Skip to content

Commit 127e829

Browse files
committed
edit wording
1 parent 8492bb7 commit 127e829

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/security-center/security-center-management-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: na
16-
ms.date: 08/17/2018
16+
ms.date: 08/22/2018
1717
ms.author: terrylan
1818

1919
---
@@ -84,7 +84,7 @@ An Azure Active Directory tenant administrator doesn’t have direct access to A
8484

8585

8686
### Assign RBAC roles to users
87-
To gain visibility to all subscriptions, tenant administrators need to assign an RBAC role to themselves first at the root management group level. Then they can assign RBAC roles to any users that require access to the root management group level. The recommended roles to assign are either **Security Admin** or **Security Reader**. Generally, the Security Admin role is required to apply policies on the root level, while Security Reader will suffice to provide tenant-level visibility. For more information about the permissions granted by these roles, see the [Security Admin built-in role description](../role-based-access-control/built-in-roles.md#security-admin) or the [Security Reader built-in role description](../role-based-access-control/built-in-roles.md#security-reader).
87+
To gain visibility to all subscriptions, tenant administrators need to assign the appropriate RBAC role to any users they wish to grant tenant-wide visibility, including themselves, at the root management group level. The recommended roles to assign are either **Security Admin** or **Security Reader**. Generally, the Security Admin role is required to apply policies on the root level, while Security Reader will suffice to provide tenant-level visibility. For more information about the permissions granted by these roles, see the [Security Admin built-in role description](../role-based-access-control/built-in-roles.md#security-admin) or the [Security Reader built-in role description](../role-based-access-control/built-in-roles.md#security-reader).
8888

8989

9090
#### Assign RBAC roles to users through the Azure portal:

0 commit comments

Comments
 (0)