01 Run account list command (Windows/macOS/Linux) with custom output filters to list the IDs of the cloud subscriptions available in your Azure cloud account:
az account list
--query '[*].id'
02 The command output should return the requested subscription identifiers (IDs):
[
"abcdabcd-1234-abcd-1234-abcdabcdabcd",
"abcd1234-abcd-1234-abcd-abcd1234abcd"
]
03 Run role assignment list command (Windows/macOS/Linux) with the ID of the Azure subscriptions that you want to examine as the identifier parameter, to describe the role assignments for the User Access Administrator role available in the selected subscription:
az role assignment list
--role "User Access Administrator"
--scope "/subscriptions/abcdabcd-1234-abcd-1234-abcdabcdabcd"
04 The command output should return the role assignments for the User Access Administrator role:
[
{
"condition": null,
"conditionVersion": null,
"createdBy": "abcdabcd-1234-abcd-1234-abcdabcdabcd",
"createdOn": "2025-04-11T12:00:32.061981+00:00",
"delegatedManagedIdentityResourceId": null,
"description": null,
"id": "/subscriptions/abcdabcd-1234-abcd-1234-abcdabcdabcd/providers/Microsoft.Authorization/roleAssignments/abcd1234-abcd-1234-abcd-abcd1234abcd",
"name": "abcd1234-abcd-1234-abcd-abcd1234abcd",
"principalId": "abcd1234-abcd-1234-abcd-abcd1234abcd",
"principalName": "user1@domain.onmicrosoft.com",
"principalType": "User",
"roleDefinitionId": "/subscriptions/abcdabcd-1234-abcd-1234-abcdabcdabcd/providers/Microsoft.Authorization/roleDefinitions/abcd1234-abcd-1234-abcd-abcd1234abcd",
"roleDefinitionName": "User Access Administrator",
"scope": "/subscriptions/abcdabcd-1234-abcd-1234-abcdabcdabcd",
"type": "Microsoft.Authorization/roleAssignments",
"updatedBy": "abcd1234-abcd-1234-abcd-abcd1234abcd",
"updatedOn": "2025-04-11T12:00:32.061981+00:00"
},
{
"condition": null,
"conditionVersion": null,
"createdBy": "abcdabcd-1234-abcd-1234-abcdabcdabcd",
"createdOn": "2024-02-10T11:00:32.061981+00:00",
"delegatedManagedIdentityResourceId": null,
"description": null,
"id": "/subscriptions/abcdabcd-1234-abcd-1234-abcdabcdabcd/providers/Microsoft.Authorization/roleAssignments/abcd1234-abcd-1234-abcd-abcd1234abcd",
"name": "abcd1234-abcd-1234-abcd-abcd1234abcd",
"principalId": "abcd1234-abcd-1234-abcd-abcd1234abcd",
"principalName": "user2@domain.onmicrosoft.com",
"principalType": "User",
"roleDefinitionId": "/subscriptions/abcdabcd-1234-abcd-1234-abcdabcdabcd/providers/Microsoft.Authorization/roleDefinitions/abcd1234-abcd-1234-abcd-abcd1234abcd",
"roleDefinitionName": "User Access Administrator",
"scope": "/subscriptions/abcdabcd-1234-abcd-1234-abcdabcdabcd",
"type": "Microsoft.Authorization/roleAssignments",
"updatedBy": "abcd1234-abcd-1234-abcd-abcd1234abcd",
"updatedOn": "2024-02-10T11:00:32.061981+00:00"
}
]
If the
role assignment list command output returns an array with one or more role assignments, as shown in the example above, the use of the
User Access Administrator role is not restricted in the selected Azure subscription.
05 Repeat steps no. 3 and 4 for each subscription created in your Microsoft Azure cloud account.