Skip to content

Commit 142cdd1

Browse files
committed
updates
1 parent f5fafce commit 142cdd1

File tree

1 file changed

+9
-5
lines changed

1 file changed

+9
-5
lines changed

articles/deployment-environments/tutorial-deploy-environments-in-cicd-azure-devops.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,9 @@ To create project environment types:
9191

9292
In Azure Pipelines, you create a *service connection* in your Azure DevOps project to access resources in your Azure subscription.
9393

94+
1. If you don't have a user-assigned managed identity for the project, [add one](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity).
95+
> [!NOTE]
96+
> You can use one of three options for identity: app registration, user-assigned managed identity, and system-assigned managed identity. App registration is the most secure option, and user-assigned managed identity is the second most secure. To use app registration, you need to have appropriate permissions. For more information see [Azure Resource Manager service connection special cases](/azure/devops/pipelines/library/azure-resource-manager-alternate-approaches).
9497
1. Sign in to your Azure DevOps organization (`https://dev.azure.com/<your-organization>`). Replace `<your-organization>` with your project identifier.
9598
1. Select your project.
9699
1. Select **Project settings** > **Service connections** > **Create service connection**.
@@ -99,7 +102,10 @@ In Azure Pipelines, you create a *service connection* in your Azure DevOps proje
99102

100103
| Field | Value |
101104
| ----- | ----- |
102-
|**Identity type**|**Managed identity (agent-assigned)**|
105+
|**Identity type**|**Managed identity**|
106+
|Subscription for managed identity||
107+
|Resource group for managed identity ||
108+
|Managed identity ||
103109
| **Scope Level** | **Subscription** |
104110
| **Subscription ID** | Enter the ID of the Azure subscription that hosts your dev center resource. |
105111
| **Subscription name** | Enter the name of the subscription. |
@@ -111,10 +117,8 @@ In Azure Pipelines, you create a *service connection* in your Azure DevOps proje
111117

112118
Deployment Environments uses role-based access control to grant permissions for performing specific activities on your Deployment Environments resource. To make changes from a CI/CD pipeline, you grant the Deployment Environments User role to the managed identity.
113119

114-
1. Go to the [Azure portal](https://portal.azure.com/).
115-
1. If you don't have a user-assigned managed identity for the project, [add one](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity).
116-
> [!NOTE]
117-
> You can use one of three options for identity: app registration, user-assigned managed identity, and system-assigned managed identity. App registration is the most secure option, and user-assigned managed identity is the second most secure. To use app registration, you need to have appropriate permissions. For more information see [Azure Resource Manager service connection special cases](/azure/devops/pipelines/library/azure-resource-manager-alternate-approaches).
120+
121+
118122
1. In the [Azure portal](https://portal.azure.com/), go to your Deployment Environments project.
119123
1. Select **Access control (IAM)** > **Add** > **Add role assignment**.
120124
1. On the **Role** tab, select **Deployment Environments User** in the list of job function roles.

0 commit comments

Comments
 (0)