Skip to content

Commit 298f879

Browse files
Merge pull request #276662 from AaronMaxwell/aaronmax-entra-update-pr-build-fix
PR build error fixes
2 parents bee93a1 + 5745754 commit 298f879

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

articles/azure-monitor/app/azure-ad-authentication.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The following preliminary steps are required to enable Microsoft Entra authentic
2525
- [Managed identity](../../active-directory/managed-identities-azure-resources/overview.md).
2626
- [Service principal](../../active-directory/develop/howto-create-service-principal-portal.md).
2727
- [Assigning Azure roles](../../role-based-access-control/role-assignments-portal.yml).
28-
- Have an Owner role to the resource group to grant access by using [Azure built-in roles](../../role-based-access-control/built-in-roles.md).
28+
- Granting access using [Azure built-in roles](../../role-based-access-control/built-in-roles.md) requires having an Owner role to the resource group.
2929
- Understand the [unsupported scenarios](#unsupported-scenarios).
3030

3131
## Unsupported scenarios
@@ -53,9 +53,9 @@ The following Software Development Kits (SDKs) and features are unsupported for
5353

5454
For more information on how to create a Microsoft Entra application and service principal that can access resources, see [Create a service principal](../../active-directory/develop/howto-create-service-principal-portal.md).
5555

56-
1. Assign a role to the Azure service.
56+
1. Assign the required RBAC role to the Azure identity, service principal, or Azure user account.
5757

58-
Follow the steps in [Assign Azure roles](../../role-based-access-control/role-assignments-portal.yml) to add the Monitoring Metrics Publisher role from the target Application Insights resource to the Azure resource from which the telemetry is sent.
58+
Follow the steps in [Assign Azure roles](../../role-based-access-control/role-assignments-portal.yml) to add the Monitoring Metrics Publisher role to the expected identity, service principal, or Azure user account by setting the target Application Insights resource as the role scope.
5959

6060
> [!NOTE]
6161
> Although the Monitoring Metrics Publisher role says "metrics," it will publish all telemetry to the Application Insights resource.
@@ -70,6 +70,7 @@ The following Software Development Kits (SDKs) and features are unsupported for
7070
Application Insights .NET SDK supports the credential classes provided by [Azure Identity](https://github.com/Azure/azure-sdk-for-net/tree/master/sdk/identity/Azure.Identity#credential-classes).
7171

7272
- We recommend `DefaultAzureCredential` for local development.
73+
- Ensure you're authenticated on Visual Studio with the expected Azure user account. For more information, see [Authenticate via Visual Studio](https://github.com/Azure/azure-sdk-for-net/tree/main/sdk/identity/Azure.Identity#authenticate-via-visual-studio).
7374
- We recommend `ManagedIdentityCredential` for system-assigned and user-assigned managed identities.
7475
- For system-assigned, use the default constructor without parameters.
7576
- For user-assigned, provide the client ID to the constructor.

0 commit comments

Comments
 (0)