Skip to content

Commit 14aa331

Browse files
authored
update
1 parent 0125883 commit 14aa331

File tree

1 file changed

+15
-6
lines changed

1 file changed

+15
-6
lines changed

articles/azure-signalr/includes/signalr-add-role-assignments.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@ ms.author: tefa
99
ms.custom: include file
1010
---
1111

12-
The following steps describe how to assign a SignalR App Server role to a service principal over an Azure SignalR Service resource. For detailed steps, see [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal.yml).
12+
The following steps describe how to assign a **SignalR App Server** role to a service principal or a managed identity for an Azure SignalR Service resource. For detailed steps, see [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal.yml).
1313

1414
> [!NOTE]
1515
> A role can be assigned to any scope, including management group, subscription, resource group, or single resource. To learn more about scope, see [Understand scope for Azure RBAC](../role-based-access-control/scope-overview.md).
1616
1717
1. In the [Azure portal](https://portal.azure.com/), go to your Azure SignalR Service resource.
1818

19-
1. Select **Access control (IAM)**.
19+
1. Select **Access control (IAM)** in the sidebar.
2020

2121
1. Select **Add** > **Add role assignment**.
2222

@@ -31,15 +31,24 @@ The following steps describe how to assign a SignalR App Server role to a servic
3131
| [SignalR REST API Owner](/azure/role-based-access-control/built-in-roles.md#signalr-rest-api-owner) | Full access to data-plane REST APIs. | For using [Azure SignalR Management SDK](/azure/azure-signalr/signalr-howto-use-management-sdk) to manage connections and groups, but does **NOT** make server connections or handle negotiation requests. |
3232
| [SignalR REST API Reader](/azure/role-based-access-control/built-in-roles.md#signalr-rest-api-reader) | Read-only access to data-plane REST APIs. | Use it when write a monitoring tool that calls readonly REST APIs. |
3333

34+
1. click Next.
3435

35-
1. On the **Members** tab, select **User, group, or service principal**, and then choose **Select members**.
36+
1. For Microsoft entra application.
3637

37-
1. Search for and select the application to which you want to assign the role.
38+
1. In the `Assign access` to row, select **User, group, or service principal**.
39+
1. In the `Members` row, click `select members`, then choose the identity in the pop-up window.
3840

39-
1. On the **Review + assign** tab, select **Review + assign** to assign the role.
41+
1. For managed identity for Azure resources.
42+
43+
1. In the `Assign access` to row, select **Managed identity**.
44+
1. In the `Members` row, click `select members`, then choose the application in the pop-up window.
45+
46+
1. click Next.
47+
48+
1. Review your assignment, then click **Review + assign** to confirm the role assignment.
4049

4150
> [!IMPORTANT]
42-
> Azure role assignments might take up to 30 minutes to propagate.
51+
> Newly added role assignments might take up to 30 minutes to propagate.
4352
4453
To learn more about how to assign and manage Azure roles, see these articles:
4554

0 commit comments

Comments
 (0)