax.



      This is what I have:




      "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
      "contentVersion": "1.0.0.0",
      "parameters":
      "principalId":
      "type": "string",
      "metadata":
      "description": "The principal to assign the role to"

      ,
      "builtInRoleType":
      "type": "string",
      "allowedValues": [
      "Contributor",
      "Reader",
      "StorageBlobDataContributor"
      ],
      "metadata":
      "description": "Built-in role to assign"


      ,
      "variables":
      "apiVersion": "2017-05-01",
      "Owner": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', '8e3af657-a8ff-443c-a75c-2fe8c4bcb635')]",
      "Contributor": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', 'b24988ac-6180-42a0-ab88-20f7382dd24c')]",
      "Reader": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', 'acdd72a7-3385-48ef-bd42-f606fba81ae7')]",
      "StorageBlobDataContributor": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', 'ba92f5b4-2d11-453d-a403-e96b0029c9fe')]",
      "TestVariable": "[concat('STORAGEACCOUNTNAME','/Microsoft.Authorization/',guid(subscription().subscriptionId))]"
      ,
      "resources": [

      "type": "Microsoft.Storage/storageAccounts/providers/roleAssignments",
      "apiVersion": "[variables('apiVersion')]",
      "name": "[variables('TestVariable')]",
      "properties":
      "roleDefinitionId": "[variables('Reader')]",
      "principalId": "[parameters('principalId')]"

      ,

      "type": "Microsoft.Storage/storageAccounts/STORAGEACCOUNTNAME/blobServices/containers/blobCONTAINERNAME/providers/Microsoft.Authorization/roleAssignments",
      "apiVersion": "[variables('apiVersion')]",
      "name": "STORAGEACCOUNTNAME/blobServices/containers/default/blobCONTAINERNAME/Microsoft.Authorization/NEW-GUID",
      "properties":
      "roleDefinitionId": "[variables('StorageBlobDataContributor')]",
      "principalId": "[parameters('principalId')]"


      ],
      "outputs":



      I can attach the reader role to the storage account itself succesfully.
      But for the container I get the following error:



       new-AzResourceGroupDeployment : 09:21:24 - Error: Code=InvalidTemplate; Message=Deployment template validation failed: 'The template resource
      'STORAGEACCOUNTNAME/blobServices/containers/CONTAINERNAME/Microsoft.Authorization/GUID' for type
      'Microsoft.Storage/storageAccounts/STORAGEACCOUNTNAME/blobServices/default/containers/CONTAINERNAME/providers/Microsoft.Authorization/roleAssignments' at line '44' and column '9' has incorrect
      segment lengths. A nested resource type must have identical number of segments as its resource name. A root resource type must have segment length one greater than its resource name. Please see
      https://aka.ms/arm-template/#resources for usage details.'.


      I have tried so many ways trying to attach the role, that I out of idea's.
      Can someone help me?







      azure azure-storage-blobs arm-template azure-storage-account






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Mar 8 at 8:37









      ErikErik

      113




      113






















          2 Answers
          2






          active

          oldest

          votes


















          1














          Made some little adjustments:



          "type": "Microsoft.Storage/storageAccounts/blobServices/containers/providers/roleAssignments",
          "name": "STORAGEACCOUNTNAME/default/CONTAINERNAME/Microsoft.Authorization/NEW-GUID"


          This way I can assign roles on the container itself. Thanks 4c74356b41 for pointing me in the right direction






          share|improve this answer






























            0














            you need to construct something like this:



            resourceId/Microsoft.Authorization/roleAssignments/NEW-GUID


            and resourceId is normally being constructed as



            type: provider/namespace
            name: name

            provider/namespace/name


            for example, for subnet it would be (notice it takes 1 segment from each line in turn, except for the first one, first one is always 2 segments):



            type: microsoft.network/virtualnetworks/subnets
            name: vnetName/subnetName

            microsoft.network/virtualnetworks/vnetName/subnets/subnetName


            if that is even possible it would look like something like this:



            "type": "Microsoft.Storage/storageAccounts/blobServices/containers/providers/roleAssignments",
            "name": "STORAGEACCOUNTNAME/default/CONTAINERNAME/Microsoft.Authorization/NEW-GUID"

            Microsoft.Storage/storageAccounts/STORAGEACCOUNTNAME/containers/CONTAINERNAME/providers/Microsoft.Authorization/roleAssignments/NEW-GUID





            share|improve this answer

























              Your Answer






              StackExchange.ifUsing("editor", function ()
              StackExchange.using("externalEditor", function ()
              StackExchange.using("snippets", function ()
              StackExchange.snippets.init();
              );
              );
              , "code-snippets");

              StackExchange.ready(function()
              var channelOptions =
              tags: "".split(" "),
              id: "1"
              ;
              initTagRenderer("".split(" "), "".split(" "), channelOptions);

              StackExchange.using("externalEditor", function()
              // Have to fire editor after snippets, if snippets enabled
              if (StackExchange.settings.snippets.snippetsEnabled)
              StackExchange.using("snippets", function()
              createEditor();
              );

              else
              createEditor();

              );

              function createEditor()
              StackExchange.prepareEditor(
              heartbeatType: 'answer',
              autoActivateHeartbeat: false,
              convertImagesToLinks: true,
              noModals: true,
              showLowRepImageUploadWarning: true,
              reputationToPostImages: 10,
              bindNavPrevention: true,
              postfix: "",
              imageUploader:
              brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
              contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
              allowUrls: true
              ,
              onDemand: true,
              discardSelector: ".discard-answer"
              ,immediatelyShowMarkdownHelp:true
              );



              );













              draft saved

              draft discarded


















              StackExchange.ready(
              function ()
              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f55059441%2fazure-assign-roles-via-arm-template-to-storage-container%23new-answer', 'question_page');

              );

              Post as a guest















              Required, but never shown

























              2 Answers
              2






              active

              oldest

              votes








              2 Answers
              2






              active

              oldest

              votes









              active

              oldest

              votes






              active

              oldest

              votes









              1














              Made some little adjustments:



              "type": "Microsoft.Storage/storageAccounts/blobServices/containers/providers/roleAssignments",
              "name": "STORAGEACCOUNTNAME/default/CONTAINERNAME/Microsoft.Authorization/NEW-GUID"


              This way I can assign roles on the container itself. Thanks 4c74356b41 for pointing me in the right direction






              share|improve this answer



























                1














                Made some little adjustments:



                "type": "Microsoft.Storage/storageAccounts/blobServices/containers/providers/roleAssignments",
                "name": "STORAGEACCOUNTNAME/default/CONTAINERNAME/Microsoft.Authorization/NEW-GUID"


                This way I can assign roles on the container itself. Thanks 4c74356b41 for pointing me in the right direction






                share|improve this answer

























                  1












                  1








                  1







                  Made some little adjustments:



                  "type": "Microsoft.Storage/storageAccounts/blobServices/containers/providers/roleAssignments",
                  "name": "STORAGEACCOUNTNAME/default/CONTAINERNAME/Microsoft.Authorization/NEW-GUID"


                  This way I can assign roles on the container itself. Thanks 4c74356b41 for pointing me in the right direction






                  share|improve this answer













                  Made some little adjustments:



                  "type": "Microsoft.Storage/storageAccounts/blobServices/containers/providers/roleAssignments",
                  "name": "STORAGEACCOUNTNAME/default/CONTAINERNAME/Microsoft.Authorization/NEW-GUID"


                  This way I can assign roles on the container itself. Thanks 4c74356b41 for pointing me in the right direction







                  share|improve this answer












                  share|improve this answer



                  share|improve this answer










                  answered Mar 12 at 14:52









                  ErikErik

                  113




                  113























                      0














                      you need to construct something like this:



                      resourceId/Microsoft.Authorization/roleAssignments/NEW-GUID


                      and resourceId is normally being constructed as



                      type: provider/namespace
                      name: name

                      provider/namespace/name


                      for example, for subnet it would be (notice it takes 1 segment from each line in turn, except for the first one, first one is always 2 segments):



                      type: microsoft.network/virtualnetworks/subnets
                      name: vnetName/subnetName

                      microsoft.network/virtualnetworks/vnetName/subnets/subnetName


                      if that is even possible it would look like something like this:



                      "type": "Microsoft.Storage/storageAccounts/blobServices/containers/providers/roleAssignments",
                      "name": "STORAGEACCOUNTNAME/default/CONTAINERNAME/Microsoft.Authorization/NEW-GUID"

                      Microsoft.Storage/storageAccounts/STORAGEACCOUNTNAME/containers/CONTAINERNAME/providers/Microsoft.Authorization/roleAssignments/NEW-GUID





                      share|improve this answer





























                        0














                        you need to construct something like this:



                        resourceId/Microsoft.Authorization/roleAssignments/NEW-GUID


                        and resourceId is normally being constructed as



                        type: provider/namespace
                        name: name

                        provider/namespace/name


                        for example, for subnet it would be (notice it takes 1 segment from each line in turn, except for the first one, first one is always 2 segments):



                        type: microsoft.network/virtualnetworks/subnets
                        name: vnetName/subnetName

                        microsoft.network/virtualnetworks/vnetName/subnets/subnetName


                        if that is even possible it would look like something like this:



                        "type": "Microsoft.Storage/storageAccounts/blobServices/containers/providers/roleAssignments",
                        "name": "STORAGEACCOUNTNAME/default/CONTAINERNAME/Microsoft.Authorization/NEW-GUID"

                        Microsoft.Storage/storageAccounts/STORAGEACCOUNTNAME/containers/CONTAINERNAME/providers/Microsoft.Authorization/roleAssignments/NEW-GUID





                        share|improve this answer



























                          0












                          0








                          0







                          you need to construct something like this:



                          resourceId/Microsoft.Authorization/roleAssignments/NEW-GUID


                          and resourceId is normally being constructed as



                          type: provider/namespace
                          name: name

                          provider/namespace/name


                          for example, for subnet it would be (notice it takes 1 segment from each line in turn, except for the first one, first one is always 2 segments):



                          type: microsoft.network/virtualnetworks/subnets
                          name: vnetName/subnetName

                          microsoft.network/virtualnetworks/vnetName/subnets/subnetName


                          if that is even possible it would look like something like this:



                          "type": "Microsoft.Storage/storageAccounts/blobServices/containers/providers/roleAssignments",
                          "name": "STORAGEACCOUNTNAME/default/CONTAINERNAME/Microsoft.Authorization/NEW-GUID"

                          Microsoft.Storage/storageAccounts/STORAGEACCOUNTNAME/containers/CONTAINERNAME/providers/Microsoft.Authorization/roleAssignments/NEW-GUID





                          share|improve this answer















                          you need to construct something like this:



                          resourceId/Microsoft.Authorization/roleAssignments/NEW-GUID


                          and resourceId is normally being constructed as



                          type: provider/namespace
                          name: name

                          provider/namespace/name


                          for example, for subnet it would be (notice it takes 1 segment from each line in turn, except for the first one, first one is always 2 segments):



                          type: microsoft.network/virtualnetworks/subnets
                          name: vnetName/subnetName

                          microsoft.network/virtualnetworks/vnetName/subnets/subnetName


                          if that is even possible it would look like something like this:



                          "type": "Microsoft.Storage/storageAccounts/blobServices/containers/providers/roleAssignments",
                          "name": "STORAGEACCOUNTNAME/default/CONTAINERNAME/Microsoft.Authorization/NEW-GUID"

                          Microsoft.Storage/storageAccounts/STORAGEACCOUNTNAME/containers/CONTAINERNAME/providers/Microsoft.Authorization/roleAssignments/NEW-GUID






                          share|improve this answer














                          share|improve this answer



                          share|improve this answer








                          edited Mar 15 at 5:56

























                          answered Mar 8 at 8:49









                          4c74356b414c74356b41

                          32.9k42657




                          32.9k42657



























                              draft saved

                              draft discarded
















































                              Thanks for contributing an answer to Stack Overflow!


                              • Please be sure to answer the question. Provide details and share your research!

                              But avoid


                              • Asking for help, clarification, or responding to other answers.

                              • Making statements based on opinion; back them up with references or personal experience.

                              To learn more, see our tips on writing great answers.




                              draft saved


                              draft discarded














                              StackExchange.ready(
                              function ()
                              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f55059441%2fazure-assign-roles-via-arm-template-to-storage-container%23new-answer', 'question_page');

                              );

                              Post as a guest















                              Required, but never shown





















































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown

































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown







                              Popular posts from this blog

                              1928 у кіно

                              Захаров Федір Захарович

                              Ель Греко