You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Create a User Assigned Managed Identity (UAMI) for your Site Network Service (SNS).
15
-
- Assign that User Assigned Managed Identity permissions.
15
+
- Assign that User Assigned Managed Identity permissions for use by Azure Operator Service Manager (AOSM)
16
16
17
-
The requirement for a User Assigned Managed Identity and the required permissions depend on the Network Service Design (NSD) and must have been communicated to you by the Network Service Designer.
17
+
> [!WARNING]
18
+
> UAMI is required where an expected SNS operation may run for four or more hours. If UAMI isn't used during long running SNS operations, the SNS may report a false failed status before component operations complete.
18
19
19
20
## Prerequisites
20
21
21
-
- You must have created a custom role via [Create a custom role](how-to-create-custom-role.md). This article assumes that you named the custom role 'Custom Role - AOSM Service Operator access to Publisher.'
22
+
- You must create a custom role via [Create a custom role](how-to-create-custom-role.md). This article assumes that you named the custom role 'Custom Role - AOSM Service Operator access to Publisher.'
22
23
23
-
-Your Network Service Designer must have told you which other permissions your Managed Identity requires and which Network Function Definition Version (NFDV) your SNS uses.
24
+
-You must work with your Network Service Designer to understand the permissions your Managed Identity requires and which Network Function Definition Version (NFDV) your SNS uses.
24
25
25
-
-To perform this task, you need either the 'Owner' or 'User Access Administrator' role over the Network Function Definition Version resource from your chosen Publisher. You also must have a Resource Group over which you have the 'Owner' or 'User Access Administrator' role assignment in order to create the Managed Identity and assign it permissions.
26
+
-You need either the 'Owner' or 'User Access Administrator' role over the Network Function Definition Version resource from your chosen Publisher. You also must have a Resource Group over which you have the 'Owner' or 'User Access Administrator' role assignment.
26
27
27
-
## Create a User Assigned Managed Identity
28
+
## Create a UAMI
28
29
29
-
Create a User Assigned Managed Identity. For details, refer to [Create a User Assigned Managed Identity for your SNS](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp).
30
+
First, create a UAMI. Refer to [Create a User Assigned Managed Identity for your SNS](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp) for details.
30
31
31
-
## Assign custom role
32
+
## Assign custom role to UAMI
32
33
33
-
Assign a custom role to your User Assigned Managed Identity.
34
+
Next, assign a custom role to your new UAMI. Choose a scope-based approach and then allow the proper permission across that scope.
34
35
35
36
### Choose scope for assigning custom role
36
37
37
-
The publisher resources that you need to assign the custom role to are:
38
+
Either assign the custom role individually to a child resource, like an NFDV, or to a parent resource, such as the publisher resource group or Network Function Definition Group (NFDG). Assigning the role to a parent resource grants equal access over all child resources. For proper SNS operations, either the parent resource must include all below resources, or the following resources must be assigned the custom role individually:
38
39
39
-
- The Network Function Definition Version(s)
40
+
- All the Network Function Definition Versions (NSDV).
41
+
- All the Network Function Definition Groups (NFDG) and Versions
42
+
- All the Network Service Design Groups (NSD) and Versions.
43
+
- All the Configuration Group Schemas (CGS).
44
+
- All the custom locations.
40
45
41
-
You must decide if you want to assign the custom role individually to this NFDV, or to a parent resource such as the publisher resource group or Network Function Definition Group.
46
+
### Allow proper permissions for the chosen scope
42
47
43
-
Applying to a parent resource grants access over all child resources. For example, applying to the whole publisher resource group gives the managed identity access to:
44
-
- All the Network Function Definition Groups and Versions.
48
+
The UAMI needs the following individual permissions to execute required SNS operations:
45
49
46
-
- All the Network Service Design Groups and Versions.
If using a parent resource scope approach, then the required permissions would be applied to the parent resource.
61
65
62
66
> [!NOTE]
63
-
> Do not provide write or delete access to any of these publisher resources.
67
+
> Don't provide write or delete access to any of these publisher resources.
64
68
65
69
### Assign custom role
66
70
67
-
1. Access the Azure portal and open your chosen scope; Publisher Resource Group or Network Function Definition Version.
71
+
1. Access the Azure portal and open your chosen resource scope; for example, Publisher Resource Group or Network Function Definition Version.
68
72
69
73
2. In the side menu of this item, select **Access Control (IAM)**.
70
74
@@ -80,27 +84,26 @@ The custom role permissions limit access to the list of the permissions shown he
80
84
81
85
:::image type="content" source="media/how-to-custom-assign-user-access-managed-identity.png" alt-text="Screenshot showing the add role assignment and select managed identities." lightbox="media/how-to-custom-assign-user-access-managed-identity.png":::
82
86
83
-
84
-
7. Select **Review and assign**.
87
+
6. Select **Review and assign**.
85
88
86
89
### Repeat the role assignment
87
90
88
-
Repeat the role assignment tasks for all of your chosen scopes.
91
+
Repeat the role assignment process for any remaining resources given the chosen scope approach.
89
92
90
93
## Assign Managed Identity Operator role to the Managed Identity itself
91
94
92
95
1. Go to the Azure portal and search for **Managed Identities**.
93
-
1. Select *identity-for-nginx-sns* from the list of **Managed Identities**.
94
-
1. On the side menu, select **Access Control (IAM)**.
95
-
1. Choose **Add Role Assignment** and select the **Managed Identity Operator** role.
96
+
2. Select *your-identity* from the list of **Managed Identities**.
97
+
3. On the side menu, select **Access Control (IAM)**.
98
+
4. Choose **Add Role Assignment** and select the **Managed Identity Operator** role.
96
99
:::image type="content" source="media/how-to-create-user-assigned-managed-identity-operator.png" alt-text="Screenshot showing the Managed Identity Operator role add role assignment." lightbox="media/how-to-create-user-assigned-managed-identity-operator.png":::
1. Select **+ Select members** and navigate to the user-assigned managed identity and proceed with the assignment.
105
+
6. Select **Managed identity**.
106
+
7. Select **+ Select members** and navigate to the user-assigned managed identity and proceed with the assignment.
104
107
105
108
:::image type="content" source="media/managed-identity-user-assigned-ubuntu.png" alt-text="Screenshot showing the Add role assignment screen with Managed identity selected." lightbox="media/managed-identity-user-assigned-ubuntu.png":::
0 commit comments