🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-104 Domain 1
Domain 1 — Module 3 of 6 50%
3 of 27 overall

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery
Domain 1: Manage Azure Identities and Governance Free ⏱ ~13 min read

RBAC: Who Can Do What in Azure

Role-Based Access Control is how you grant — and limit — access to Azure resources. Learn built-in roles, scope hierarchy, and how to read access assignments like a pro.

What is Azure RBAC?

☕ Simple explanation

RBAC is like giving hotel key cards that only open specific doors.

In an on-prem world, you might give someone “Domain Admin” and they can do everything. That’s like giving them a master key. In Azure, RBAC lets you be precise: “You can manage virtual machines in the Production resource group, but you can’t touch the networking or delete anything in Staging.”

Every RBAC assignment has three parts: Who (the user/group), What (the role — what actions they can perform), and Where (the scope — which resources the role applies to).

Azure Role-Based Access Control (Azure RBAC) is the authorisation system built on Azure Resource Manager. It provides fine-grained access management using role assignments that combine a security principal, a role definition, and a scope.

A role assignment consists of: (1) a security principal — user, group, service principal, or managed identity; (2) a role definition — a collection of permitted actions (Actions) and excluded actions (NotActions); (3) a scope — the resource hierarchy level where the role applies (management group, subscription, resource group, or individual resource).

RBAC follows an additive model — permissions are cumulative. If a user has Reader at the subscription level and Contributor on a specific resource group, they get both. Deny assignments exist but are system-managed (e.g., Azure Blueprints), not user-configurable.

The scope hierarchy

Permissions in Azure flow downward. A role assigned at a higher scope is inherited by everything below it.

Management Group
  └── Subscription
        └── Resource Group
              └── Resource
  • Assign Owner at a subscription → that user owns every resource group and resource in it
  • Assign Reader at a resource group → that user can read all resources in that group but not other groups
  • Assign Contributor at a specific VM → only that VM
💡 Exam tip: Inheritance is automatic and you can't block it

Unlike on-prem NTFS permissions where you can “break inheritance,” Azure RBAC inheritance cannot be blocked. If someone has Owner at the subscription level, you cannot prevent them from managing a resource group within that subscription.

The only way to restrict access is to not grant roles at higher scopes. Follow least privilege — assign at the lowest scope possible.

Built-in roles you must know

Azure has over 100 built-in roles, but the exam focuses on these:

RoleWhat It Can DoCommon Use
OwnerFull access + can delegate access to othersSubscription or RG owners
ContributorFull access EXCEPT managing role assignmentsDevelopers, DevOps
ReaderRead-only access to all resourcesAuditors, stakeholders
User Access AdministratorManage role assignments (but not resources)Security team
Virtual Machine ContributorManage VMs (but not the VNet or storage they use)VM operators
Storage Blob Data ReaderRead blob data (not management plane)Data consumers
Storage Blob Data ContributorRead/write/delete blob dataApp service accounts
Network ContributorManage network resourcesNetwork team
The Big Three: Owner vs Contributor vs Reader
FeatureOwnerContributorReader
Create resourcesYesYesNo
Delete resourcesYesYesNo
Read resourcesYesYesYes
Assign roles to othersYesNoNo
Manage resource locksYesNo — read only, cannot create or deleteNo
💡 Exam tip: Contributor cannot assign roles

This is one of the most tested RBAC facts. Contributor can do everything EXCEPT manage access. If a question says “a user needs to deploy resources AND grant access to other team members,” the answer is Owner, not Contributor.

Also: User Access Administrator can assign roles but cannot manage resources. It’s the inverse of Contributor.

Azure RBAC vs Entra ID roles

This is a common confusion point — and a frequent exam trap.

These are two separate role systems — don't mix them up
FeatureAzure RBAC RolesEntra ID Roles
What they controlAzure resources (VMs, storage, networking)Entra ID directory (users, groups, apps)
Where assignedManagement group, subscription, RG, resourceEntra ID tenant level
Example rolesOwner, Contributor, ReaderGlobal Admin, User Admin, Application Admin
Managed inAzure portal → Access control (IAM)Entra admin center → Roles and administrators
Overlap?Global Admin CAN grant themselves Azure accessAzure roles do NOT grant Entra directory access
💡 Exam tip: The Global Administrator escape hatch

By default, Entra ID Global Administrators do NOT have Azure RBAC access. However, there’s a toggle in Entra ID (Properties → Access management for Azure resources) that lets a Global Admin elevate themselves to User Access Administrator at the root management group scope. This is tested on the exam.

At Meridian Financial, this toggle is monitored by the security team — if anyone enables it, an alert fires immediately.

Interpreting access assignments

The exam expects you to read an Access Control (IAM) blade and determine effective permissions.

How to check a user’s access:

  1. Go to the resource, resource group, or subscription
  2. Click Access control (IAM)
  3. Click Check access tab
  4. Search for the user/group
  5. Review all role assignments (including inherited ones)

What to look for:

  • Direct assignments — roles assigned at this specific scope
  • Inherited assignments — roles assigned at a parent scope (subscription, management group)
  • Deny assignments — system-managed only (e.g., Azure Blueprints)
  • Effective permissions — the union of all allowed actions minus any denies
Question

What are the three components of an Azure RBAC role assignment?

Click or press Enter to reveal answer

Answer

1. Security principal (who — user, group, service principal, or managed identity). 2. Role definition (what — the set of allowed/denied actions). 3. Scope (where — management group, subscription, resource group, or resource).

Click to flip back

Question

Can a Contributor role assign RBAC roles to other users?

Click or press Enter to reveal answer

Answer

No. The Contributor role can create and manage all types of Azure resources but CANNOT manage role assignments. To assign roles, you need Owner or User Access Administrator.

Click to flip back

Question

How does RBAC inheritance work in Azure?

Click or press Enter to reveal answer

Answer

Permissions flow downward through the scope hierarchy: Management Group to Subscription to Resource Group to Resource. A role assigned at a higher scope is automatically inherited by all child scopes. This inheritance cannot be blocked.

Click to flip back

Question

What is the difference between Azure RBAC roles and Entra ID roles?

Click or press Enter to reveal answer

Answer

Azure RBAC roles control access to Azure resources (VMs, storage, etc.) and are assigned at management group/subscription/RG/resource scopes. Entra ID roles control access to directory objects (users, groups, apps) and are assigned at the tenant level. They are two separate systems.

Click to flip back

Knowledge check

Knowledge Check

Alex needs to give a junior admin the ability to deploy VMs and storage accounts in the 'Dev' resource group, but NOT allow them to give access to anyone else. Which role should Alex assign?

Knowledge Check

Meridian Financial has the following setup: User 'Sarah' has Reader at the subscription level and Contributor on the 'Prod-DB' resource group. What can Sarah do with a VM in the Prod-DB resource group?

Knowledge Check

A security auditor asks: 'How can I verify all the RBAC assignments on the Production subscription, including inherited ones?' Where should they look?

🎬 Video coming soon

← Previous

Users, Groups & Licenses

Next →

Subscriptions, Resource Groups & Management Groups

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.