Share via

Documentation of Authorization evidence field in Activity Logs

Neel Manthani 0 Reputation points
2026-04-03T17:14:35.23+00:00

Hello everyone,

I am currently building an Azure workbook dashboard designed to view privileged roles and the justifications for their use. As part of this monitoring effort, I am analyzing the authorization field within the Azure Activity Logs.

My goal is to use the authorization.evidence property—specifically the roleAssignmentId—to identify every instance where a specific Entra ID group's role assignment is being leveraged to perform an action.

Before I fully rely on this logic for the dashboard, I want to ensure my queries are based on verified behavior and don't introduce misleading correlations. What limitations or edge cases affect the reliability of conclusions drawn from this field?

Specifically, I am trying to clarify:

  1. Multiple Assignments: If a user has the required permission through multiple paths (e.g., a direct assignment + membership in the target group), how does the ARM RBAC engine determine which roleAssignmentId to log?

Missing Evidence: Are there known scenarios (specific resource providers, denied actions, or specific system identities) where the evidence block is omitted entirely despite a logged authorization event?

If there is any documentation or validated information about the evidence field for auditing group-based access that can be shared, it would be highly appreciated!

Azure Monitor
Azure Monitor

An Azure service that is used to collect, analyze, and act on telemetry data from Azure and on-premises environments.


1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-04-03T17:14:47.2166667+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    The available documentation in the context describes how to query and interpret Azure Activity Logs for RBAC changes, but does not document the internal behavior of the authorization.evidence field or how roleAssignmentId is selected or omitted. Therefore, no supported statements can be made about:

    • How the RBAC engine chooses a specific roleAssignmentId when a caller has multiple effective role assignments (direct + group + inherited, etc.).
    • Specific scenarios or resource providers where authorization.evidence may be missing, incomplete, or behave differently.

    The context only confirms that:

    • Activity logs expose an authorization block with an action and scope, plus caller, eventTimestamp, and status that can be filtered via Azure CLI (az monitor activity-log list) or viewed and queried via Azure Monitor Logs / Log Analytics.
    • RBAC changes (role assignments and role definitions) can be queried and analyzed using Azure Monitor Logs (for example, via the AzureActivity table) and filtered on Microsoft.Authorization/roleAssignments operations.

    Because there is no explicit documentation here for authorization.evidence semantics, selection rules, or completeness guarantees, it is not possible—based on this context—to describe limitations, edge cases, or to validate using authorization.evidence.roleAssignmentId as a definitive audit source for group-based access.


    References:

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.