A fully managed platform in Microsoft Foundry for hosting, scaling, and securing AI agents built with any supported framework or model
You’re running into a known limitation in the current AI Foundry “new experience” UI. The Admin → Users tab only shows inherited access and does not let you click Add user to grant a direct project‑level role assignment. At the same time, the agent runtime requires an explicit role assignment at the project scope for the Microsoft.CognitiveServices/accounts/AIServices/agents/write data action and does not accept inherited RBAC.
To fix this, you need to grant the required role via Azure CLI or PowerShell at the project‑level ARM scope. First, identify the project’s scope: /subscriptions/{subscriptionId}/resourceGroups/{rgName}/providers/Microsoft.CognitiveServices/accounts/{accountName}/projects/{projectName}
Then, use the user’s object ID from Entra ID and run one of these commands:
With Azure CLI:
bash
az role assignment create \
--assignee <userObjectId> \
--role "Azure AI User" \
--scope "/subscriptions/{subscriptionId}/resourceGroups/{rgName}/providers/Microsoft.CognitiveServices/accounts/{accountName}/projects/{projectName}"
With PowerShell:
powershell
New-AzRoleAssignment `
-ObjectId <userObjectId> `
-RoleDefinitionName "Azure AI User" `
-Scope "/subscriptions/{subscriptionId}/resourceGroups/{rgName}/providers/Microsoft.CognitiveServices/accounts/{accountName}/projects/{projectName}"
You can use Azure AI Project Manager if the user needs broader control. After running the command, wait a few minutes for propagation and ask the user to retry the Teams deployment. For Teams scenarios, also ensure the end user has Azure AI User on the Agent Application resource and that the agent identity has the necessary RBAC on downstream resources like storage, Log Analytics, or MCP‑connected services.
Hope this Helps!