First part of this gist contains list of Azure RBAC and Azure AD roles sorted by their names.
Second part contains full definitions of each role along with their permissions assigned.
## Role Definitions
### Azure RBAC Roles
| # | RoleName | RoleDescription | RoleId |
|---|----------|-----------------|--------|
| 1 | `Experimentation Metric Contributor` | _Allows for creation, writes and reads to the metric set via the metrics service APIs._ | `6188b7c9-7d01-4f99-a59f-c88b630326c0` |
| 2 | `Project Babylon Data Curator` | _The Microsoft.ProjectBabylon data curator can create, read, modify and delete catalog data objects and establish relationships between objects. This role is in preview and subject to change._ | `9ef4ef9c-a049-46b0-82ab-dd8ac094c889` |
| 3 | `Storage Account Backup Contributor Role` | _Storage Account Backup Contributors are allowed to perform backup and restore of Storage Account._ | `e5e2a7ff-d759-4cd2-bb51-3152d37e2eb1` |
| 9 | `Project Babylon Data Reader` | _The Microsoft.ProjectBabylon data reader can read catalog data objects. This role is in preview and subject to change._ | `c8d896ba-346d-4f50-bc1d-7d1c84130446` |
| 10 | `Project Babylon Data Source Administrator` | _The Microsoft.ProjectBabylon data source administrator can manage data sources and data scans. This role is in preview and subject to change._ | `05b7651b-dc44-475e-b74d-df3db49fae0f` |
| 11 | `AgFood Platform Service Reader` | _Provides read access to AgFood Platform Service_ | `7ec7ccdc-f61e-41fe-9aaf-980df0a44eba` |
| 12 | `AgFood Platform Service Contributor` | _Provides contribute access to AgFood Platform Service_ | `8508508a-4469-4e45-963b-2518ee0bb728` |
| 13 | `Schema Registry Contributor (Preview)` | _Read, write, and delete Schema Registry groups and schemas._ | `5dffeca3-4936-4216-b2bc-10343a5abb25` |
| 14 | `Cognitive Services Metrics Advisor User` | _Access to the project._ | `3b20f47b-3825-43cb-8114-4bd2201156a8` |
| 15 | `Schema Registry Reader (Preview)` | _Read and list Schema Registry groups and schemas._ | `2c56ea50-c6b3-40a6-83c0-9d98858bc7d2` |
| 16 | `SignalR REST API Reader` | _Read-only access to Azure SignalR Service REST APIs_ | `ddde6b66-c0df-4114-a159-3618637b3035` |
| 17 | `SignalR Service Owner` | _Full access to Azure SignalR Service REST APIs_ | `7e4f1700-ea5a-4f59-8f37-079cfe29dce3` |
| 18 | `Security Detonation Chamber Submitter` | _Allowed to create submissions to Security Detonation Chamber_ | `0b555d9b-b4a7-4f43-b330-627f0e5be8f0` |
| 19 | `AgFood Platform Service Admin` | _Provides admin access to AgFood Platform Service_ | `f8da80de-1ff9-4747-ad80-a19b7f6079e3` |
| 20 | `Managed HSM contributor` | _Lets you manage managed HSM pools, but not access to them._ | `18500a29-7fe2-46b2-a342-b16a415e101d` |
| 21 | `Autonomous Development Platform Data Reader (Preview)` | _Grants read access to Autonomous Development Platform data._ | `d63b75f7-47ea-4f27-92ac-e0d173aaf093` |
| 22 | `Autonomous Development Platform Data Owner (Preview)` | _Grants full access to Autonomous Development Platform data._ | `27f8b550-c507-4db9-86f2-f4b8e816d59d` |
| 23 | `Autonomous Development Platform Data Contributor (Preview)` | _Grants permissions to upload and manage new Autonomous Development Platform measurements._ | `b8b15564-4fa6-4a59-ab12-03e1d9594795` |
| 24 | `Desktop Virtualization Workspace Reader` | _Reader of the Desktop Virtualization Workspace._ | `0fa44ee9-7a7d-466b-9bb2-2bf446b1204d` |
| 25 | `Disk Backup Reader` | _Provides permission to backup vault to perform disk backup._ | `3e5e47e6-65f7-47ef-90b5-e5dd4d455f24` |
| 26 | `Security Detonation Chamber Submission Manager` | _Allowed to create and manage submissions to Security Detonation Chamber_ | `a37b566d-3efa-4beb-a2f2-698963fa42ce` |
| 27 | `Security Detonation Chamber Publisher` | _Allowed to publish and modify platforms, workflows and toolsets to Security Detonation Chamber_ | `352470b3-6a9c-4686-b503-35deb827e500` |
| 36 | `Desktop Virtualization Application Group Reader` | _Reader of the Desktop Virtualization Application Group._ | `aebf23d0-b568-4e86-b8f9-fe83a2c6ab55` |
| 37 | `Desktop Virtualization Application Group Contributor` | _Contributor of the Desktop Virtualization Application Group._ | `86240b0e-9422-4c43-887b-b61143f32ba8` |
| 38 | `Desktop Virtualization Host Pool Contributor` | _Contributor of the Desktop Virtualization Host Pool._ | `e307426c-f9b6-4e81-87de-d99efb3c32bc` |
| 39 | `Desktop Virtualization Session Host Operator` | _Operator of the Desktop Virtualization Session Host._ | `2ad6aaab-ead9-4eaa-8ac5-da422f562408` |
| 40 | `Desktop Virtualization Host Pool Reader` | _Reader of the Desktop Virtualization Host Pool._ | `ceadfde2-b300-400a-ab7b-6143895aa822` |
| 41 | `Key Vault Crypto User` | _Perform cryptographic operations using keys. Only works for key vaults that use the 'Azure role-based access control' permission model._ | `12338af0-0e69-4776-bea7-57ae8d297424` |
| 42 | `Key Vault Secrets Officer` | _Perform any action on the secrets of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model._ | `b86a8fe4-44ce-4948-aee5-eccb2c155cd7` |
| 43 | `Key Vault Crypto Officer` | _Perform any action on the keys of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model._ | `14b46e9e-c2b7-41b4-b07b-48a6ebf60603` |
| 44 | `Cognitive Services Custom Vision Trainer` | _View, edit projects and train the models, including the ability to publish, unpublish, export the models. Trainers can't create or delete the project._ | `0a5ae4ab-0d65-4eeb-be61-29fc9b54394b` |
| 45 | `Key Vault Administrator` | _Perform all data plane operations on a key vault and all objects in it, including certificates, keys, and secrets. Cannot manage key vault resources or manage role assignments. Only works for key vaults that use the 'Azure role-based access control' permission model._ | `00482a5a-887f-4fb3-b363-3b7fe8e74483` |
| 46 | `Key Vault Crypto Service Encryption User` | _Read metadata of keys and perform wrap/unwrap operations. Only works for key vaults that use the 'Azure role-based access control' permission model._ | `e147488a-f6f5-4113-8e2d-b22465e65bf6` |
| 47 | `Azure Arc Kubernetes Viewer` | _Lets you view all resources in cluster/namespace, except secrets._ | `63f0a09d-1495-4db4-a681-037d84835eb4` |
| 48 | `Key Vault Reader` | _Read metadata of key vaults and its certificates, keys, and secrets. Cannot read sensitive values such as secret contents or key material. Only works for key vaults that use the 'Azure role-based access control' permission model._ | `21090545-7ca7-4776-b22c-e363652d74d2` |
| 49 | `Key Vault Secrets User` | _Read secret contents. Only works for key vaults that use the 'Azure role-based access control' permission model._ | `4633458b-17de-408a-b874-0445c86b69e6` |
| 50 | `Key Vault Certificates Officer` | _Perform any action on the certificates of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model._ | `a4417e6f-fecd-4de8-b567-7b0420556985` |
| 52 | `Object Understanding Account Owner` | _Provides user with ingestion capabilities for Azure Object Understanding._ | `4dd61c23-6743-42fe-a388-d8bdd41cb745` |
| 53 | `FHIR Data Writer` | _Role allows user or principal to read and write FHIR Data_ | `3f88fce4-5892-4214-ae73-ba5294559913` |
| 54 | `FHIR Data Exporter` | _Role allows user or principal to read and export FHIR Data_ | `3db33094-8700-4567-8da5-1501d4e7e843` |
| 55 | `FHIR Data Reader` | _Role allows user or principal to read FHIR Data_ | `4c8d0bbc-75d3-4935-991f-5f3c56d81508` |
| 56 | `Cognitive Services Custom Vision Labeler` | _View, edit training images and create, add, remove, or delete the image tags. Labelers can view the project but can't update anything other than training images and tags._ | `88424f51-ebe7-446f-bc41-7fa16989e96c` |
| 57 | `Cognitive Services Custom Vision Reader` | _Read-only actions in the project. Readers can't create or update the project._ | `93586559-c37d-4a6b-ba08-b9f0940c2d73` |
| 58 | `Cognitive Services Custom Vision Deployment` | _Publish, unpublish or export models. Deployment can view the project but can't update._ | `5c4089e1-6d96-4d2f-b296-c1bc7137275f` |
| 59 | `Azure Maps Data Contributor` | _Grants access to read, write, and delete access to map related data from an Azure maps account._ | `8f5e0ce6-4f7b-4dcf-bddf-e6f48634a204` |
| 60 | `Cognitive Services Custom Vision Contributor` | _Full access to the project, including the ability to view, create, edit, or delete projects._ | `c1ff6cc2-c111-46fe-8896-e0ef812ad9f3` |
| 61 | `Device Update Reader` | _Gives you read access to management and content operations, but does not allow making changes_ | `e9dba6fb-3d52-4cf0-bce3-f06ce71b9e0f` |
| 62 | `Device Update Administrator` | _Gives you full access to management and content operations_ | `02ca0879-e8e4-47a5-a61e-5c618b76e64a` |
| 63 | `Collaborative Data Contributor` | _Can manage data packages of a collaborative._ | `daa9e50b-21df-454c-94a6-a8050adab352` |
| 64 | `SignalR App Server` | _Lets your app server access SignalR Service with AAD auth options._ | `420fcaa2-552c-430f-98ca-3264be4806c7` |
| 65 | `SignalR REST API Owner` | _Full access to Azure SignalR Service REST APIs_ | `fd53cd77-2268-407a-8f46-7e7863d0f521` |
| 66 | `Device Update Content Reader` | _Gives you read access to content operations, but does not allow making changes_ | `d1ee9a80-8b14-47f0-bdc2-f4a351625a7b` |
| 67 | `Cognitive Services Metrics Advisor Administrator` | _Full access to the project, including the system level configuration._ | `cb43c632-a144-4ec5-977c-e80c4affc34a` |
| 68 | `Device Update Deployments Reader` | _Gives you read access to management operations, but does not allow making changes_ | `49e2f5d2-7741-4835-8efa-19e1fe35e47f` |
| 69 | `Device Update Content Administrator` | _Gives you full access to content operations_ | `0378884a-3af5-44ab-8323-f5b22f9f3c98` |
| 70 | `Device Update Deployments Administrator` | _Gives you full access to management operations_ | `e4237640-0e3d-4a46-8fda-70bc94856432` |
| 71 | `Azure Kubernetes Service RBAC Cluster Admin` | _Lets you manage all resources in the cluster._ | `b1ff04bb-8a4e-4dc4-8eb5-8693973ce19b` |
| 72 | `Azure Kubernetes Service RBAC Admin` | _Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces._ | `3498e952-d568-435e-9b2c-8d77e338d7f7` |
| 73 | `Azure Arc Kubernetes Admin` | _Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces._ | `dffb1e0c-446f-4dde-a09f-99eb5cc68b96` |
| 74 | `Azure Arc Kubernetes Writer` | _Lets you update everything in cluster/namespace, except (cluster)roles and (cluster)role bindings._ | `5b999177-9696-4545-85c7-50de3797e5a1` |
| 75 | `Azure Arc Kubernetes Cluster Admin` | _Lets you manage all resources in the cluster._ | `8393591c-06b9-48a2-a542-1bd6b377f6a2` |
| 76 | `Object Understanding Account Reader` | _Lets you read ingestion jobs for an object understanding account._ | `d18777c0-1514-4662-8490-608db7d334b6` |
| 77 | `Azure Arc Enabled Kubernetes Cluster User Role` | _List cluster user credentials action._ | `00493d72-78f6-4148-b6c5-d3ce8e4799dd` |
| 78 | `Services Hub Operator` | _Services Hub Operator allows you to perform all read, write, and deletion operations related to Services Hub Connectors._ | `82200a5b-e217-47a5-b665-6d8765ee745b` |
| 79 | `Azure Kubernetes Service RBAC Reader` | _Allows read-only access to see most objects in a namespace. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces._ | `7f6c6a51-bcf8-42ba-9220-52d62157d7db` |
| 80 | `Azure Kubernetes Service RBAC Writer` | _Allows read/write access to most objects in a namespace.This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets and running Pods as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces._ | `a7ffa36f-339b-4b5c-8bdf-e2c188b2c0eb` |
| 81 | `Azure VM Managed identities restore Contributor` | _Azure VM Managed identities restore Contributors are allowed to perform Azure VM Restores with managed identities both user and system_ | `6ae96244-5829-4925-a7d3-5975537d91dd` |
| 82 | `Azure Maps Search and Render Data Reader` | _Grants access to very limited set of data APIs for common visual web SDK scenarios. Specifically, render and search data APIs._ | `6be48352-4f82-47c9-ad5e-0acacefdb005` |
| 83 | `Azure Spring Cloud Config Server Contributor` | _Allow read, write and delete access to Azure Spring Cloud Config Server_ | `a06f5c24-21a7-4e1a-aa2b-f19eb6684f5b` |
| 84 | `Azure Spring Cloud Service Registry Contributor` | _Allow read, write and delete access to Azure Spring Cloud Service Registry_ | `f5880b48-c26d-48be-b172-7927bfa1c8f1` |
| 85 | `Azure Spring Cloud Config Server Reader` | _Allow read access to Azure Spring Cloud Config Server_ | `d04c6db6-4947-4782-9e91-30a88feb7be7` |
| 86 | `Azure Arc VMware Administrator role ` | _Arc VMware VM Contributor has permissions to perform all connected VMwarevSphere actions._ | `ddc140ed-e463-4246-9145-7c664192013f` |
| 87 | `Azure Arc VMware Private Clouds Onboarding` | _Azure Arc VMware Private Clouds Onboarding role has permissions to provision all the required resources for onboard and deboard vCenter instances to Azure._ | `67d33e57-3129-45e6-bb0b-7cc522f762fa` |
| 88 | `Azure Arc VMware Private Cloud User` | _Azure Arc VMware Private Cloud User has permissions to use the VMware cloud resources to deploy VMs._ | `ce551c02-7c42-47e0-9deb-e3b6fc3a9a83` |
| 90 | `Azure Arc VMware VM Contributor` | _Arc VMware VM Contributor has permissions to perform all VM actions._ | `b748a06d-6150-4f8a-aaa9-ce3940cd96cb` |
| 94 | `Azure Relay Owner` | _Allows for full access to Azure Relay resources._ | `2787bf04-f1f5-4bfe-8383-c8a24483ee38` |
| 95 | `Azure Relay Listener` | _Allows for listen access to Azure Relay resources._ | `26e0b698-aa6d-4085-9386-aadae190014d` |
| 96 | `CodeSigning Certificate Profile Signer` | _Sign files with a certificate profile. This role is in preview and subject to change._ | `2837e146-70d7-4cfd-ad55-7efa6464f958` |
| 97 | `Azure Spring Cloud Service Registry Reader` | _Allow read access to Azure Spring Cloud Service Registry_ | `cff1b556-2399-4e7e-856d-a8f754be7b65` |
| 98 | `Device Provisioning Service Data Contributor` | _Allows for full access to Device Provisioning Service data-plane operations._ | `dfce44e4-17b7-4bd1-a6d1-04996ec95633` |
| 99 | `Kubernetes Extension Contributor` | _Can create, update, get, list and delete Kubernetes Extensions, and get extension async operations_ | `85cb6faf-e071-4c9b-8136-154b5a04f717` |
| 100 | `Device Provisioning Service Data Reader` | _Allows for full read access to Device Provisioning Service data-plane properties._ | `10745317-c249-44a1-a5ce-3a4353c0bbd8` |
| 104 | `Load Test Reader` | _View and list all load tests and load test resources but can not make any changes_ | `3ae3fb29-0000-4ccd-bf80-542e7b26e081` |
| 106 | `Chamber Admin` | _Lets you manage everything under your HPC Workbench chamber._ | `4e9b8407-af2e-495b-ae54-bb60a55b1b5a` |
| 107 | `Guest Configuration Resource Contributor` | _Grants access to read or write to Guest Configuration resources._ | `088ab73d-1256-47ae-bea9-9de8e7131f31` |
| 108 | `Chamber User` | _Lets you view everything under your HPC Workbench chamber, but not make any changes._ | `4447db05-44ed-4da3-ae60-6cbece780e32` |
| 111 | `Cognitive Services Language Owner` | _Has access to all Read, Test, Write, Deploy and Delete functions under Language portal_ | `f07febfe-79bc-46b1-8b37-790e26e6e498` |
| 112 | `Cognitive Services LUIS Reader` | _Has access to Read and Test functions under LUIS._ | `18e81cdc-4e98-4e29-a639-e7d10c5a6226` |
| 113 | `Cognitive Services Language Writer` | _ Has access to all Read, Test, and Write functions under Language Portal_ | `f2310ca1-dc64-4889-bb49-c8e0fa3d47a8` |
| 114 | `Cognitive Services LUIS Owner` | _ Has access to all Read, Test, Write, Deploy and Delete functions under LUIS_ | `f72c8140-2111-481c-87ff-72b910f6e3f8` |
| 115 | `Cognitive Services Language Reader` | _Has access to Read and Test functions under Language portal_ | `7628b7b8-a8b2-4cdc-b46f-e9b35248918e` |
| 116 | `Load Test Owner` | _Execute all operations on load test resources and load tests_ | `45bb0b16-2f0c-4e78-afaa-a07599b003f6` |
| 118 | `Load Test Contributor` | _View, create, update, delete and execute load tests. View and list load test resources but can not make any changes._ | `749a398d-560b-491b-bb21-08924219302e` |
| 119 | `Cognitive Services LUIS Writer` | _Has access to all Read, Test, and Write functions under LUIS_ | `6322a993-d5c9-4bed-b113-e49bbea25b27` |
| 121 | `Cognitive Services Speech User` | _Access to the real-time speech recognition and batch transcription APIs, real-time speech synthesis and long audio APIs, as well as to read the data/test/model/endpoint for custom models, but can't create, delete or modify the data/test/model/endpoint for custom models._ | `f2dc8367-1007-4938-bd23-fe263f013447` |
| 122 | `Cognitive Services Speech Contributor` | _Full access to Speech projects, including read, write and delete all entities, for real-time speech recognition and batch transcription tasks, real-time speech synthesis and long audio tasks, custom speech and custom voice._ | `0e75ca1e-0464-4b4d-8b93-68208a576181` |
| 123 | `Azure Spring Cloud Data Reader` | _Allow read access to Azure Spring Cloud Data_ | `b5537268-8956-4941-a8f0-646150406f0c` |
| 124 | `Web PubSub Service Owner (Preview)` | _Full access to Azure Web PubSub Service REST APIs_ | `12cf5a90-567b-43ae-8102-96cf46c7d9b4` |
| 125 | `Web PubSub Service Reader (Preview)` | _Read-only access to Azure Web PubSub Service REST APIs_ | `bfb1c7d2-fb1a-466b-b2ba-aee63b92deaf` |
| 126 | `Media Services Media Operator` | _Create, read, modify, and delete Assets, Asset Filters, Streaming Locators, and Jobs; read-only access to other Media Services resources._ | `e4395492-1534-4db2-bedf-88c14621589c` |
| 127 | `Media Services Policy Administrator` | _Create, read, modify, and delete Account Filters, Streaming Policies, Content Key Policies, and Transforms; read-only access to other Media Services resources. Cannot create Jobs, Assets or Streaming resources._ | `c4bba371-dacd-4a26-b320-7250bca963ae` |
| 128 | `Media Services Live Events Administrator` | _Create, read, modify, and delete Live Events, Assets, Asset Filters, and Streaming Locators; read-only access to other Media Services resources._ | `532bc159-b25e-42c0-969e-a1d439f60d77` |
| 129 | `Cognitive Services Face Recognizer` | _Lets you perform detect, verify, identify, group, and find similar operations on Face API. This role does not allow create or delete operations, which makes it well suited for endpoints that only need inferencing capabilities, following 'least privilege' best practices._ | `9894cab4-e18a-44aa-828b-cb588cd6f2d7` |
| 130 | `Media Services Account Administrator` | _Create, read, modify, and delete Media Services accounts; read-only access to other Media Services resources._ | `054126f8-9a2b-4f1c-a9ad-eca461f08466` |
| 140 | `Security Detonation Chamber Reader` | _Allowed to query submission info and files from Security Detonation Chamber_ | `28241645-39f8-410b-ad48-87863e2951d5` |
| 141 | `DICOM Data Owner` | _Full access to DICOM data._ | `58a3b984-7adf-4c20-983a-32417c86fbc8` |
| 142 | `EventGrid Data Sender` | _Allows send access to event grid events._ | `d5a91429-5739-47e2-a06b-3470a27159e7` |
| 143 | `DICOM Data Reader` | _Read and search DICOM data._ | `e89c7a3c-2f64-4fa1-a847-3e4c9ba4283a` |
| 144 | `Storage Table Data Reader` | _Allows for read access to Azure Storage tables and entities_ | `76199698-9eea-4c19-bc75-cec21354c6b6` |
| 145 | `Storage Table Data Contributor` | _Allows for read, write and delete access to Azure Storage tables and entities_ | `0a9a7e1f-b9d0-4cc4-a60d-0319b160aaa3` |
| 149 | `Disk Pool Operator` | _Used by the StoragePool Resource Provider to manage Disks added to a Disk Pool._ | `60fc6e62-5479-42d4-8bf4-67625fcc2840` |
| 150 | `AzureML Data Scientist` | _Can perform all actions within an Azure Machine Learning workspace, except for creating or deleting compute resources and modifying the workspace itself._ | `f6c7c914-8db3-469d-8ca1-694a8f32e121` |
| 151 | `IoT Hub Data Reader` | _Allows for full read access to IoT Hub data-plane properties_ | `b447c946-2db7-41ec-983d-d8bf3b1c77e3` |
| 152 | `IoT Hub Twin Contributor` | _Allows for read and write access to all IoT Hub device and module twins._ | `494bdba2-168f-4f31-a0a1-191d2f7c028c` |
| 153 | `AnyBuild Builder` | _Basic user role for AnyBuild. This role allows listing of agent information and execution of remote build capabilities._ | `a2138dac-4907-4679-a376-736901ed8ad8` |
| 154 | `Media Services Streaming Endpoints Administrator` | _Create, read, modify, and delete Streaming Endpoints; read-only access to other Media Services resources._ | `99dba123-b5fe-44d5-874c-ced7199a5804` |
| 155 | `Stream Analytics Query Tester` | _Lets you perform query testing without creating a stream analytics job first_ | `1ec5b3c1-b17e-4e25-8312-2acb3c3c5abf` |
| 156 | `Search Index Data Reader` | _Grants read access to Azure Cognitive Search index data._ | `1407120a-92aa-4202-b7e9-c0e197c71c8f` |
| 157 | `Search Index Data Contributor` | _Grants full access to Azure Cognitive Search index data._ | `8ebe5a00-799e-43f5-93ac-243d3dce84a7` |
| 158 | `Test Base Reader` | _Let you view and download packages and test results._ | `15e0f5a1-3450-4248-8e25-e2afe88a9e85` |
| 159 | `IoT Hub Registry Contributor` | _Allows for full access to IoT Hub device registry._ | `4ea46cd5-c1b2-4a8e-910b-273211f9ce47` |
| 160 | `IoT Hub Data Contributor` | _Allows for full access to IoT Hub data plane operations._ | `4fc6c259-987e-4a07-842e-c321cc9d413f` |
| 161 | `FHIR Data Contributor` | _Role allows user or principal full access to FHIR Data_ | `5a1fc7df-4bf1-4951-a576-89034ee01acd` |
| 163 | `Graph Owner` | _Create and manage all aspects of the Enterprise Graph - Ontology, Schema mapping, Conflation and Conversational AI and Ingestions_ | `b60367af-1334-4454-b71e-769d9a4f83d9` |
| 165 | `DocumentDB Account Contributor` | _Lets you manage DocumentDB accounts, but not access to them._ | `5bd9cd88-fe45-4216-938b-f97437e15450` |
| 166 | `DNS Zone Contributor` | _Lets you manage DNS zones and record sets in Azure DNS, but does not let you control who has access to them._ | `befefa01-2a29-4197-83a8-272ff33ce314` |
| 167 | `Knowledge Consumer` | _Knowledge Read permission to consume Enterprise Graph Knowledge using entity search and graph query_ | `ee361c5d-f7b5-4119-b4b6-892157c8f64c` |
| 168 | `Lab Creator` | _Lets you create new labs under your Azure Lab Accounts._ | `b97fb8bc-a8b2-4522-a38b-dd33c7e65ead` |
| 169 | `Key Vault Contributor` | _Lets you manage key vaults, but not access to them._ | `f25e0fa2-a7c8-4377-a976-54943a77a395` |
| 170 | `HDInsight Domain Services Contributor` | _Can Read, Create, Modify and Delete Domain Services related operations needed for HDInsight Enterprise Security Package_ | `8d8d5a11-05d3-4bda-a417-a08778121c7c` |
| 171 | `Intelligent Systems Account Contributor` | _Lets you manage Intelligent Systems accounts, but not access to them._ | `03a6d094-3444-4b3d-88af-7477090a9e5e` |
| 172 | `Cost Management Reader` | _Can view cost data and configuration (e.g. budgets, exports)_ | `72fafb9e-0641-4937-9268-a91bfd8191a3` |
| 173 | `Data Box Contributor` | _Lets you manage everything under Data Box Service except giving access to others._ | `add466c9-e687-43fc-8d98-dfcf8d720be5` |
| 175 | `Contributor` | _Grants full access to manage all resources, but does not allow you to assign roles in Azure RBAC, manage assignments in Azure Blueprints, or share image galleries._ | `b24988ac-6180-42a0-ab88-20f7382dd24c` |
| 176 | `Cosmos DB Account Reader Role` | _Can read Azure Cosmos DB Accounts data_ | `fbdf93bf-df7d-467e-a4d2-9458aa1360c8` |
| 177 | `Data Lake Analytics Developer` | _Lets you submit, monitor, and manage your own jobs but not create or delete Data Lake Analytics accounts._ | `47b7735b-770e-4598-a7da-8b91488b4c88` |
| 178 | `DevTest Labs User` | _Lets you connect, start, restart, and shutdown your virtual machines in your Azure DevTest Labs._ | `76283e04-6283-4c54-8f91-bcf1374a3c64` |
| 180 | `Data Box Reader` | _Lets you manage Data Box Service except creating order or editing order details and giving access to others._ | `028f4ed7-e2a9-465e-a8f4-9c0ffdfdc027` |
| 181 | `Data Factory Contributor` | _Create and manage data factories, as well as child resources within them._ | `673868aa-7521-48a0-acc6-0f60742d39f5` |
| 182 | `Monitoring Contributor` | _Can read all monitoring data and update monitoring settings._ | `749f88d5-cbae-40b8-bcfc-e573ddc772fa` |
| 183 | `New Relic APM Account Contributor` | _Lets you manage New Relic Application Performance Management accounts and applications, but not access to them._ | `5d28c62d-5b37-4476-8438-e587778df237` |
| 184 | `Network Contributor` | _Lets you manage networks, but not access to them._ | `4d97b98b-1d4f-4787-a291-c67834d212e7` |
| 187 | `Reader and Data Access` | _Lets you view everything but will not let you delete or create a storage account or contained resource. It will also allow read/write access to all data contained in a storage account via access to storage account keys._ | `c12c1c16-33a1-487b-954d-41c89c60f349` |
| 188 | `Resource Policy Contributor` | _Users with rights to create/modify resource policy, create support ticket and read resources/hierarchy._ | `36243c78-bf99-498c-9df9-86d9f8d28608` |
| 189 | `Redis Cache Contributor` | _Lets you manage Redis caches, but not access to them._ | `e0f68234-74aa-48ed-b826-c38b57376e17` |
| 190 | `Owner` | _Grants full access to manage all resources, including the ability to assign roles in Azure RBAC._ | `8e3af657-a8ff-443c-a75c-2fe8c4bcb635` |
| 191 | `Reader` | _View all resources, but does not allow you to make any changes._ | `acdd72a7-3385-48ef-bd42-f606fba81ae7` |
| 192 | `Logic App Contributor` | _Lets you manage logic app, but not access to them._ | `87a39d53-fc1b-424a-814c-f7e04687dc9e` |
| 193 | `Managed Application Operator Role` | _Lets you read and perform actions on Managed Application resources_ | `c7393b34-138c-406f-901b-d8cf2b17e6ae` |
| 194 | `Logic App Operator` | _Lets you read, enable and disable logic app._ | `515c2055-d9d4-4321-b1b9-bd0c9a0f79fe` |
| 195 | `Log Analytics Reader` | _Log Analytics Reader can view and search all monitoring data as well as and view monitoring settings, including viewing the configuration of Azure diagnostics on all Azure resources._ | `73c42c96-874c-492b-b04d-ab87d138a893` |
| 196 | `Log Analytics Contributor` | _Log Analytics Contributor can read all monitoring data and edit monitoring settings. Editing monitoring settings includes adding the VM extension to VMs; reading storage account keys to be able to configure collection of logs from Azure Storage; adding solutions; and configuring Azure diagnostics on all Azure resources._ | `92aaf0da-9dab-42b6-94a3-d43ce8d16293` |
| 197 | `Management Group Contributor` | _Management Group Contributor Role_ | `5d58bcaf-24a5-4b20-bdb6-eed9f69fbe4c` |
| 198 | `Management Group Reader` | _Management Group Reader Role_ | `ac63b705-f282-497d-ac71-919bf39d939d` |
| 199 | `Managed Identity Contributor` | _Create, Read, Update, and Delete User Assigned Identity_ | `e40ec5ca-96e0-45a2-b4ff-59039f2c2b59` |
| 200 | `Managed Applications Reader` | _Lets you read resources in a managed app and request JIT access._ | `b9331d33-8a36-4f8c-b097-4f54124fdb44` |
| 201 | `Managed Identity Operator` | _Read and Assign User Assigned Identity_ | `f1a07417-d97a-45cb-824c-7a7467783830` |
| 202 | `Automation Runbook Operator` | _Read Runbook properties - to be able to create Jobs of the runbook._ | `5fb5aef8-1081-4b8e-bb16-9d5d0385bab5` |
| 203 | `Automation Operator` | _Automation Operators are able to start, stop, suspend, and resume jobs_ | `d3881f73-407a-4167-8283-e981cbba0404` |
| 204 | `Automation Job Operator` | _Create and Manage Jobs using Automation Runbooks._ | `4fe576fe-1146-4730-92eb-48519fa6bf9f` |
| 205 | `Application Insights Snapshot Debugger` | _Gives user permission to use Application Insights Snapshot Debugger features_ | `08954f03-6346-4c2e-81c0-ec3a5cfae23b` |
| 222 | `Classic Storage Account Key Operator Service Role` | _Classic Storage Account Key Operators are allowed to list and regenerate keys on Classic Storage Accounts_ | `985d6b00-f706-48f5-a6fe-d0ca12fb668d` |
| 223 | `ClearDB MySQL DB Contributor` | _Lets you manage ClearDB MySQL databases, but not access to them._ | `9106cda0-8a86-4e81-b686-29a22c54effe` |
| 224 | `Classic Storage Account Contributor` | _Lets you manage classic storage accounts, but not access to them._ | `86e8f5dc-a6e9-4c67-9d15-de283e8eac25` |
| 225 | `CDN Profile Reader` | _Can view CDN profiles and their endpoints, but can't make changes._ | `8f96442b-4075-438f-813d-ad51ab4019af` |
| 226 | `Classic Network Contributor` | _Lets you manage classic networks, but not access to them._ | `b34d265f-36f7-4a0d-a4d4-e158ca92e90f` |
| 227 | `Cognitive Services Contributor` | _Lets you create, read, update, delete and manage keys of Cognitive Services._ | `25fbc0a9-bd7c-42a3-aa1a-3b75d497ee68` |
| 228 | `CosmosBackupOperator` | _Can submit restore request for a Cosmos DB database or a container for an account_ | `db7b14f2-5adf-42da-9f96-f2ee17bab5cb` |
| 229 | `Cognitive Services Data Reader (Preview)` | _Lets you read Cognitive Services data._ | `b59867f0-fa02-499b-be73-45a86b5b3e1c` |
| 230 | `Classic Virtual Machine Contributor` | _Lets you manage classic virtual machines, but not access to them, and not the virtual network or storage account they're connected to._ | `d73bb868-a0df-4d4d-bd69-98a00b01fccb` |
| 231 | `Cognitive Services User` | _Lets you read and list keys of Cognitive Services._ | `a97b65f3-24c7-4388-baec-2e87135dc908` |
| 232 | `Backup Operator` | _Lets you manage backup services, except removal of backup, vault creation and giving access to others_ | `00c29273-979b-4161-815c-10b084fb9324` |
| 233 | `Backup Reader` | _Can view backup services, but can't make changes_ | `a795c7a0-d4a2-40c1-ae25-d81f01202912` |
| 236 | `Backup Contributor` | _Lets you manage backup service,but can't create vaults and give access to others_ | `5e467623-bb1f-42f4-a55d-6e525e11384b` |
| 237 | `CDN Endpoint Reader` | _Can view CDN endpoints, but can't make changes._ | `871e35f6-b5c1-49cc-a043-bde969a0f2cd` |
| 238 | `CDN Profile Contributor` | _Can manage CDN profiles and their endpoints, but can't grant access to other users._ | `ec156ff8-a8d1-4d15-830c-5b80698ca432` |
| 239 | `CDN Endpoint Contributor` | _Can manage CDN endpoints, but can't grant access to other users._ | `426e0c7f-0c7e-4658-b36f-ff54d6c29b45` |
| 240 | `Blockchain Member Node Access (Preview)` | _Allows for access to Blockchain Member nodes_ | `31a002a1-acaf-453e-8a5b-297c9ca1ea24` |
| 241 | `BizTalk Contributor` | _Lets you manage BizTalk services, but not access to them._ | `5e3c6656-6cfa-4708-81fe-0de47ac73342` |
| 245 | `Blueprint Operator` | _Can assign existing published blueprints, but cannot create new blueprints. NOTE: this only works if the assignment is done with a user-assigned managed identity._ | `437d2ced-4a38-4302-8479-ed2bcb43d090` |
| 251 | `Policy Insights Data Writer (Preview)` | _Allows read access to resource policies and write access to resource component policy events._ | `66bb4e9e-b016-4a94-8249-4c0511c2be84` |
| 252 | `Storage File Data SMB Share Reader` | _Allows for read access to Azure File Share over SMB_ | `aba4ae5f-2193-4029-9191-0cb91df5e314` |
| 253 | `Storage File Data SMB Share Contributor` | _Allows for read, write, and delete access in Azure Storage file shares over SMB_ | `0c867c2a-1d8c-454a-a3db-ab2ea1bdc8bb` |
| 254 | `Azure Service Bus Data Sender` | _Allows for send access to Azure Service Bus resources._ | `69a216fc-b8fb-44d8-bc22-1f3c2cd27a39` |
| 255 | `Azure Event Hubs Data Sender` | _Allows send access to Azure Event Hubs resources._ | `2b629674-e913-4c01-ae53-ef4638d8f975` |
| 256 | `Azure Service Bus Data Receiver` | _Allows for receive access to Azure Service Bus resources._ | `4f6d3b9b-027b-4f4c-9142-0e5a2a2247e0` |
| 257 | `Storage File Data SMB Share Elevated Contributor` | _Allows for read, write, delete and modify NTFS permission access in Azure Storage file shares over SMB_ | `a7264617-510b-434b-a828-9731dc254ea7` |
| 258 | `Blueprint Contributor` | _Can manage blueprint definitions, but not assign them._ | `41077137-e803-4205-871c-5a86e6a753b4` |
| 259 | `Desktop Virtualization User` | _Allows user to use the applications in an application group._ | `1d18fff3-a72a-46b5-b4a9-0b38a3cd7e63` |
| 260 | `Private DNS Zone Contributor` | _Lets you manage private DNS zone resources, but not the virtual networks they are linked to._ | `b12aa53e-6015-4669-85d0-8515ebb3ae7f` |
| 261 | `Storage Blob Delegator` | _Allows for generation of a user delegation key which can be used to sign SAS tokens_ | `db58b8e5-c6ad-4a2a-8342-4190687cbf4a` |
| 262 | `Tag Contributor` | _Lets you manage tags on entities, without providing access to the entities themselves._ | `4a9ae827-6dc8-4573-8ac7-8239d42aa03f` |
| 263 | `Integration Service Environment Developer` | _Allows developers to create and update workflows, integration accounts and API connections in integration service environments._ | `c7aa55d3-1abb-444a-a5ca-5e51e485d6ec` |
| 264 | `Security Assessment Contributor` | _Lets you push assessments to Security Center_ | `612c2aa1-cb24-443b-ac28-3ab7272de6f5` |
| 265 | `Remote Rendering Client` | _Provides user with manage session, rendering and diagnostics capabilities for Azure Remote Rendering._ | `d39065c4-c120-43c9-ab0a-63eed9795f0a` |
| 267 | `Azure Digital Twins Data Owner` | _Full access role for Digital Twins data-plane_ | `bcd981a7-7f74-457b-83e1-cceb9e632ffe` |
| 268 | `Hierarchy Settings Administrator` | _Allows users to edit and delete Hierarchy Settings_ | `350f8d15-c687-4448-8ae1-157740a3936d` |
| 269 | `Azure Digital Twins Data Reader` | _Read-only role for Digital Twins data-plane properties_ | `d57506d4-4c8d-48b1-8587-93c323f6a5a3` |
| 270 | `Integration Service Environment Contributor` | _Lets you manage integration service environments, but not access to them._ | `a41e2c5b-bd99-4a07-88f4-9bf657a760b8` |
| 271 | `Azure Kubernetes Service Contributor Role` | _Grants access to read and write Azure Kubernetes Service clusters_ | `ed7f3fbd-7b88-4dd4-9017-9adb7ce333f8` |
| 272 | `App Configuration Data Reader` | _Allows read access to App Configuration data._ | `516239f1-63e1-4d78-a4de-a74fb236a071` |
| 273 | `Kubernetes Cluster - Azure Arc Onboarding` | _Role definition to authorize any user/service to create connectedClusters resource_ | `34e09817-6cbe-4d01-b1a2-e0eac5743d41` |
| 274 | `App Configuration Data Owner` | _Allows full access to App Configuration data._ | `5ae67dd6-50cb-40e7-96ff-dc2bfa4b606b` |
| 278 | `Remote Rendering Administrator` | _Provides user with conversion, manage session, rendering and diagnostics capabilities for Azure Remote Rendering_ | `3df8b902-2a6f-47c7-8cc5-360e9b272a7e` |
| 279 | `Cognitive Services QnA Maker Editor` | _Let's you create, edit, import and export a KB. You cannot publish or delete a KB._ | `f4cc2bf9-21be-47a1-bdf1-5c5804381025` |
| 281 | `Cognitive Services QnA Maker Reader` | _Let's you read and test a KB only._ | `466ccd10-b268-4a11-b098-b4849f024126` |
| 282 | `SQL Security Manager` | _Lets you manage the security-related policies of SQL servers and databases, but not access to them._ | `056cd41c-7e88-42e1-933e-88ba6a50c9c3` |
| 283 | `Storage Account Contributor` | _Lets you manage storage accounts, including accessing storage account keys which provide full access to storage account data._ | `17d1049b-9a84-46fb-8f53-869881c3d3ab` |
| 284 | `SQL DB Contributor` | _Lets you manage SQL databases, but not access to them. Also, you can't manage their security-related policies or their parent SQL servers._ | `9b7fa17d-e63e-47b0-bb0a-15c516ac86ec` |
| 285 | `Spatial Anchors Account Owner` | _Lets you manage spatial anchors in your account, including deleting them_ | `70bbe301-9835-447d-afdd-19eb3167307c` |
| 286 | `SQL Managed Instance Contributor` | _Lets you manage SQL Managed Instances and required network configuration, but can't give access to others._ | `4939a1f6-9ae0-4e48-a1e0-f2cbe897382d` |
| 287 | `Storage Blob Data Owner` | _Allows for full access to Azure Storage blob containers and data, including assigning POSIX access control._ | `b7e6dc6d-f1e8-4753-8033-0f276bb0955b` |
| 288 | `Storage Blob Data Reader` | _Allows for read access to Azure Storage blob containers and data_ | `2a2b9908-6ea1-4ae2-8e65-a410df84e7d1` |
| 289 | `Storage Blob Data Contributor` | _Allows for read, write and delete access to Azure Storage blob containers and data_ | `ba92f5b4-2d11-453d-a403-e96b0029c9fe` |
| 290 | `SQL Server Contributor` | _Lets you manage SQL servers and databases, but not access to them, and not their security -related policies._ | `6d8ee4ec-f05a-4a1d-8b00-a9b17e38b437` |
| 291 | `Storage Account Key Operator Service Role` | _Storage Account Key Operators are allowed to list and regenerate keys on Storage Accounts_ | `81a9662b-bebf-436f-a333-f67b29880f12` |
| 292 | `Security Manager (Legacy)` | _This is a legacy role. Please use Security Administrator instead_ | `e3d13bf0-dd5a-482e-ba6b-9b8433878d10` |
| 295 | `Scheduler Job Collections Contributor` | _Lets you manage Scheduler job collections, but not access to them._ | `188a0f2f-5c9e-469b-ae67-2aa5ce574b94` |
| 296 | `Search Service Contributor` | _Lets you manage Search services, but not access to them._ | `7ca78c08-252a-4471-8644-bb5ff32d4ba0` |
| 297 | `Spatial Anchors Account Reader` | _Lets you locate and read properties of spatial anchors in your account_ | `5d51204f-eb77-4b1c-b86a-2ec626c49413` |
| 298 | `Site Recovery Reader` | _Lets you view Site Recovery status but not perform other management operations_ | `dbaa88c4-0c30-4179-9fb3-46319faa6149` |
| 299 | `Site Recovery Operator` | _Lets you failover and failback but not perform other Site Recovery management operations_ | `494ae006-db33-4328-bf46-533a6560a3ca` |
| 300 | `Spatial Anchors Account Contributor` | _Lets you manage spatial anchors in your account, but not delete them_ | `8bbe83f1-e2a6-4df7-8cb4-4e04d4e5c827` |
| 301 | `Site Recovery Contributor` | _Lets you manage Site Recovery service except vault creation and role assignment_ | `6670b86e-a3f7-4917-ac9b-5d6ab1be4567` |
| 302 | `Azure Event Hubs Data Owner` | _Allows for full access to Azure Event Hubs resources._ | `f526a384-b230-433a-b45c-95f59c4a2dec` |
| 303 | `Attestation Contributor` | _Can read write or delete the attestation provider instance_ | `bbf86eb8-f7b4-4cce-96e4-18cddf81d86e` |
| 304 | `Azure Service Bus Data Owner` | _Allows for full access to Azure Service Bus resources._ | `090c5cfd-751d-490a-894a-3ce6f1109419` |
| 305 | `Web Plan Contributor` | _Lets you manage the web plans for websites, but not access to them._ | `2cc479cb-7b4d-49a8-b449-8c00fd0f0a4b` |
| 306 | `Website Contributor` | _Lets you manage websites (not web plans), but not access to them._ | `de139f84-1756-47ae-9be6-808fbbe84772` |
| 307 | `Hybrid Server Onboarding` | _Can onboard new Hybrid servers to the Hybrid Resource Provider._ | `5d1e5ee4-7c68-4a71-ac8b-0739630a3dfb` |
| 308 | `Azure Event Hubs Data Receiver` | _Allows receive access to Azure Event Hubs resources._ | `a638d3c7-ab3a-418d-83e6-5f17a39d4fde` |
| 309 | `Hybrid Server Resource Administrator` | _Can read, write, delete, and re-onboard Hybrid servers to the Hybrid Resource Provider._ | `48b40c6e-82e0-4eb3-90d5-19e40f49b624` |
| 310 | `HDInsight Cluster Operator` | _Lets you read and modify HDInsight cluster configurations._ | `61ed4efc-fab3-44fd-b111-e24485cc132a` |
| 311 | `Cosmos DB Operator` | _Lets you manage Azure Cosmos DB accounts, but not access data in them. Prevents access to account keys and connection strings._ | `230815da-be43-4aae-9cb4-875f7bd000aa` |
| 312 | `Storage Queue Data Reader` | _Allows for read access to Azure Storage queues and queue messages_ | `19e7f393-937e-4f77-808e-94535e297925` |
| 313 | `Support Request Contributor` | _Lets you create and manage Support requests_ | `cfd33db0-3dd1-45e3-aa9d-cdbdf3b6f24e` |
| 314 | `Storage Queue Data Message Sender` | _Allows for sending of Azure Storage queue messages_ | `c6a89b2d-59bc-44d0-9896-0f6e12d7b80a` |
| 315 | `Storage Queue Data Contributor` | _Allows for read, write, and delete access to Azure Storage queues and queue messages_ | `974c5e8b-45b9-4653-ba55-5f855dd0fb88` |
| 316 | `Storage Queue Data Message Processor` | _Allows for peek, receive, and delete access to Azure Storage queue messages_ | `8a0f0c08-91a1-4084-bc3d-661d67233fed` |
| 317 | `Virtual Machine User Login` | _View Virtual Machines in the portal and login as a regular user._ | `fb879df8-f326-4884-b1cf-06f3ad86be52` |
| 318 | `Virtual Machine Contributor` | _Lets you manage virtual machines, but not access to them, and not the virtual network or storage account they're connected to._ | `9980e02c-c2be-4d73-94e8-173b1dc7cf3c` |
| 319 | `User Access Administrator` | _Lets you manage user access to Azure resources._ | `18d7d88d-d35e-4fb5-a5c3-7773c20a72d9` |
| 320 | `Traffic Manager Contributor` | _Lets you manage Traffic Manager profiles, but does not let you control who has access to them._ | `a4b10055-b0c7-44c2-b00f-c7b5b3550cf7` |
| 321 | `Virtual Machine Administrator Login` | _View Virtual Machines in the portal and login as administrator_ | `1c0163c0-47e6-4577-8991-ea5c82e286e4` |
| 1 | `Application Administrator` | _Can create and manage all aspects of app registrations and enterprise apps._ | `9b895d92-2cd3-44c7-9d02-a6ac2d5ea5c3` |
| 2 | `Application Developer` | _Can create application registrations independent of the 'Users can register applications' setting._ | `cf1c38e5-3621-4004-a7cb-879624dced7c` |
| 3 | `Attack Payload Author` | _Can create attack payloads that an administrator can initiate later._ | `9c6df0f2-1e7c-4dc3-b195-66dfbd24aa8f` |
| 4 | `Attack Simulation Administrator` | _Can create and manage all aspects of attack simulation campaigns._ | `c430b396-e693-46cc-96f3-db01bf8bb62a` |
| 5 | `Attribute Assignment Administrator` | _Assign custom security attribute keys and values to supported Azure AD objects._ | `58a13ea3-c632-46ae-9ee0-9c0d43cd7f3d` |
| 6 | `Attribute Assignment Reader` | _Read custom security attribute keys and values for supported Azure AD objects._ | `ffd52fa5-98dc-465c-991d-fc073eb59f8f` |
| 7 | `Attribute Definition Administrator` | _Define and manage the definition of custom security attributes._ | `8424c6f0-a189-499e-bbd0-26c1753c96d4` |
| 8 | `Attribute Definition Reader` | _Read the definition of custom security attributes._ | `1d336d2c-4ae8-42ef-9711-b3604ce3fc2c` |
| 9 | `Authentication Administrator` | _Allowed to view, set and reset authentication method information for any non-admin user._ | `c4e39bd9-1100-46d3-8c65-fb160da0071f` |
| 10 | `Authentication Policy Administrator` | _Can create and manage the authentication methods policy, tenant-wide MFA settings, password protection policy, and verifiable credentials._ | `0526716b-113d-4c15-b2c8-68e3c22b9f80` |
| 11 | `Azure AD Joined Device Local Administrator` | _Users assigned to this role are added to the local administrators group on Azure AD-joined devices._ | `9f06204d-73c1-4d4c-880a-6edb90606fd8` |
| 13 | `Azure Information Protection Administrator` | _Can manage all aspects of the Azure Information Protection product._ | `7495fdc4-34c4-4d15-a289-98788ce399fd` |
| 14 | `B2C IEF Keyset Administrator` | _Can manage secrets for federation and encryption in the Identity Experience Framework (IEF)._ | `aaf43236-0c0d-4d5f-883a-6955382ac081` |
| 15 | `B2C IEF Policy Administrator` | _Can create and manage trust framework policies in the Identity Experience Framework (IEF)._ | `3edaf663-341e-4475-9f94-5c398ef6c070` |
| 16 | `Billing Administrator` | _Can perform common billing related tasks like updating payment information._ | `b0f54661-2d74-4c50-afa3-1ec803f12efe` |
| 17 | `Cloud App Security Administrator` | _Can manage all aspects of the Cloud App Security product._ | `892c5842-a9a6-463a-8041-72aa08ca3cf6` |
| 18 | `Cloud Application Administrator` | _Can create and manage all aspects of app registrations and enterprise apps except App Proxy._ | `158c047a-c907-4556-b7ef-446551a6b5f7` |
| 19 | `Cloud Device Administrator` | _Full access to manage devices in Azure AD._ | `7698a772-787b-4ac8-901f-60d6b08affd2` |
| 20 | `Compliance Administrator` | _Can read and manage compliance configuration and reports in Azure AD and Microsoft 365._ | `17315797-102d-40b4-93e0-432062caca18` |
| 21 | `Compliance Data Administrator` | _Creates and manages compliance content._ | `e6d1a23a-da11-4be4-9570-befc86d067a7` |
| 28 | `Directory Readers` | _Can read basic directory information. Commonly used to grant directory read access to applications and guests._ | `88d8e3e3-8f55-4a1e-953a-9b9898b8876b` |
| 29 | `Directory Synchronization Accounts` | _Only used by Azure AD Connect service._ | `d29b2b05-8046-44ba-8758-1e26182fcf32` |
| 30 | `Directory Writers` | _Can read and write basic directory information. For granting access to applications, not intended for users._ | `9360feb5-f418-4baa-8175-e2a00bac4301` |
| 31 | `Domain Name Administrator` | _Can manage domain names in cloud and on-premises._ | `8329153b-31d0-4727-b945-745eb3bc5f31` |
| 32 | `Dynamics 365 Administrator` | _Can manage all aspects of the Dynamics 365 product._ | `44367163-eba1-44c3-98af-f5787879f96a` |
| 33 | `Edge Administrator` | _Manage all aspects of Microsoft Edge._ | `3f1acade-1e04-4fbc-9b69-f0302cd84aef` |
| 34 | `Exchange Administrator` | _Can manage all aspects of the Exchange product._ | `29232cdf-9323-42fd-ade2-1d097af3e4de` |
| 35 | `Exchange Recipient Administrator` | _Can create or update Exchange Online recipients within the Exchange Online organization._ | `31392ffb-586c-42d1-9346-e59415a2cc4e` |
| 36 | `External ID User Flow Administrator` | _Can create and manage all aspects of user flows._ | `6e591065-9bad-43ed-90f3-e9424366d2f0` |
| 37 | `External ID User Flow Attribute Administrator` | _Can create and manage the attribute schema available to all user flows._ | `0f971eea-41eb-4569-a71e-57bb8a3eff1e` |
| 38 | `External Identity Provider Administrator` | _Can configure identity providers for use in direct federation._ | `be2f45a1-457d-42af-a067-6ec1fa63bc45` |
| 39 | `Global Administrator` | _Can manage all aspects of Azure AD and Microsoft services that use Azure AD identities._ | `62e90394-69f5-4237-9190-012177145e10` |
| 40 | `Global Reader` | _Can read everything that a Global Administrator can, but not update anything._ | `f2ef992c-3afb-46b9-b7cf-a126ee74c451` |
| 41 | `Groups Administrator` | _Members of this role can create/manage groups, create/manage groups settings like naming and expiration policies, and view groups activity and audit reports._ | `fdd7a751-b60b-444a-984c-02652fe8fa1c` |
| 42 | `Guest Inviter` | _Can invite guest users independent of the 'members can invite guests' setting._ | `95e79109-95c0-4d8e-aee3-d01accf2d47b` |
| 43 | `Guest User` | _Default role for guest users. Can read a limited set of directory information._ | `10dae51f-b6af-4016-8d66-8c2a99b929b3` |
| 44 | `Helpdesk Administrator` | _Can reset passwords for non-administrators and Helpdesk Administrators._ | `729827e3-9c14-49f7-bb1b-9608f156bbb8` |
| 45 | `Hybrid Identity Administrator` | _Can manage AD to Azure AD cloud provisioning, Azure AD Connect, and federation settings._ | `8ac3fc64-6eca-42ea-9e69-59f4c7b60eb2` |
| 46 | `Identity Governance Administrator` | _Manage access using Azure AD for identity governance scenarios._ | `45d8d3c5-c802-45c6-b32a-1d70b5e1e86e` |
| 47 | `Insights Administrator` | _Has administrative access in the Microsoft 365 Insights app._ | `eb1f4a8d-243a-41f0-9fbd-c7cdf6c5ef7c` |
| 48 | `Insights Business Leader` | _Can view and share dashboards and insights via the M365 Insights app._ | `31e939ad-9672-4796-9c2e-873181342d2d` |
| 49 | `Intune Administrator` | _Can manage all aspects of the Intune product._ | `3a2c62db-5318-420d-8d74-23affee5d9d5` |
| 50 | `Kaizala Administrator` | _Can manage settings for Microsoft Kaizala._ | `74ef975b-6605-40af-a5d2-b9539d836353` |
| 51 | `Knowledge Administrator` | _Can configure knowledge, learning, and other intelligent features._ | `b5a8dcf3-09d5-43a9-a639-8e29ef291470` |
| 52 | `Knowledge Manager` | _Has access to topic management dashboard and can manage content._ | `744ec460-397e-42ad-a462-8b3f9747a02c` |
| 53 | `License Administrator` | _Can manage product licenses on users and groups._ | `4d6ac14f-3453-41d0-bef9-a3e0c569773a` |
| 54 | `Message Center Privacy Reader` | _Can read security messages and updates in Office 365 Message Center only._ | `ac16e43d-7b2d-40e0-ac05-243ff356ab5b` |
| 55 | `Message Center Reader` | _Can read messages and updates for their organization in Office 365 Message Center only._ | `790c1fb9-7f7d-4f88-86a1-ef1f95c05c1b` |
| 56 | `Network Administrator` | _Can manage network locations and review enterprise network design insights for Microsoft 365 Software as a Service applications._ | `d37c8bed-0711-4417-ba38-b4abe66ce4c2` |
| 57 | `Office Apps Administrator` | _Can manage Office apps cloud services, including policy and settings management, and manage the ability to select, unselect and publish 'what's new' feature content to end-user's devices._ | `2b745bdf-0803-4d80-aa65-822c4493daac` |
| 58 | `Partner Tier1 Support` | _Do not use - not intended for general use._ | `4ba39ca4-527c-499a-b93d-d9b492c50246` |
| 59 | `Partner Tier2 Support` | _Do not use - not intended for general use._ | `e00e864a-17c5-4a4b-9c06-f5b95a8d5bd8` |
| 60 | `Password Administrator` | _Can reset passwords for non-administrators and Password Administrators._ | `966707d0-3269-4727-9be2-8c3a10f19b9d` |
| 61 | `Power BI Administrator` | _Can manage all aspects of the Power BI product._ | `a9ea8996-122f-4c74-9520-8edcd192826c` |
| 62 | `Power Platform Administrator` | _Can create and manage all aspects of Microsoft Dynamics 365, PowerApps and Microsoft Flow._ | `11648597-926c-4cf3-9c36-bcebb0ba8dcc` |
| 63 | `Printer Administrator` | _Can manage all aspects of printers and printer connectors._ | `644ef478-e28f-4e28-b9dc-3fdde9aa0b1f` |
| 64 | `Printer Technician` | _Can manage all aspects of printers and printer connectors._ | `e8cef6f1-e4bd-4ea8-bc07-4b8d950f4477` |
| 65 | `Privileged Authentication Administrator` | _Allowed to view, set and reset authentication method information for any user (admin or non-admin)._ | `7be44c8a-adaf-4e2a-84d6-ab2649e08a13` |
| 66 | `Privileged Role Administrator` | _Can manage role assignments in Azure AD, and all aspects of Privileged Identity Management._ | `e8611ab8-c189-46e8-94e1-60213ab1f814` |
| 68 | `Restricted Guest User` | _Default role for guest users with restricted access. Can read a limited set of directory information._ | `2af84b1e-32c8-42b7-82bc-daa82404023b` |
| 69 | `Search Administrator` | _Can create and manage all aspects of Microsoft Search settings._ | `0964bb5e-9bdb-4d7b-ac29-58e794862a40` |
| 70 | `Search Editor` | _Can create and manage the editorial content such as bookmarks, Q and As, locations, floorplan._ | `8835291a-918c-4fd7-a9ce-faa49f0cf7d9` |
| 71 | `Security Administrator` | _Security Administrator allows ability to read and manage security configuration and reports._ | `194ae4cb-b126-40b2-bd5b-6091b380977d` |
| 73 | `Security Reader` | _Can read security information and reports in Azure AD and Office 365._ | `5d6b6bb7-de71-4623-b4af-96380a352509` |
| 74 | `Service Support Administrator` | _Can read service health information and manage support tickets._ | `f023fd81-a637-4b56-95fd-791ac0226033` |
| 75 | `SharePoint Administrator` | _Can manage all aspects of the SharePoint service._ | `f28a1f50-f6e7-4571-818b-6a12f2af6b6c` |
| 76 | `Skype for Business Administrator` | _Can manage all aspects of the Skype for Business product._ | `75941009-915a-4869-abe7-691bff18279e` |
| 77 | `Teams Administrator` | _Can manage the Microsoft Teams service._ | `69091246-20e8-4a56-aa4d-066075b2a7a8` |
| 78 | `Teams Communications Administrator` | _Can manage calling and meetings features within the Microsoft Teams service._ | `baf37b3a-610e-45da-9e62-d9d1e5e8914b` |
| 79 | `Teams Communications Support Engineer` | _Can troubleshoot communications issues within Teams using advanced tools._ | `f70938a0-fc10-4177-9e90-2178f8765737` |
| 80 | `Teams Communications Support Specialist` | _Can troubleshoot communications issues within Teams using basic tools._ | `fcf91098-03e3-41a9-b5ba-6f0ec8188a12` |
| 81 | `Teams Devices Administrator` | _Can perform management related tasks on Teams certified devices._ | `3d762c5a-1b6c-493f-843e-55a3b42923d4` |
| 82 | `Usage Summary Reports Reader` | _Can see only tenant level aggregates in Microsoft 365 Usage Analytics and Productivity Score._ | `75934031-6c7e-415a-99d7-48dbd49e875e` |
| 83 | `User` | _Default role for member users. Can read all and write a limited set of directory information._ | `a0b1b346-4d3e-4e8b-98f8-753987be4970` |
| 84 | `User Administrator` | _Can manage all aspects of users and groups, including resetting passwords for limited admins._ | `fe930be7-5e62-47db-91af-98c3a49a38b1` |
| 85 | `Windows 365 Administrator` | _Can provision and manage all aspects of Cloud PCs._ | `11451d60-acb2-45eb-a7d6-43d0f0125c13` |
| 86 | `Windows Update Deployment Administrator` | _Can create and manage all aspects of Windows Update deployments through the Windows Update for Business deployment service._ | `32696413-001a-46ae-978c-ce0f6b3620d2` |