Skip to content

Commit 017972b

Browse files
adding links
1 parent f5ce53d commit 017972b

File tree

5 files changed

+47
-27
lines changed

5 files changed

+47
-27
lines changed

articles/iot-operations/deploy-iot-ops/howto-deploy-iot-operations.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -146,6 +146,13 @@ One at a time, run each Azure CLI command on the **Automation** tab in a termina
146146
az extension add --upgrade --name azure-iot-ops
147147
```
148148

149+
> [!IMPORTANT]
150+
> For preview releases, you need to append the `--allow-preview` flag to the `az extension add` command to install the [preview version](./howto-upgrade.md#upgrade-to-preview-version) of the Azure IoT Operations CLI extension.
151+
>
152+
> ```azurecli
153+
> az extension add --upgrade --name azure-iot-ops --allow-preview
154+
> ```
155+
149156
1. Copy and run the provided [az iot ops schema registry create](/cli/azure/iot/ops/schema/registry#az-iot-ops-schema-registry-create) command to create a schema registry which is used by Azure IoT Operations components. If you chose to use an existing schema registry, this command isn't displayed on the **Automation** tab.
150157
151158
> [!NOTE]
@@ -184,6 +191,9 @@ One at a time, run each Azure CLI command on the **Automation** tab in a termina
184191
--feature connectors.settings.preview=Enabled
185192
```
186193
194+
> [!NOTE]
195+
> The `--feature` configuration parameter isn't available in 2507 preview release.
196+
187197
* If you followed the optional prerequisites to set up your own certificate authority issuer, add the `--trust-settings` parameters to the `create` command:
188198
189199
```bash

articles/iot-operations/deploy-iot-ops/howto-deploy-iot-test-operations.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -132,6 +132,14 @@ One at a time, run each Azure CLI command on the **Automation** tab in a termina
132132
az extension add --upgrade --name azure-iot-ops
133133
```
134134
135+
136+
> [!IMPORTANT]
137+
> For preview releases, you need to append the `--allow-preview` flag to the `az extension add` command to install the [preview version](./howto-upgrade.md#upgrade-to-preview-version) of the Azure IoT Operations CLI extension.
138+
>
139+
> ```azurecli
140+
> az extension add --upgrade --name azure-iot-ops --allow-preview
141+
> ```
142+
135143
1. Copy and run the provided [az iot ops schema registry create](/cli/azure/iot/ops/schema/registry#az-iot-ops-schema-registry-create) command to create a schema registry which is used by Azure IoT Operations components. If you chose to use an existing schema registry, this command isn't displayed on the **Automation** tab.
136144
137145
1. Azure IoT Operations uses *namespaces* to organize assets and devices. Each Azure IoT Operations instance uses a single namespace for its assets and devices. You can use an existing namespace or run the `az iot ops ns create` command to create an Azure Device Registry namespace. Replace `<my namespace name>` with a unique name for your namespace.
@@ -167,6 +175,9 @@ One at a time, run each Azure CLI command on the **Automation** tab in a termina
167175
--feature connectors.settings.preview=Enabled
168176
```
169177
178+
> [!NOTE]
179+
> The `--feature` configuration parameter isn't available in 2507 preview release.
180+
170181
1. Once all of the Azure CLI commands complete successfully, you can close the **Install Azure IoT Operations** wizard.
171182
172183
Once the `create` command completes successfully, you have a working Azure IoT Operations instance running on your cluster. At this point, your instance is configured for most testing and evaluation scenarios.

articles/iot-operations/deploy-iot-ops/overview-deploy.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -74,12 +74,12 @@ The following table describes Azure IoT Operations deployment and management tas
7474
| ---- | ------------------- | -------- |
7575
| Deploy Azure IoT Operations | [Azure IoT Operations Onboarding role](../secure-iot-ops/built-in-rbac.md#azure-iot-operations-onboarding-role) | This role has all required permissions to read and write Azure IoT operations and Azure Device Registry resources. This role has `Microsoft.Authorization/roleAssignments/write` permissions.|
7676
| Register resource providers | [Contributor role](/azure/role-based-access-control/built-in-roles/privileged#contributor) at subscription level| Only required to do once per subscription. You need to register the following resource providers: `Microsoft.ExtendedLocation`, `Microsoft.SecretSyncController`, `Microsoft.Kubernetes`, `Microsoft.KubernetesConfiguration`, `Microsoft.IoTOperations`, and `Microsoft.DeviceRegistry`. |
77-
| Create secrets in Key Vault | [Key Vault Secrets Officer role](/azure/role-based-access-control/built-in-roles/security#key-vault-secrets-officer) at the resource level | Only required for secure settings deployment. |
78-
| Create and manage storage accounts | Storage Account Contributor role | Required for Azure IoT Operations deployment. |
77+
| Create secrets in Key Vault | [Key Vault Secrets Officer role](/azure/role-based-access-control/built-in-roles/security#key-vault-secrets-officer) at the resource level | Only required for secure settings deployment to synchronize secrets from Azure Key Vault. |
78+
| Create and manage storage accounts | [Storage Account Contributor role](/azure/role-based-access-control/built-in-roles/storage#storage-account-contributor) | Required for Azure IoT Operations deployment. |
7979
| Create a resource group | Resource Group Contributor role | Required to create a resource group for storing Azure IoT Operations resources. |
80-
| Onboard a cluster to Azure Arc | Kubernetes Cluster Azure Arc Onboarding role | Arc-enabled clusters are required to deploy Azure IoT Operations. |
81-
| Manage deployment of Azure resource bridge| Azure Resource Bridge Deployment role | Required to deploy Azure IoT Operations. |
82-
| Provide permissions to deployment| Azure Arc Enabled Kubernetes Cluster User role | Required to grant permission of deployment to the Azure Arc-enabled Kubernetes cluster. |
80+
| Onboard a cluster to Azure Arc | [Kubernetes Cluster - Azure Arc Onboarding role](/azure/role-based-access-control/built-in-roles/containers#kubernetes-cluster---azure-arc-onboarding) | Arc-enabled clusters are required to deploy Azure IoT Operations. |
81+
| Manage deployment of Azure resource bridge| [Azure Resource Bridge Deployment role](/azure/role-based-access-control/built-in-roles/hybrid-multicloud#azure-resource-bridge-deployment-role) | Required to deploy Azure IoT Operations. |
82+
| Provide permissions to deployment| [Azure Arc Enabled Kubernetes Cluster User role](/azure/role-based-access-control/built-in-roles/containers#azure-arc-enabled-kubernetes-cluster-user-role) | Required to grant permission of deployment to the Azure Arc-enabled Kubernetes cluster. |
8383

8484
> [!TIP]
8585
> You must enable resource sync rules on the Azure IoT Operations instance to use the automatic asset discovery capabilities of the Akri services. To learn more, see [What is OPC UA asset discovery (preview)?](../discover-manage-assets/overview-akri.md).

articles/iot-operations/reference/custom-rbac.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Custom RBAC for Your Resources
2+
title: Custom RBAC Roles
33
description: Use the Azure portal to secure access to Azure IoT Operations resources such as data flows and assets by using Azure role-based access control.
44
author: dominicbetts
55
ms.author: dobett
@@ -9,22 +9,21 @@ ms.date: 04/16/2025
99
#CustomerIntent: As an IT administrator, I want configure Azure RBAC custom roles on resources in my Azure IoT Operations instance to control access to them.
1010
---
1111

12-
# Custom RBAC for your Azure IoT Operations resources
12+
# Custom RBAC roles for your Azure IoT Operations resources
1313

14-
To define custom roles that grant specific permissions to users, you can use Azure RBAC. This article includes a list of example that you can download and use in your environment. These custom roles are JSON files that list the specific permissions and scope for the role.
14+
To define custom roles that grant specific permissions to users, you can use Azure RBAC. This article includes a list of example that you can download and use as reference to build your custom roles.
1515

1616
To learn more about custom roles in Azure RBAC, see [Azure custom roles](/azure/role-based-access-control/custom-roles).
1717

1818
Azure IoT operations also offers built-in roles designed to simplify and secure access management for Azure IoT Operations resources. For more information, see [Built-in RBAC roles for IoT Operations](../secure-iot-ops/built-in-rbac.md).
1919

2020
## Examples of custom roles
2121

22-
The following sections list the example Azure IoT Operations custom roles you can download and use.
22+
The following sections list the example Azure IoT Operations custom roles you can download and use as reference. These custom roles are JSON files that list the specific permissions and scope for the role, which you should use as a starting point to create your own custom roles.
2323

2424
> [!NOTE]
2525
> The following custom roles are examples only. You need to review and modify the permissions in the JSON files to suit your specific requirements.
2626
27-
2827
### Onboarding roles
2928

3029
You can define an *Onboarding* role that grants sufficient permissions to a user to complete the Azure Arc connect process and deploy Azure IoT Operations securely.
Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Built-in RBAC Roles for IoT Operations
2+
title: Built-in RBAC Roles
33
description: Learn about the built-in RBAC roles for Azure IoT Operations and how to use them to control access to resources.
44
author: SoniaLopezBravo
55
ms.author: sonialopez
@@ -20,28 +20,28 @@ Azure IoT Operations (AIO) offers two built-in roles designed to simplify and se
2020

2121
The Azure IoT Operations Administrator role provides comprehensive permissions to manage and operate all Azure IoT Operations components. Assign this role to users who need full access to use AIO resources. To support deployment and ongoing management of AIO, users require additional permissions. If a user only needs to use AIO, you can assign the Administrator role alone.
2222

23-
When assigning this built-in role, you need to ensure that users have the following permissions:
23+
When assigning this built-in role, you need to ensure that the following roles are also assigned to the user:
2424

25-
- Azure Edge Hardware Center Administrator: This role grants access to manage and take action as an edge order administrator. It is used for ordering and managing Azure Stack Edge devices.
26-
- Azure Arc Enabled Kubernetes Cluster User Role: This role is used to manage Azure Arc-enabled Kubernetes clusters by providing permission to write deployments, manage subscriptions, and handle connected clusters and extensions.
27-
- Key Vault Administrator: This role allows the user to manage all aspects of Azure Key Vaults, including creating, maintaining, viewing, and deleting keys, certificates, and secrets.
28-
- Kubernetes Extension Contributor: This role allows users to manage Kubernetes extensions, including creating, updating, and deleting extensions.
29-
- Managed Identity Contributor: This role allows the user to manage managed identities, including creating, updating, and deleting user-assigned managed identities.
30-
- Monitoring Contributor: This role allows the user to read all monitoring data and update monitoring settings.
31-
- Resource Group Contributor: This role grants permissions to manage resources within a resource group, including creating, updating, and deleting resources.
32-
- Secrets Store Extension Owner: This role allows the user to manage the Secrets Store extension, which synchronizes secrets from Azure Key Vault to Kubernetes clusters.
33-
- Storage Account Contributor: This role allows the user to manage storage accounts, including creating, updating, and deleting storage accounts, as well as managing access keys and other settings.
25+
- Azure Edge Hardware Center Administrator role: This role grants access to manage and take action as an edge order administrator. It is used for ordering and managing Azure Stack Edge devices.
26+
- [Azure Arc Enabled Kubernetes Cluster User role:](/azure/role-based-access-control/built-in-roles/containers#azure-arc-enabled-kubernetes-cluster-user-role) This role is used to manage Azure Arc-enabled Kubernetes clusters by providing permission to write deployments, manage subscriptions, and handle connected clusters and extensions.
27+
- [Key Vault Administrator role:](/azure/role-based-access-control/built-in-roles/security#key-vault-administrator) This role allows the user to manage all aspects of Azure Key Vaults, including creating, maintaining, viewing, and deleting keys, certificates, and secrets.
28+
- [Kubernetes Extension Contributor role:](/azure/role-based-access-control/built-in-roles/containers#kubernetes-extension-contributor) This role allows users to manage Kubernetes extensions, including creating, updating, and deleting extensions.
29+
- [Managed Identity Contributor role:](/azure/role-based-access-control/built-in-roles/identity#managed-identity-contributor) This role allows the user to manage managed identities, including creating, updating, and deleting user-assigned managed identities.
30+
- [Monitoring Contributor role:](/azure/role-based-access-control/built-in-roles/monitor#monitoring-contributor) This role allows the user to read all monitoring data and update monitoring settings.
31+
- Resource Group Contributor role: This role grants permissions to manage resources within a resource group, including creating, updating, and deleting resources.
32+
- Secrets Store Extension Owner role: This role allows the user to manage the Secrets Store extension, which synchronizes secrets from Azure Key Vault to Kubernetes clusters.
33+
- [Storage Account Contributor role:](/azure/role-based-access-control/built-in-roles/storage#storage-account-contributor) This role allows the user to manage storage accounts, including creating, updating, and deleting storage accounts, as well as managing access keys and other settings.
3434

3535
## Azure IoT Operations Onboarding role
3636

3737
AIO Onboarding is a specialized role that provides the necessary permissions to deploy Azure IoT Operations components.
3838

39-
When assigning this built-in role, you need to ensure that users have the following permissions:
39+
When assigning this built-in role, you need to ensure that the following roles are also assigned to the user:
4040

41-
- Azure Resource Bridge Deployment Role: This role is used to manage the deployment of the Azure Resource Bridge. It includes permissions to read, write, and delete various resources related to the Resource Bridge, such as appliances, locations, and telemetry configurations.
42-
- Kubernetes Cluster – Azure Arc Onboarding: This role is used for onboarding Kubernetes clusters to Azure Arc.
43-
- Storage Account Contributor: This role allows the user to manage storage accounts, including creating, updating, and deleting storage accounts, as well as managing access keys and other settings.
44-
- Resource Group Contributor Role: This role grants permissions to manage resources within a resource group, including creating, updating, and deleting resources.
45-
- Azure Arc Enabled Kubernetes Cluster User Role: This role is used to manage Azure Arc-enabled Kubernetes clusters by providing permission to write deployments, manage subscriptions, and handle connected clusters and extensions.
41+
- [Azure Resource Bridge Deployment role:](/azure/role-based-access-control/built-in-roles/hybrid-multicloud#azure-resource-bridge-deployment-role) This role is used to manage the deployment of the Azure Resource Bridge. It includes permissions to read, write, and delete various resources related to the Resource Bridge, such as appliances, locations, and telemetry configurations.
42+
- [Kubernetes Cluster – Azure Arc Onboarding role:](/azure/role-based-access-control/built-in-roles/containers#kubernetes-cluster---azure-arc-onboarding) This role is used for onboarding Kubernetes clusters to Azure Arc.
43+
- [Storage Account Contributor role:](/azure/role-based-access-control/built-in-roles/storage#storage-account-contributor) This role allows the user to manage storage accounts, including creating, updating, and deleting storage accounts, as well as managing access keys and other settings.
44+
- Resource Group Contributor role: This role grants permissions to manage resources within a resource group, including creating, updating, and deleting resources.
45+
- [Azure Arc Enabled Kubernetes Cluster User role:](/azure/role-based-access-control/built-in-roles/containers#azure-arc-enabled-kubernetes-cluster-user-role) This role is used to manage Azure Arc-enabled Kubernetes clusters by providing permission to write deployments, manage subscriptions, and handle connected clusters and extensions.
4646

4747

0 commit comments

Comments
 (0)