azure-policy icon indicating copy to clipboard operation
azure-policy copied to clipboard

Alias request for 'principalType' field in Microsoft.Authorization role schedule resources

Open NVella124 opened this issue 10 months ago • 0 comments

Resource Provider: Microsoft.Authorization

Resource Type:

  • roleAssignmentScheduleRequests
  • roleAssignmentScheduleInstances
  • roleEligibilityScheduleRequests

Field(s) requested:

  • Microsoft.Authorization/roleAssignmentScheduleRequests/principalType
  • Microsoft.Authorization/roleAssignmentScheduleInstances/principalType
  • Microsoft.Authorization/roleEligibilityScheduleRequests/principalType

Reason: We want to enforce role assignments only to groups, not to users, across all RBAC paths — including scheduled and eligible role assignments. Currently, principalType is only available on Microsoft.Authorization/roleAssignments, but not on these other related resource types.

This alias is critical for preventing direct role assignments to users through PIM or scheduled assignments.

Scenarios:

  • Deny policy to block role assignments where principalType == "User"
  • Allow only principalType == "Group" or ManagedIdentity or ServicePrincipal

Example:

{
  "field": "Microsoft.Authorization/roleAssignmentScheduleRequests/principalType",
  "equals": "User"
}

NVella124 avatar Jun 19 '25 12:06 NVella124