You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-signalr/includes/signalr-add-role-assignments.md
+15-6Lines changed: 15 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,14 +9,14 @@ ms.author: tefa
9
9
ms.custom: include file
10
10
---
11
11
12
-
The following steps describe how to assign a SignalR App Server role to a service principal over an Azure SignalR Service resource. For detailed steps, see [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal.yml).
12
+
The following steps describe how to assign a **SignalR App Server** role to a service principal or a managed identity for an Azure SignalR Service resource. For detailed steps, see [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal.yml).
13
13
14
14
> [!NOTE]
15
15
> A role can be assigned to any scope, including management group, subscription, resource group, or single resource. To learn more about scope, see [Understand scope for Azure RBAC](../role-based-access-control/scope-overview.md).
16
16
17
17
1. In the [Azure portal](https://portal.azure.com/), go to your Azure SignalR Service resource.
18
18
19
-
1. Select **Access control (IAM)**.
19
+
1. Select **Access control (IAM)** in the sidebar.
20
20
21
21
1. Select **Add** > **Add role assignment**.
22
22
@@ -31,15 +31,24 @@ The following steps describe how to assign a SignalR App Server role to a servic
31
31
|[SignalR REST API Owner](/azure/role-based-access-control/built-in-roles.md#signalr-rest-api-owner)| Full access to data-plane REST APIs. | For using [Azure SignalR Management SDK](/azure/azure-signalr/signalr-howto-use-management-sdk) to manage connections and groups, but does **NOT** make server connections or handle negotiation requests. |
32
32
|[SignalR REST API Reader](/azure/role-based-access-control/built-in-roles.md#signalr-rest-api-reader)| Read-only access to data-plane REST APIs. | Use it when write a monitoring tool that calls readonly REST APIs. |
33
33
34
+
1. click Next.
34
35
35
-
1.On the **Members** tab, select **User, group, or service principal**, and then choose **Select members**.
36
+
1.For Microsoft entra application.
36
37
37
-
1. Search for and select the application to which you want to assign the role.
38
+
1. In the `Assign access` to row, select **User, group, or service principal**.
39
+
1. In the `Members` row, click `select members`, then choose the identity in the pop-up window.
38
40
39
-
1. On the **Review + assign** tab, select **Review + assign** to assign the role.
41
+
1. For managed identity for Azure resources.
42
+
43
+
1. In the `Assign access` to row, select **Managed identity**.
44
+
1. In the `Members` row, click `select members`, then choose the application in the pop-up window.
45
+
46
+
1. click Next.
47
+
48
+
1. Review your assignment, then click **Review + assign** to confirm the role assignment.
40
49
41
50
> [!IMPORTANT]
42
-
> Azure role assignments might take up to 30 minutes to propagate.
51
+
> Newly added role assignments might take up to 30 minutes to propagate.
43
52
44
53
To learn more about how to assign and manage Azure roles, see these articles:
0 commit comments