Skip to content

Commit 0321bce

Browse files
authored
Merge pull request #125199 from darshils2001/patch-2
Update configuration-infrastructure.md
2 parents e9d1350 + 04c987c commit 0321bce

File tree

1 file changed

+20
-0
lines changed

1 file changed

+20
-0
lines changed

articles/application-gateway/configuration-infrastructure.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,24 @@ Check your [Azure role-based access control](../role-based-access-control/role-a
7878

7979
You can use the built-in roles, such as [Network contributor](../role-based-access-control/built-in-roles.md#network-contributor), which already support these permissions. If a built-in role doesn't provide the right permission, you can [create and assign a custom role](../role-based-access-control/custom-roles-portal.md). Learn more about [managing subnet permissions](../virtual-network/virtual-network-manage-subnet.md#permissions).
8080

81+
## Permissions
82+
Depending on whether you're creating new resources or using existing ones, add the appropriate permissions from the following list:
83+
84+
|Resource | Resource status | Required Azure permissions |
85+
|---|---|---|
86+
| Subnet | Create new| Microsoft.Network/virtualNetworks/subnets/write<br>Microsoft.Network/virtualNetworks/subnets/join/action |
87+
| Subnet | Use existing| Microsoft.Network/virtualNetworks/subnets/read<br>Microsoft.Network/virtualNetworks/subnets/join/action |
88+
| IP addresses| Create new| Microsoft.Network/publicIPAddresses/write<br>Microsoft.Network/publicIPAddresses/join/action |
89+
| IP addresses | Use existing| Microsoft.Network/publicIPAddresses/read<br>Microsoft.Network/publicIPAddresses/join/action |
90+
| ApplicationGatewayWebApplicationFirewallPolicies | Create new / Update existing | Microsoft.Network/ApplicationGatewayWebApplicationFirewallPolicies/write Microsoft.Network/ApplicationGatewayWebApplicationFirewallPolicies/join/action |
91+
92+
For more information, see [Azure permissions for Networking](../role-based-access-control/permissions/networking.md) and [Virtual network permissions](../virtual-network/virtual-network-manage-subnet.md#permissions).
93+
## Roles scope
94+
In the process of custom role definition, you can specify a role assignment scope at four levels: management group, subscription, resource group, and resources. To grant access, you assign roles to users, groups, service principals, or managed identities at a particular scope.
95+
These scopes are structured in a parent-child relationship, with each level of hierarchy making the scope more specific. You can assign roles at any of these levels of scope, and the level you select determines how widely the role is applied.
96+
For example, a role assigned at the subscription level can cascade down to all resources within that subscription, while a role assigned at the resource group level will only apply to resources within that specific group. Learn more about scope level
97+
For more information, see [Scope levels](../role-based-access-control/scope-overview.md#scope-levels).
98+
8199
> [!NOTE]
82100
> You might have to allow sufficient time for [Azure Resource Manager cache refresh](../role-based-access-control/troubleshooting.md?tabs=bicep#symptom---role-assignment-changes-are-not-being-detected) after role assignment changes.
83101
@@ -221,3 +239,5 @@ Any scenario where 0.0.0.0/0 needs to be redirected through a virtual appliance,
221239

222240
- [Learn about frontend IP address configuration](configuration-frontend-ip.md)
223241
- [Learn about private Application Gateway deployment](application-gateway-private-deployment.md)
242+
- [What is Azure Role Based Access](../role-based-access-control/overview.md)
243+
- [Azure Role Based Access Control](../role-based-access-control/role-assignments-list-portal.yml)

0 commit comments

Comments
 (0)