Skip to content

Commit 0890d77

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-mto-sync-graph-troubleshooting
2 parents aa597f8 + a1938cd commit 0890d77

File tree

7 files changed

+28
-25
lines changed

7 files changed

+28
-25
lines changed

articles/azure-resource-manager/managed-applications/key-vault-access.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Azure Key Vault when deploying Managed Applications
33
description: Shows how to access secrets in Azure Key Vault when deploying Managed Applications.
44
ms.custom: subject-rbac-steps
55
ms.topic: conceptual
6-
ms.date: 10/04/2022
6+
ms.date: 04/14/2023
77
---
88

99
# Access Key Vault secret when deploying Azure Managed Applications
@@ -19,19 +19,19 @@ This article describes how to configure the Key Vault to work with Managed Appli
1919

2020
:::image type="content" source="./media/key-vault-access/open-key-vault.png" alt-text="Screenshot of the Azure home page to open a key vault using search or by selecting key vault.":::
2121

22-
1. Select **Access policies**.
22+
1. Select **Access configuration**.
2323

24-
:::image type="content" source="./media/key-vault-access/select-access-policies.png" alt-text="Screenshot of the key vault setting to select access policies.":::
24+
:::image type="content" source="./media/key-vault-access/select-access-configuration.png" alt-text="Screenshot of the key vault setting to select access configuration.":::
2525

26-
1. Select **Azure Resource Manager for template deployment**. Then, select **Save**.
26+
1. Select **Azure Resource Manager for template deployment**. Then, select **Apply**.
2727

28-
:::image type="content" source="./media/key-vault-access/enable-template.png" alt-text="Screenshot of the key vault's access policies that enable Azure Resource Manager for template deployment.":::
28+
:::image type="content" source="./media/key-vault-access/enable-template.png" alt-text="Screenshot of the key vault's access configuration that enables Azure Resource Manager for template deployment.":::
2929

3030
## Add service as contributor
3131

32-
Assign the **Contributor** role to the **Appliance Resource Provider** user at the key vault scope. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
32+
Assign the **Contributor** role to the **Appliance Resource Provider** user at the key vault scope. For detailed steps, go to [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
3333

34-
The **Appliance Resource Provider** is a service principal in your Azure Active Directory's tenant. From the Azure portal, you can see if it's registered by going to **Azure Active Directory** > **Enterprise applications** and change the search filter to **Microsoft Applications**. Search for _Appliance Resource Provider_. If it's not found, [register](../troubleshooting/error-register-resource-provider.md) the `Microsoft.Solutions` resource provider.
34+
The **Appliance Resource Provider** is a service principal in your Azure Active Directory's tenant. From the Azure portal, you can verify if it's registered by going to **Azure Active Directory** > **Enterprise applications** and change the search filter to **Microsoft Applications**. Search for _Appliance Resource Provider_. If it's not found, [register](../troubleshooting/error-register-resource-provider.md) the `Microsoft.Solutions` resource provider.
3535

3636
## Reference Key Vault secret
3737

@@ -78,7 +78,7 @@ To pass a secret from a Key Vault to a template in your Managed Application, you
7878
"resources": [
7979
{
8080
"type": "Microsoft.Resources/deployments",
81-
"apiVersion": "2021-04-01",
81+
"apiVersion": "2022-09-01",
8282
"name": "dynamicSecret",
8383
"properties": {
8484
"mode": "Incremental",
@@ -105,7 +105,7 @@ To pass a secret from a Key Vault to a template in your Managed Application, you
105105
"resources": [
106106
{
107107
"type": "Microsoft.Sql/servers",
108-
"apiVersion": "2022-02-01-preview",
108+
"apiVersion": "2022-05-01-preview",
109109
"name": "[variables('sqlServerName')]",
110110
"location": "[parameters('location')]",
111111
"properties": {
@@ -149,7 +149,7 @@ To pass a secret from a Key Vault to a template in your Managed Application, you
149149

150150
You've configured your Key Vault to be accessible during deployment of a Managed Application.
151151

152-
- For information about passing a value from a Key Vault as a template parameter, see [Use Azure Key Vault to pass secure parameter value during deployment](../templates/key-vault-parameter.md).
153-
- To learn more about key vault security, see [Azure Key Vault security](../../key-vault/general/security-features.md) and [Authentication in Azure Key Vault](../../key-vault/general/authentication.md).
154-
- For managed application examples, see [Sample projects for Azure managed applications](sample-projects.md).
155-
- To learn how to create a UI definition file for a managed application, see [Get started with CreateUiDefinition](create-uidefinition-overview.md).
152+
- For information about passing a value from a Key Vault as a template parameter, go to [Use Azure Key Vault to pass secure parameter value during deployment](../templates/key-vault-parameter.md).
153+
- To learn more about key vault security, go to [Azure Key Vault security](../../key-vault/general/security-features.md) and [Authentication in Azure Key Vault](../../key-vault/general/authentication.md).
154+
- For managed application examples, go to [Sample projects for Azure managed applications](sample-projects.md).
155+
- To learn how to create a UI definition file for a managed application, go to [Get started with CreateUiDefinition](create-uidefinition-overview.md).
1.56 KB
Loading
19.4 KB
Loading

articles/cosmos-db/continuous-backup-restore-permissions.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to isolate and restrict the restore permissions for conti
44
author: kanshiG
55
ms.service: cosmos-db
66
ms.topic: how-to
7-
ms.date: 02/17/2023
7+
ms.date: 03/31/2023
88
ms.author: govindk
99
ms.reviewer: mjbrown
1010
ms.custom: subject-rbac-steps, ignite-2022, devx-track-azurecli
@@ -13,15 +13,15 @@ ms.custom: subject-rbac-steps, ignite-2022, devx-track-azurecli
1313
# Manage permissions to restore an Azure Cosmos DB account
1414
[!INCLUDE[NoSQL, MongoDB, Gremlin, Table](includes/appliesto-nosql-mongodb-gremlin-table.md)]
1515

16-
Azure Cosmos DB allows you to isolate and restrict the restore permissions for continuous backup account to a specific role or a principal. The owner of the account can trigger a restore and assign a role to other principals to perform the restore operation. These permissions can be applied at the subscription scope or more granularly at the source account scope as shown in the following image:
16+
Azure Cosmos DB allows you to isolate and restrict the restore permissions for continuous backup account to a specific role or a principal. These permissions can be applied at the subscription scope or more granularly at the source account scope as shown in the following image:
1717

1818
:::image type="content" source="./media/continuous-backup-restore-permissions/restore-roles-permissions.svg" alt-text="List of roles required to perform restore operation." border="false":::
1919

2020
Scope is a set of resources that have access, to learn more on scopes, see the [Azure RBAC](../role-based-access-control/scope-overview.md) documentation. In Azure Cosmos DB, applicable scopes are the source subscription and database account for most of the use cases. The principal performing the restore actions should have write permissions to the destination resource group.
2121

2222
## Assign roles for restore using the Azure portal
2323

24-
To perform a restore, a user or a principal need the permission to restore (that is *restore/action* permission), and permission to provision a new account (that is *write* permission). To grant these permissions, the owner can assign the `CosmosRestoreOperator` and `Cosmos DB Operator` built in roles to a principal.
24+
To perform a restore, a user or a principal need the permission to restore (that is *restore/action* permission), and permission to provision a new account (that is *write* permission). To grant these permissions, the owner of the subscription can assign the `CosmosRestoreOperator` and `Cosmos DB Operator` built in roles to a principal.
2525

2626
1. Sign into the [Azure portal](https://portal.azure.com/) and navigate to your subscription. The `CosmosRestoreOperator` role is available at subscription level.
2727

@@ -83,17 +83,20 @@ Following permissions are required to perform the different activities pertainin
8383
Roles with permission can be assigned to different scopes to achieve granular control on who can perform the restore operation within a subscription or a given account.
8484

8585
### Assign capability to restore from any restorable account in a subscription
86-
- Assign a user write action on the specific resource group. This action is required to create a new account in the resource group.
87-
- Assign the `CosmosRestoreOperator` built in role to the specific restorable database account that needs to be restored. In the following command, the scope for the `RestorableDatabaseAccount` is extracted from the `ID` property of result of execution of `az cosmosdb restorable-database-account list`(if using CLI) or `Get-AzCosmosDBRestorableDatabaseAccount`(if using the PowerShell)
8886

89-
Assign the `CosmosRestoreOperator` built-in role at subscription level
87+
- Assign the `CosmosRestoreOperator` built in role to the specific subscription level
9088

9189
```azurecli-interactive
9290
az role assignment create --role "CosmosRestoreOperator" --assignee <email> --scope /subscriptions/<subscriptionId>
9391
```
9492

95-
### Assign capability to restore from a specific account
96-
This operation is currently not supported.
93+
### Assign capability to restore from a specific account
94+
- Assign a user write action on the specific resource group. This action is required to create a new account in the resource group.
95+
- Assign the `CosmosRestoreOperator` built in role to the specific restorable database account that needs to be restored. In the following command, the scope for the `RestorableDatabaseAccount` is extracted from the `ID` property of result of execution of `az cosmosdb restorable-database-account list`(if using CLI) or `Get-AzCosmosDBRestorableDatabaseAccount`(if using the PowerShell)
96+
97+
```azurecli-interactive
98+
az role assignment create --role "CosmosRestoreOperator" --assignee <email> --scope <RestorableDatabaseAccount>
99+
```
97100

98101
### Assign capability to restore from any source account in a resource group.
99102
This operation is currently not supported.

articles/energy-data-services/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,8 @@
7878
href: how-to-use-managed-identity.md
7979
- name: Set up Resource sharing (CORS)
8080
href: how-to-enable-cors.md
81+
- name: Set up audit logs
82+
href: how-to-manage-audit-logs.md
8183
- name: Load datasets
8284
href: https://github.com/Azure/osdu-data-load-tno
8385
- name: Convert SEG-Y to ZGY
@@ -86,8 +88,6 @@
8688
href: how-to-convert-segy-to-ovds.md
8789
- name: Generate a refresh token
8890
href: how-to-generate-refresh-token.md
89-
- name: Set up audit logs
90-
href: how-to-manage-audit-logs.md
9191
- name: References
9292
items:
9393
- name: REST API

includes/ai-generated-attribution.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
author: tfitzmac
33
ms.author: tomfitz
4-
ms.date: 02/26/2023
4+
ms.date: 04/14/2023
55
ms.topic: include
66
ms.prod: azure
77
---
88

99
> [!NOTE]
10-
> This article was partially generated using Azure OpenAI Service. Before publishing, an author reviewed and revised the content as needed. See [Our principles for using AI-generated content in Microsoft Learn](https://aka.ms/ai-content-principles).
10+
> This article was partially created with the help of artificial intelligence. Before publishing, an author reviewed and revised the content as needed. See [Our principles for using AI-generated content in Microsoft Learn](https://aka.ms/ai-content-principles).

0 commit comments

Comments
 (0)