Azure – unable to assign rbac role via code using bicep fails with Insufficient read or write permissions on storage account
Got a storage account in a different subscription and resource group, trying to use bicep to assign rbac roles and so far the results are somewhat confusing. assign_role.bicep param storageAccountName string param principalId string @allowed([ 'Device' 'ForeignGroup' 'Group' 'ServicePrincipal' 'User'…