-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Bug Description
The CLI currently cannot elevate to Azure Directory Roles (also known as Entra ID roles). When attempting to elevate to a directory role such as 'Global Reader' or 'Security Reader', the elevation fails or the role is not listed in the eligibility response.
This is a significant limitation as many Azure administrative tasks require directory-level permissions that are separate from Azure RBAC (Resource-based Access Control) roles.
Expected Behavior:
Users should be able to discover and elevate to Azure Directory Roles through the CLI, just as they can with subscription-level RBAC roles.
Actual Behavior:
Azure Directory Roles are either not returned in the eligibility list, or elevation requests to directory roles fail.
Command
grant azure
# or
grant azure --role "Global Reader"Error Output
# Directory roles are not shown in the interactive list
# or
# Error when attempting to elevate to a directory roleGrant Version
Current version (all versions affected)
Operating System
All platforms (Linux, macOS, Windows)
Verbose Output (Recommended)
N/A - This is a feature limitation rather than a runtime error.
Checklist
- I have searched existing issues to ensure this is not a duplicate
- I have redacted any sensitive information (tokens, passwords, emails)
Technical Context:
Azure has two separate permission models:
- Azure RBAC (Resource-based Access Control) - for managing Azure resources (subscriptions, resource groups, VMs, etc.)
- Azure Directory Roles (Entra ID roles) - for managing the Azure AD/Entra ID tenant itself
The SCA Access API may need to differentiate between these two role types, or there may be a separate API endpoint for directory role elevation.
Suggested Solution:
This should be documented in the README under a 'Known Limitations' or 'Supported Role Types' section until the feature is implemented.