An Azure service that is used to collect, analyze, and act on telemetry data from Azure and on-premises environments.
The available documentation in the context describes how to query and interpret Azure Activity Logs for RBAC changes, but does not document the internal behavior of the authorization.evidence field or how roleAssignmentId is selected or omitted. Therefore, no supported statements can be made about:
- How the RBAC engine chooses a specific
roleAssignmentIdwhen a caller has multiple effective role assignments (direct + group + inherited, etc.). - Specific scenarios or resource providers where
authorization.evidencemay be missing, incomplete, or behave differently.
The context only confirms that:
- Activity logs expose an
authorizationblock with anactionandscope, pluscaller,eventTimestamp, andstatusthat can be filtered via Azure CLI (az monitor activity-log list) or viewed and queried via Azure Monitor Logs / Log Analytics. - RBAC changes (role assignments and role definitions) can be queried and analyzed using Azure Monitor Logs (for example, via the
AzureActivitytable) and filtered onMicrosoft.Authorization/roleAssignmentsoperations.
Because there is no explicit documentation here for authorization.evidence semantics, selection rules, or completeness guarantees, it is not possible—based on this context—to describe limitations, edge cases, or to validate using authorization.evidence.roleAssignmentId as a definitive audit source for group-based access.
References: