Skip to content

Commit 0c405ae

Browse files
updates
1 parent 9cc3066 commit 0c405ae

File tree

2 files changed

+23
-13
lines changed

2 files changed

+23
-13
lines changed

articles/sre-agent/security-context.md

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -33,27 +33,33 @@ The security requirements for users are different depending on if you're creatin
3333

3434
## Agent security context
3535

36-
When you create an agent, a managed identity is created and automatically configured with the appropriate roles and permissions required for the agent to run in the assigned resource groups.
36+
Azure SRE Agent has its own managed identity that gives the agent the required credentials to act on your behalf as it manages assigned resource groups. You have full control over the roles and permissions applied to the managed identity.
3737

38-
By default the agent is granted *Reader* permissions on the resource groups it manages. If higher privileges are needed for a specific operation, temporary *Contributor* permissions are granted with user approval.
38+
When you create the agent from the portal, you can select from different permissions levels best suited for your situation. When you create an agent, you can apply the *Reader* or *Privileged* permission level.
3939

40-
When you create the agent, assigning the resource groups you select to manage are associated to the agent's managed identity.
40+
The following table describes the difference between the two levels.
41+
42+
| Permission level | Description |
43+
|---|---|
44+
| Reader | Initially configured with read-only permissions on the resource groups it manages. When an action is required that requires elevated permissions, the agent prompts the user for temporary to complete the action. |
45+
| Privileged | Initially configured to take approved actions on resources and resource types detected in its assigned resource groups. |
46+
47+
At any time, you can change which permissions are available to the agent's managed identity by modifying the access control (IAM) settings of a resource group manged by the agent.
4148

4249
As resource groups are added or removed from the agent's scope, the managed identity's permissions are updated accordingly. Removing a resource group revokes the agent's access to the group entirely.
4350

44-
If the agent lacks permissions for an action, it prompts the user for authorization to complete the action.
51+
> [!NOTE]
52+
> You can't directly remove specific permissions from the agent. To restrict the agent's access, you must remove the entire resource group from the agent's scope.
4553
46-
### Agent permissions level
54+
### Roles
4755

48-
When you create an agent, you can allow the agent to run as a *Reader* or with a *Privileged* permission level. The following table describes the difference between the two levels.
56+
The agent's managed identity is often preconfigured with the following role assignments for a managed resource group:
4957

50-
| Permission level | Description |
51-
|---|---|
52-
| Reader | The agent has read-only permissions on the resource groups it manages. When an action is required that requires elevated permissions, the agent prompts the user for temporary to complete the action. |
53-
| Privileged | The agent has permissions to take approved actions on resources and resource types detected in its assigned resource groups. |
58+
* Log Analytics Reader
59+
* Azure Reader
60+
* Monitoring Reader
5461

55-
> [!NOTE]
56-
> You can't directly remove specific permissions from the agent. To restrict the agent's access, you must remove the entire resource group from the agent's scope.
62+
Plus any required roles related to specific Azure services in resource groups managed by the agent.
5763

5864
## Agent behavior
5965

articles/sre-agent/troubleshoot.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,14 @@ This guide covers the common problems faced when working with Azure SRE Agent an
1414

1515
## Common troubleshooting scenarios
1616

17-
The following table outlines frequent issues you might encounter and their solutions:
17+
The following table outlines frequent issues you might encounter and their solutions. For more information about how roles and permissions are applied to an agent, see [Security contexts in Azure SRE Agent](./security-context.md).
1818

1919
| Scenario | Reason | Remarks |
2020
|---|---|---|
2121
| The agent shows a permissions error in the chat and knowledge graph. | The agent is created with a high-privileged account and low-privilege account attempts to interact with the agent. | Deny assignments or Azure Policy blocks identity assignment to the agent resource group. |
2222
| The location dropdown is blank. | A non-US region policy blocks access to Sweden Central. | If your subscription or management group limits to US-only deployments, then the creation step fails. |
2323
| The *Create* button is disabled. | Lack of administrative permissions. | Agent identity assignments fail if the user account lacks *Owner* or *User Access Administrator* permissions. |
24+
25+
## Related content
26+
27+
- [Security contexts](./security-context.md)

0 commit comments

Comments
 (0)