Skip to content

Commit 27a6164

Browse files
committed
edits
1 parent 3728bb9 commit 27a6164

File tree

1 file changed

+27
-19
lines changed

1 file changed

+27
-19
lines changed

articles/deployment-environments/how-to-configure-managed-identity.md

Lines changed: 27 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,10 @@ ms.service: azure-deployment-environments
66
ms.custom: build-2023
77
author: RoseHJM
88
ms.author: rosemalcolm
9-
ms.date: 12/04/2023
9+
ms.date: 03/17/2025
1010
ms.topic: how-to
11+
12+
#customer intent: As a platform engineer, I want to configure a managed identity for a dev center so that I can enable secure deployment for my development teams.
1113
---
1214

1315
# Configure a managed identity for a dev center
@@ -18,24 +20,29 @@ Azure Deployment Environments uses managed identities to give development teams
1820

1921
The managed identity attached to a dev center should be [assigned both the Contributor role and the User Access Administrator role](#assign-a-subscription-role-assignment) in the deployment subscriptions for each environment type. When an environment deployment is requested, the service grants appropriate permissions to the deployment identities that are set up for the environment type to deploy on behalf of the user. The managed identity attached to a dev center also is used to add to a [catalog](how-to-configure-catalog.md) and access [environment definitions](configure-environment-definition.md) in the catalog.
2022

23+
## Prerequisites
24+
25+
- A [dev center](how-to-create-configure-dev-center.md).
26+
2127
## Add a managed identity
2228

2329
In Azure Deployment Environments, you can choose between two types of managed identities:
2430

2531
- **System-assigned identity**: A system-assigned identity is tied either to your dev center or to the project environment type. A system-assigned identity is deleted when the attached resource is deleted. A dev center or a project environment type can have only one system-assigned identity.
2632
- **User-assigned identity**: A user-assigned identity is a standalone Azure resource that you can assign to your dev center or to a project environment type. For Azure Deployment Environments, a dev center or a project environment type can have only one user-assigned identity.
2733

28-
As a security best practice, if you choose to use user-assigned identities, use different identities for your project and for your dev center. Project identities should have more limited access to resources compared to a dev center.
34+
As a security best practice, if you choose to use user-assigned identities, use different identities for your project and for your dev center. Project identities should have more limited access to resources than dev centers.
2935

3036
> [!NOTE]
3137
> In Azure Deployment Environments, if you add both a system-assigned identity and a user-assigned identity, only the user-assigned identity is used.
3238
3339
### Add a system-assigned managed identity
3440

3541
1. Sign in to the [Azure portal](https://portal.azure.com) and go to Azure Deployment Environments.
36-
1. On **Dev centers**, select your dev center.
37-
1. On the left menu under **Settings**, select **Identity**.
38-
1. Under **System assigned**, set **Status** to **On**.
42+
1. In the left menu, select **Dev centers**.
43+
1. On the **Dev centers** page, select your dev center.
44+
1. In the left menu, under **Settings**, select **Identity**.
45+
1. On the **System assigned** tab, set **Status** to **On**.
3946
1. Select **Save**.
4047

4148
:::image type="content" source="media/configure-managed-identity/configure-system-assigned-managed-identity.png" alt-text="Screenshot that shows the system-assigned managed identity." lightbox="media/configure-managed-identity/configure-system-assigned-managed-identity.png":::
@@ -45,9 +52,10 @@ As a security best practice, if you choose to use user-assigned identities, use
4552
### Add a user-assigned managed identity
4653

4754
1. Sign in to the [Azure portal](https://portal.azure.com) and go to Azure Deployment Environments.
48-
1. On **Dev centers**, select your dev center.
49-
1. On the left menu under **Settings**, select **Identity**.
50-
1. Under **User assigned**, select **Add** to attach an existing identity.
55+
1. In the left menu, select **Dev centers**.
56+
1. On the **Dev centers** page, select your dev center.
57+
1. On the left menu, under **Settings**, select **Identity**.
58+
1. On the **User assigned** tab, select **Add** to attach an existing identity.
5159

5260
:::image type="content" source="media/configure-managed-identity/configure-user-assigned-managed-identity.png" alt-text="Screenshot that shows the user-assigned managed identity." lightbox="media/configure-managed-identity/configure-user-assigned-managed-identity.png":::
5361

@@ -59,25 +67,25 @@ As a security best practice, if you choose to use user-assigned identities, use
5967

6068
## Assign a subscription role assignment
6169

62-
The identity attached to the dev center should be assigned the Contributor and User Access Administrator roles for all the deployment subscriptions and the Reader role for all subscriptions that contain the relevant project. When a user creates or deploys an environment, the service grants appropriate access to the deployment identity that's attached to the project environment type. The deployment identity uses the access to perform deployments on behalf of the user. You can use the managed identity to empower developers to create environments without granting them access to the subscription.
70+
The identity attached to the dev center should be assigned the Contributor and User Access Administrator roles for all the deployment subscriptions and the Reader role for all subscriptions that contain the relevant project. When a user creates or deploys an environment, the service grants appropriate access to the deployment identity that's attached to the project environment type. The deployment identity uses the access to perform deployments on behalf of the user. You can use the managed identity to enable developers to create environments without granting them access to the subscription.
6371

6472
### Add a role assignment to a system-assigned managed identity
6573

6674
1. In the Azure portal, navigate to your dev center in Azure Deployment Environments.
67-
1. On the left menu under **Settings**, select **Identity**.
75+
1. In the left menu, under **Settings**, select **Identity**.
6876
1. Under **System assigned** > **Permissions**, select **Azure role assignments**.
6977

7078
:::image type="content" source="media/configure-managed-identity/system-assigned-azure-role-assignment.png" alt-text="Screenshot that shows the Azure role assignment for system-assigned identity." lightbox="media/configure-managed-identity/system-assigned-azure-role-assignment.png":::
7179

72-
1. To give Contributor access to the subscription, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
80+
1. To grant Contributor access to the subscription, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
7381

7482
|Name |Value |
7583
|---------|----------|
7684
|**Scope**|Subscription|
7785
|**Subscription**|Select the subscription in which to use the managed identity.|
7886
|**Role**|Contributor|
7987

80-
1. To give User Access Administrator access to the subscription, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
88+
1. To grant User Access Administrator access to the subscription, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
8189

8290
|Name |Value |
8391
|---------|----------|
@@ -88,18 +96,18 @@ The identity attached to the dev center should be assigned the Contributor and U
8896
### Add a role assignment to a user-assigned managed identity
8997

9098
1. In the Azure portal, navigate to your dev center.
91-
1. On the left menu under **Settings**, select **Identity**.
99+
1. In the left menu, under **Settings**, select **Identity**.
92100
1. Under **User assigned**, select the identity.
93-
1. On the left menu, select **Azure role assignments**.
94-
1. To give Contributor access to the subscription, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
101+
1. In the left menu, select **Azure role assignments**.
102+
1. To grant Contributor access to the subscription, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
95103

96104
|Name |Value |
97105
|---------|----------|
98106
|**Scope**|Subscription|
99107
|**Subscription**|Select the subscription in which to use the managed identity.|
100108
|**Role**|Contributor|
101109

102-
1. To give User Access Administrator access to the subscription, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
110+
1. To grant User Access Administrator access to the subscription, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
103111

104112
|Name |Value |
105113
|---------|----------|
@@ -119,7 +127,7 @@ You can set up your key vault to use either a [key vault access policy](/azure/k
119127
If the key vault is configured to use a key vault access policy:
120128

121129
1. In the Azure portal, go to the key vault that contains the secret with the personal access token.
122-
1. On the left menu, select **Access policies**, and then select **Create**.
130+
1. In the left menu, select **Access policies**, and then select **Create**.
123131
1. On **Create an access policy**, enter or select the following information:
124132

125133
1. On the **Permissions** tab, under **Secret permissions**, select the **Get** checkbox, and then select **Next**.
@@ -131,8 +139,8 @@ If the key vault is configured to use a key vault access policy:
131139
If the key vault is configured to use Azure role-based access control:
132140

133141
1. In the Azure portal, go to the key vault that contains the secret with the personal access token.
134-
1. On the left menu, select **Access control (IAM)**.
135-
1. Select the identity, and in the left menu, select **Azure role assignments**.
142+
1. In the left menu, select **Access control (IAM)**.
143+
1. Select the identity, and, in the left menu, select **Azure role assignments**.
136144
1. Select **Add role assignment**, and then enter or select the following information:
137145

138146
1. For **Scope**, select the key vault.

0 commit comments

Comments
 (0)