Bug Description
The CLI currently cannot elevate to Azure Directory Roles (also known as Entra ID roles). When attempting to elevate to a directory role such as 'Global Reader' or 'Security Reader', the elevation fails or the role is not listed in the eligibility response.
This is a significant limitation as many Azure administrative tasks require directory-level permissions that are separate from Azure RBAC (Resource-based Access Control) roles.
Expected Behavior:
Users should be able to discover and elevate to Azure Directory Roles through the CLI, just as they can with subscription-level RBAC roles.
Actual Behavior:
Azure Directory Roles are either not returned in the eligibility list, or elevation requests to directory roles fail.
Command
grant azure
# or
grant azure --role "Global Reader"
Error Output
# Directory roles are not shown in the interactive list
# or
# Error when attempting to elevate to a directory role
Grant Version
Current version (all versions affected)
Operating System
All platforms (Linux, macOS, Windows)
Verbose Output (Recommended)
N/A - This is a feature limitation rather than a runtime error.
Checklist
Technical Context:
Azure has two separate permission models:
- Azure RBAC (Resource-based Access Control) - for managing Azure resources (subscriptions, resource groups, VMs, etc.)
- Azure Directory Roles (Entra ID roles) - for managing the Azure AD/Entra ID tenant itself
The SCA Access API may need to differentiate between these two role types, or there may be a separate API endpoint for directory role elevation.
Suggested Solution:
This should be documented in the README under a 'Known Limitations' or 'Supported Role Types' section until the feature is implemented.
Bug Description
The CLI currently cannot elevate to Azure Directory Roles (also known as Entra ID roles). When attempting to elevate to a directory role such as 'Global Reader' or 'Security Reader', the elevation fails or the role is not listed in the eligibility response.
This is a significant limitation as many Azure administrative tasks require directory-level permissions that are separate from Azure RBAC (Resource-based Access Control) roles.
Expected Behavior:
Users should be able to discover and elevate to Azure Directory Roles through the CLI, just as they can with subscription-level RBAC roles.
Actual Behavior:
Azure Directory Roles are either not returned in the eligibility list, or elevation requests to directory roles fail.
Command
Error Output
Grant Version
Current version (all versions affected)
Operating System
All platforms (Linux, macOS, Windows)
Verbose Output (Recommended)
N/A - This is a feature limitation rather than a runtime error.
Checklist
Technical Context:
Azure has two separate permission models:
The SCA Access API may need to differentiate between these two role types, or there may be a separate API endpoint for directory role elevation.
Suggested Solution:
This should be documented in the README under a 'Known Limitations' or 'Supported Role Types' section until the feature is implemented.