Skip to content

Commit 159add0

Browse files
Merge pull request #228300 from jaesoni/vnet-perm-check-revision
Article revision for vnet permission changes
2 parents d1df133 + f2039d6 commit 159add0

File tree

1 file changed

+18
-12
lines changed

1 file changed

+18
-12
lines changed

articles/application-gateway/configuration-infrastructure.md

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: conceptual
8-
ms.date: 09/13/2022
8+
ms.date: 02/23/2023
99
ms.author: greglin
1010
---
1111

@@ -55,22 +55,28 @@ Subnet Size /24 = 256 IP addresses - 5 reserved from the platform = 251 availabl
5555
> It is possible to change the subnet of an existing Application Gateway within the same virtual network. You can do this using Azure PowerShell or Azure CLI. For more information, see [Frequently asked questions about Application Gateway](application-gateway-faq.yml#can-i-change-the-virtual-network-or-subnet-for-an-existing-application-gateway)
5656
5757
### Virtual network permission
58+
Since application gateway resources are deployed within a virtual network, Application Gateway performs a check to verify the permission on the provided virtual network resource. This validation is performed during both creation and management operations.
5859

59-
Since application gateway resources are deployed within a virtual network resource, Application Gateway performs a check to verify the permission on the provided virtual network resource. This is verified during both create and manage operations.
60+
You should check your [Azure role-based access control](../role-based-access-control/role-assignments-list-portal.md) to verify the users or service principals that operate application gateways have at least **Microsoft.Network/virtualNetworks/subnets/join/action** permission. Use built-in roles, such as [Network contributor](../role-based-access-control/built-in-roles.md#network-contributor), which already support this permission. If a built-in role doesn't provide the right permission, you can [create and assign a custom role](../role-based-access-control/custom-roles-portal.md). Learn more about [managing subnet permissions](../virtual-network/virtual-network-manage-subnet.md#permissions). You may have to allow sufficient time for [Azure Resource Manager cache refresh](../role-based-access-control/troubleshooting.md?tabs=bicep#symptom---role-assignment-changes-are-not-being-detected) after role assignment changes.
6061

61-
You should check your [Azure role-based access control](../role-based-access-control/role-assignments-list-portal.md) to verify that users or Service Principals who operate application gateways have at least **Microsoft.Network/virtualNetworks/subnets/join/action** or some higher permission such as the built-in [Network contributor](../role-based-access-control/built-in-roles.md) role on the virtual network. Visit [Add, change, or delete a virtual network subnet](../virtual-network/virtual-network-manage-subnet.md) to know more on subnet permissions.
62+
#### Identifying affected users or service principals for your subscription
63+
By visiting Azure Advisor for your account, you can verify if your subscription has any users or service principals with insufficient permission. The details of that recommendation are as follows:
6264

63-
If a [built-in](../role-based-access-control/built-in-roles.md) role doesn't provide the right permission, you can [create and assign a custom role](../role-based-access-control/custom-roles-portal.md) for this purpose. Also, [allow sufficient time](../role-based-access-control/troubleshooting.md?tabs=bicep#symptom---role-assignment-changes-are-not-being-detected) after you make changes to a role assignments.
65+
**Title**: Update VNet permission of Application Gateway users </br>
66+
**Category**: Reliability </br>
67+
**Impact**: High </br>
68+
69+
#### Using temporary Azure Feature Exposure Control (AFEC) flag
70+
71+
As a temporary extension, we have introduced a subscription-level [Azure Feature Exposure Control (AFEC)](../azure-resource-manager/management/preview-features.md?tabs=azure-portal) that you can register for, until you fix the permissions for all your users and/or service principals. [Set up this flag](../azure-resource-manager/management/preview-features.md?#required-access) for your Azure subscription.
72+
73+
**Name**: Microsoft.Network/DisableApplicationGatewaySubnetPermissionCheck </br>
74+
**Description**: Disable Application Gateway Subnet Permission Check </br>
75+
**ProviderNamespace**: Microsoft.Network </br>
76+
**EnrollmentType**: AutoApprove </br>
6477

6578
> [!NOTE]
66-
> As a temporary extension, we have introduced a subscription-level [Azure Feature Exposure Control (AFEC)](../azure-resource-manager/management/preview-features.md?tabs=azure-portal) flag to help you fix the permissions for all your users and/or service principals' permissions. Register for this interim feature on your own through a subscription owner, contributor, or custom role. </br>
67-
>
68-
> "**name**": "Microsoft.Network/DisableApplicationGatewaySubnetPermissionCheck", </br>
69-
> "**description**": "Disable Application Gateway Subnet Permission Check", </br>
70-
> "**providerNamespace**": "Microsoft.Network", </br>
71-
> "**enrollmentType**": "AutoApprove" </br>
72-
>
73-
> The provision to circumvent the virtual network permission check by using this feature control is **available only for a limited period, until 6th April 2023**. Ensure all the roles and permissions managing Application Gateways are updated by then, as there will be no further extensions. [Set up this flag in your Azure subscription](../azure-resource-manager/management/preview-features.md?tabs=azure-portal).
79+
> The provision to circumvent the virtual network permission check by using this feature control (AFEC) is available only for a limited period, **until 6th April 2023**. Ensure all the roles and permissions managing Application Gateways are updated by then, as there will be no further extensions. Set up this flag in your Azure subscription.
7480
7581
## Network security groups
7682

0 commit comments

Comments
 (0)