You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/configuration-infrastructure.md
+20Lines changed: 20 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,6 +78,24 @@ Check your [Azure role-based access control](../role-based-access-control/role-a
78
78
79
79
You can use the built-in roles, such as [Network contributor](../role-based-access-control/built-in-roles.md#network-contributor), which already support these permissions. If a built-in role doesn't provide the right permission, you can [create and assign a custom role](../role-based-access-control/custom-roles-portal.md). Learn more about [managing subnet permissions](../virtual-network/virtual-network-manage-subnet.md#permissions).
80
80
81
+
## Permissions
82
+
Depending on whether you're creating new resources or using existing ones, add the appropriate permissions from the following list:
83
+
84
+
|Resource | Resource status | Required Azure permissions |
For more information, see [Azure permissions for Networking](../role-based-access-control/permissions/networking.md) and [Virtual network permissions](../virtual-network/virtual-network-manage-subnet.md#permissions).
93
+
## Roles scope
94
+
In the process of custom role definition, you can specify a role assignment scope at four levels: management group, subscription, resource group, and resources. To grant access, you assign roles to users, groups, service principals, or managed identities at a particular scope.
95
+
These scopes are structured in a parent-child relationship, with each level of hierarchy making the scope more specific. You can assign roles at any of these levels of scope, and the level you select determines how widely the role is applied.
96
+
For example, a role assigned at the subscription level can cascade down to all resources within that subscription, while a role assigned at the resource group level will only apply to resources within that specific group. Learn more about scope level
97
+
For more information, see [Scope levels](../role-based-access-control/scope-overview.md#scope-levels).
98
+
81
99
> [!NOTE]
82
100
> You might have to allow sufficient time for [Azure Resource Manager cache refresh](../role-based-access-control/troubleshooting.md?tabs=bicep#symptom---role-assignment-changes-are-not-being-detected) after role assignment changes.
83
101
@@ -221,3 +239,5 @@ Any scenario where 0.0.0.0/0 needs to be redirected through a virtual appliance,
221
239
222
240
-[Learn about frontend IP address configuration](configuration-frontend-ip.md)
223
241
-[Learn about private Application Gateway deployment](application-gateway-private-deployment.md)
242
+
-[What is Azure Role Based Access](../role-based-access-control/overview.md)
243
+
-[Azure Role Based Access Control](../role-based-access-control/role-assignments-list-portal.yml)
0 commit comments