Skip to content

Commit 8740ddd

Browse files
authored
Merge pull request #387 from J-Silvestre/patch-8
Update how-to-assign-roles.md
2 parents e4fa87d + 4f5d6f7 commit 8740ddd

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/machine-learning/how-to-assign-roles.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ If you anticipate that you need to recreate complex role assignments, an Azure R
269269
The following table is a summary of Azure Machine Learning activities and the permissions required to perform them at the least scope. For example, if an activity can be performed with a workspace scope (Column 4), then all higher scope with that permission also work automatically. For certain activities, the permissions differ between V1 and V2 APIs.
270270
271271
> [!IMPORTANT]
272-
> All paths in this table that start with `/` are *relative paths* to `Microsoft.MachineLearningServices/` :
272+
> All paths in this table that start with `/` are *relative paths* to `Microsoft.MachineLearningServices/`
273273
274274
| Activity | Subscription-level scope | Resource group-level scope | Workspace-level scope |
275275
| ----- | ----- | ----- | ----- |
@@ -293,6 +293,8 @@ The following table is a summary of Azure Machine Learning activities and the pe
293293
294294
2. When attaching an AKS cluster, you also need to have the [Azure Kubernetes Service Cluster Admin Role](/azure/role-based-access-control/built-in-roles#azure-kubernetes-service-cluster-admin-role) on the cluster.
295295
296+
3. These scenarios don't include the permissions needed to create workspace dependent resources. For more information, see the write permissions for [Storage](https://learn.microsoft.com/azure/role-based-access-control/permissions/storage#microsoftstorage), [OperationalInsights](https://learn.microsoft.com/azure/role-based-access-control/permissions/monitor#microsoftoperationalinsights), [Key Vault](https://learn.microsoft.com/azure/role-based-access-control/permissions/security#microsoftkeyvault) and [Container Registry](https://learn.microsoft.com/azure/role-based-access-control/permissions/containers#microsoftcontainerregistry).
297+
296298
### Deploy into a virtual network or subnet
297299
298300
[!INCLUDE [network-rbac](includes/network-rbac.md)]

0 commit comments

Comments
 (0)