You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/automation/automation-onboard-solutions-from-vm.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ First, enable one or all three of the solutions on your VM:
21
21
22
22
1. In the [Azure portal](https://portal.azure.com), select **Virtual machines** or search for and select **Virtual machines** from the Home page.
23
23
2. Select the VM for which you want to enable a solution.
24
-
3. On the VM page, under **Operations**, select **Update management**, **Inventory**, or **Change tracking**. The virtual machine can exist in any region, no matter the location of your Automation account. When onboarding a solution from a VM, you need to have the `Microsoft.OperationalInsights/workspaces/read` permission to determine if the VM is onboarded to a workspace. To learn about additional permissions that are required, see [permissions needed to onboard machines](automation-role-based-access-control.md#onboarding). To learn how to onboard multiple machines at once, see [Onboard Update Management, Change Tracking, and Inventory solutions](automation-onboard-solutions-from-automation-account.md).
24
+
3. On the VM page, under **Operations**, select **Update management**, **Inventory**, or **Change tracking**. The virtual machine can exist in any region, no matter the location of your Automation account. When onboarding a solution from a VM, you need to have the `Microsoft.OperationalInsights/workspaces/read` permission to determine if the VM is onboarded to a workspace. To learn about additional permissions that are required, see [permissions needed to onboard machines](automation-role-based-access-control.md#onboarding-permissions). To learn how to onboard multiple machines at once, see [Onboard Update Management, Change Tracking, and Inventory solutions](automation-onboard-solutions-from-automation-account.md).
25
25
26
26
4. Select the Azure Log Analytics workspace and Automation account, and then click **Enable** to enable the solution. The solution takes up to 15 minutes to enable.
Copy file name to clipboardExpand all lines: articles/automation/automation-quickstart-create-account.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ This quickstart guides you in creating an Automation account and running a runbo
25
25
> [!NOTE]
26
26
> You can't change the account name once it has been entered in the user interface.
27
27
28
-
2. Click the **Create a resource** button found on the upper left corner of Azure portal.
28
+
2. Click the **Create a resource** button found in the upper left corner of Azure portal.
29
29
30
30
3. Select **IT & Management Tools**, and then select **Automation**.
31
31
@@ -46,19 +46,19 @@ This quickstart guides you in creating an Automation account and running a runbo
46
46
47
47
Run one of the tutorial runbooks.
48
48
49
-
1. Click **Runbooks** under **PROCESS AUTOMATION**. The list of runbooks is displayed. By default several tutorial runbooks are enabled in the account.
49
+
1. Click **Runbooks** under **Process Automation**. The list of runbooks is displayed. By default, several tutorial runbooks are enabled in the account.
1. After the **Job status** becomes **Running**, click **Output** or **All Logs** to view the runbook job output. For this tutorial runbook, the output is a list of your Azure resources.
61
+
1. After the job status becomes `Running`, click **Output** or **All Logs** to view the runbook job output. For this tutorial runbook, the output is a list of your Azure resources.
Copy file name to clipboardExpand all lines: articles/automation/automation-role-based-access-control.md
+28-25Lines changed: 28 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,9 @@ ms.topic: conceptual
11
11
12
12
Role-based access control (RBAC) enables access management for Azure resources. Using [RBAC](../role-based-access-control/overview.md), you can segregate duties within your team and grant only the amount of access to users, groups, and applications that they need to perform their jobs. You can grant role-based access to users using the Azure portal, Azure Command-Line tools, or Azure Management APIs.
13
13
14
+
>[!NOTE]
15
+
>This article has been updated to use the new Azure PowerShell Az module. You can still use the AzureRM module, which will continue to receive bug fixes until at least December 2020. To learn more about the new Az module and AzureRM compatibility, see [Introducing the new Azure PowerShell Az module](https://docs.microsoft.com/powershell/azure/new-azureps-module-az?view=azps-3.5.0). For Az module installation instructions on your Hybrid Runbook Worker, see [Install the Azure PowerShell Module](https://docs.microsoft.com/powershell/azure/install-az-ps?view=azps-3.5.0). For your Automation account, you can update your modules to the latest version using [How to update Azure PowerShell modules in Azure Automation](automation-update-azure-modules.md).
16
+
14
17
## Roles in Automation accounts
15
18
16
19
In Azure Automation, access is granted by assigning the appropriate RBAC role to users, groups, and applications at the Automation account scope. Following are the built-in roles supported by an Automation account:
@@ -198,11 +201,11 @@ A User Access Administrator can manage user access to Azure resources. The follo
198
201
|Microsoft.Authorization/*|Manage authorization|
199
202
|Microsoft.Support/*|Create and manage support tickets|
200
203
201
-
## Onboarding
204
+
## Onboarding permissions
202
205
203
-
The following tables show the minimum required permissions needed for onboarding virtual machines for the change tracking or update management solutions.
206
+
The following sections describe the minimum required permissions needed for onboarding virtual machines for the change tracking or update management solutions.
204
207
205
-
### Onboarding from a virtual machine
208
+
### Permissions for onboarding from a VM
206
209
207
210
|**Action**|**Permission**|**Minimum scope**|
208
211
|---------|---------|---------|
@@ -224,7 +227,7 @@ The following tables show the minimum required permissions needed for onboarding
224
227
225
228
<sup>1</sup> This permission is needed to onboard through the VM portal experience.
226
229
227
-
### Onboarding from Automation account
230
+
### Permissions for onboarding from Automation account
228
231
229
232
|**Action**|**Permission**|**Minimum Scope**|
230
233
|---------|---------|---------|
@@ -244,7 +247,7 @@ The following tables show the minimum required permissions needed for onboarding
Update management reaches across multiple services to provide its service. The following table shows the permissions needed to manage update management deployments:
250
253
@@ -259,12 +262,12 @@ Update management reaches across multiple services to provide its service. The f
259
262
260
263
## Configure RBAC for your Automation account
261
264
262
-
The following section shows you how to configure RBAC on your Automation account through the [portal](#configure-rbac-using-the-azure-portal) and [PowerShell](#configure-rbac-using-powershell).
265
+
The following section shows you how to configure RBAC on your Automation account through the [Azure portal](#configure-rbac-using-the-azure-portal) and [PowerShell](#configure-rbac-using-powershell).
263
266
264
267
### Configure RBAC using the Azure portal
265
268
266
269
1. Log in to the [Azure portal](https://portal.azure.com/) and open your Automation account from the Automation Accounts page.
267
-
2. Click on the **Access control (IAM)** control at the top left corner to open the Access control (IAM) page. You can use this page to add new users, groups, and applications to manage your Automation account and view existing roles that are configurable for the Automation account.
270
+
2. Click on **Access control (IAM)** to open the Access control (IAM) page. You can use this page to add new users, groups, and applications to manage your Automation account and view existing roles that are configurable for the Automation account.
@@ -275,7 +278,7 @@ The following section shows you how to configure RBAC on your Automation account
275
278
276
279
2. Select a role from the list of available roles. You can choose any of the available built-in roles that an Automation account supports or any custom role you may have defined.
277
280
278
-
3. Type the username of the user that you want to give permissions to in the **Select** field. Choose the user from the list and click **Save**.
281
+
3. Type the name of the user that you want to give permissions to in the **Select** field. Choose the user from the list and click **Save**.
@@ -305,10 +308,10 @@ You can remove the access permission for a user who is not managing the Automati
305
308
306
309
You can also configure role-based access to an Automation account using the following [Azure PowerShell cmdlets](../role-based-access-control/role-assignments-powershell.md):
307
310
308
-
[Get-AzureRmRoleDefinition](/previous-versions/azure/mt603792(v=azure.100)) lists all RBAC roles that are available in Azure Active Directory. You can use this cmdlet with the *Name* parameter to list all the actions that a specific role can perform.
311
+
[Get-AzRoleDefinition](https://docs.microsoft.com/powershell/module/Az.Resources/Get-AzRoleDefinition?view=azps-3.7.0) lists all RBAC roles that are available in Azure Active Directory. You can use this cmdlet with the `Name` parameter to list all the actions that a specific role can perform.
[Get-AzureRmRoleAssignment](/previous-versions/azure/mt619413(v=azure.100)) lists Azure AD RBAC role assignments at the specified scope. Without any parameters, this cmdlet returns all the role assignments made under the subscription. Use the *ExpandPrincipalGroups* parameter to list access assignments for the specified user, as well as the groups that the user belongs to.
330
+
[Get-AzRoleAssignment](https://docs.microsoft.com/powershell/module/az.resources/get-azroleassignment?view=azps-3.7.0) lists Azure AD RBAC role assignments at the specified scope. Without any parameters, this cmdlet returns all the role assignments made under the subscription. Use the `ExpandPrincipalGroups` parameter to list access assignments for the specified user, as well as the groups that the user belongs to.
328
331
329
332
**Example:** Use the following cmdlet to list all the users and their roles within an Automation account.
330
333
331
334
```azurepowershell-interactive
332
-
Get-AzureRMRoleAssignment -scope '/subscriptions/<SubscriptionID>/resourcegroups/<Resource Group Name>/Providers/Microsoft.Automation/automationAccounts/<Automation account name>'
335
+
Get-AzRoleAssignment -Scope '/subscriptions/<SubscriptionID>/resourcegroups/<Resource Group Name>/Providers/Microsoft.Automation/automationAccounts/<Automation account name>'
Use [New-AzureRmRoleAssignment](/previous-versions/azure/mt603580(v=azure.100)) to assign access to users, groups, and applications to a particular scope.
352
+
Use [New-AzRoleAssignment](https://docs.microsoft.com/powershell/module/Az.Resources/New-AzRoleAssignment?view=azps-3.7.0) to assign access to users, groups, and applications to a particular scope.
350
353
351
354
**Example:** Use the following command to assign the "Automation Operator" role for a user in the Automation account scope.
352
355
353
356
```azurepowershell-interactive
354
-
New-AzureRmRoleAssignment -SignInName <sign-in Id of a user you wish to grant access> -RoleDefinitionName 'Automation operator' -Scope '/subscriptions/<SubscriptionID>/resourcegroups/<Resource Group Name>/Providers/Microsoft.Automation/automationAccounts/<Automation account name>'
357
+
New-AzRoleAssignment -SignInName <sign-in Id of a user you wish to grant access> -RoleDefinitionName 'Automation operator' -Scope '/subscriptions/<SubscriptionID>/resourcegroups/<Resource Group Name>/Providers/Microsoft.Automation/automationAccounts/<Automation account name>'
Use [Remove-AzureRmRoleAssignment](/previous-versions/azure/mt603781(v=azure.100)) to remove access of a specified user, group, or application from a particular scope.
374
+
Use [Remove-AzRoleAssignment](https://docs.microsoft.com/powershell/module/Az.Resources/Remove-AzRoleAssignment?view=azps-3.7.0) to remove access of a specified user, group, or application from a particular scope.
372
375
373
-
**Example:** Use the following command to remove the user from the “Automation Operator” role in the Automation account scope.
376
+
**Example:** Use the following command to remove the user from the Automation Operator role in the Automation account scope.
374
377
375
378
```azurepowershell-interactive
376
-
Remove-AzureRmRoleAssignment -SignInName <sign-in Id of a user you wish to remove> -RoleDefinitionName 'Automation Operator' -Scope '/subscriptions/<SubscriptionID>/resourcegroups/<Resource Group Name>/Providers/Microsoft.Automation/automationAccounts/<Automation account name>'
379
+
Remove-AzRoleAssignment -SignInName <sign-in Id of a user you wish to remove> -RoleDefinitionName 'Automation Operator' -Scope '/subscriptions/<SubscriptionID>/resourcegroups/<Resource Group Name>/Providers/Microsoft.Automation/automationAccounts/<Automation account name>'
377
380
```
378
381
379
-
In the preceding examples, replace "sign-in ID of a user you wish to remove", "SubscriptionID", "Resource Group Name", and Automation account name" with your account details. Choose **yes** when prompted to confirm before continuing to remove user role assignments.
382
+
In the preceding example, replace `sign-in ID of a user you wish to remove`, `SubscriptionID`, `Resource Group Name`, and `Automation account name` with your account details. Choose **yes** when prompted to confirm before continuing to remove user role assignments.
380
383
381
-
### User experience for Automation operator role - Automation account
384
+
### User experience for Automation Operator role - Automation account
382
385
383
386
When a user assigned to the Automation Operator role on the Automation account scope views the Automation account to which he/she is assigned, the user can only view the list of runbooks, runbook jobs, and schedules created in the Automation account. This user cannot view the definitions of these items. The user can start, stop, suspend, resume, or schedule the runbook job. However, the user does not have access to other Automation resources, such as configurations, hybrid worker groups, or DSC nodes.
384
387
385
388

386
389
387
390
## Configure RBAC for runbooks
388
391
389
-
Azure Automation allows you to assign RBAC to specific runbooks. To do this, run the following script to add a user to a specific runbook. An Automation Account Admin or a Tenant Admin can run this script.
392
+
Azure Automation allows you to assign RBAC to specific runbooks. To do this, run the following script to add a user to a specific runbook. An Automation Account Administrator or a Tenant Administrator can run this script.
390
393
391
394
```azurepowershell-interactive
392
395
$rgName = "<Resource Group Name>" # Resource Group name for the Automation account
@@ -395,19 +398,19 @@ $rbName = "<Name of Runbook>" # Name of the runbook
395
398
$userId = "<User ObjectId>" # Azure Active Directory (AAD) user's ObjectId from the directory
Once the script has run, have the user log in to the Azure portal and view**All Resources**. In the list, the user can see the runbook for which he/she has been added as an Automation Runbook Operator.
413
+
Once the script has run, have the user log in to the Azure portal and select**All Resources**. In the list, the user can see the runbook for which he/she has been added as an Automation Runbook Operator.
411
414
412
415

0 commit comments