You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/deployment-environments/quickstart-create-and-configure-devcenter.md
+24-15Lines changed: 24 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ The following diagram shows the steps you perform in this quickstart to configur
23
23
First, you create a dev center to organize your deployment environments resources. Next, you create a key vault to store the GitHub personal access token (PAT) that is used to grant Azure access to your GitHub repository. Then, you attach an identity to the dev center and assign that identity access to the key vault. Then, you add a catalog that stores your IaC templates to the dev center. Finally, you create environment types to define the types of environments that development teams can create.
24
24
25
25
26
-
The following diagram shows the steps you perform in the [Create and configure a project quickstart](quickstart-create-and-configure-projects.md)to configure a project associated with a dev center for Deployment Environments.
26
+
The following diagram shows the remaining steps you must perform before you can create a deployment environment. You perform these steps in the [Create and configure a project quickstart](quickstart-create-and-configure-projects.md)
27
27
28
28
:::image type="content" source="media/quickstart-create-and-configure-devcenter/dev-box-build-stages-1b.png" alt-text="Diagram showing the stages required to configure a project for Deployment Environments.":::
29
29
@@ -143,11 +143,11 @@ Using an authentication token like a GitHub PAT enables you to share your reposi
143
143
- Select **Create**.
144
144
1. Leave this tab open, you need to come back to the Key Vault later.
145
145
146
-
## Attach an identity to the dev center
146
+
## Configure a managed identity for the dev center
147
147
148
148
After you create a dev center, attach an [identity](concept-environments-key-concepts.md#identities) to the dev center. You can attach either a system-assigned managed identity or a user-assigned managed identity. Learn about the two [types of identities](how-to-configure-managed-identity.md#add-a-managed-identity).
149
149
150
-
In this quickstart, you configure a system-assigned managed identity for your dev center.
150
+
In this quickstart, you configure a system-assigned managed identity for your dev center. You then assign roles to the managed identity to allow the dev center to create environment types in your subscription and read the key vault secret that contains the GitHub PAT.
151
151
152
152
### Attach a system-assigned managed identity
153
153
@@ -161,23 +161,32 @@ To attach a system-assigned managed identity to your dev center:
161
161
162
162
1. In the **Enable system assigned managed identity** dialog, select **Yes**.
163
163
164
-
### Assign the system-assigned managed identity access to the key vault secret
165
-
Make sure that the identity has access to the key vault secret that contains the personal access token to access your repository. Key Vaults support two methods of access; Azure role-based access control (RBAC) or Vault access policy. In this quickstart, you use an RBAC key vault.
164
+
### Assign roles for the dev center managed identity
166
165
167
-
Configure vault access:
168
-
1. In the Azure portal, go to the key vault that contains the secret with the personal access token.
166
+
Before you can create environment types, you must give the managed identity that represents your dev center access to the subscriptions where you configure the [project environment types](concept-environments-key-concepts.md#project-environment-types). You must also give the managed identity access to the key vault secret that stores your GitHub PAT.
169
167
170
-
1. In the left menu, select **Access control (IAM)**.
168
+
1. Navigate to your dev center.
169
+
1. On the left menu under Settings, select **Identity**.
170
+
1. Under System assigned > Permissions, select **Azure role assignments**.
171
171
172
-
1. Select **Add** > **Add role assignment**.
172
+
:::image type="content" source="media/quickstart-create-configure-projects/system-assigned-managed-identity.png" alt-text="Screenshot that shows a system-assigned managed identity with Role assignments highlighted.":::
173
173
174
-
1.Assign the following role. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
174
+
1.To give access to the subscription, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
|**Members**| Select the dev center managed identity that you created in [Attach a system-assigned managed identity](#attach-a-system-assigned-managed-identity). |
176
+
|Name |Value |
177
+
|---------|----------|
178
+
|**Scope**|Subscription|
179
+
|**Subscription**|Select the subscription in which to use the managed identity.|
180
+
|**Role**|Owner|
181
+
182
+
1. To give access to the key vault, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
183
+
184
+
|Name |Value |
185
+
|---------|----------|
186
+
|**Scope**|Key Vault|
187
+
|**Subscription**|Select the subscription in which to use the managed identity.|
188
+
|**Resource**|Select the key vault that you created earlier.|
189
+
|**Role**|Key Vault Secrets User|
181
190
182
191
## Add a catalog to the dev center
183
192
Azure Deployment Environments supports attaching Azure DevOps repositories and GitHub repositories. You can store a set of curated IaC templates in a repository. Attaching the repository to a dev center as a catalog gives your development teams access to the templates and enables them to quickly create consistent environments.
Copy file name to clipboardExpand all lines: articles/deployment-environments/quickstart-create-and-configure-projects.md
+2-21Lines changed: 2 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,26 +65,7 @@ To create a project in your dev center:
65
65
66
66
:::image type="content" source="media/quickstart-create-configure-projects/created-project.png" alt-text="Screenshot that shows the project overview pane.":::
67
67
68
-
### Assign a managed identity the owner role to the subscription
69
-
Before you can create environment types, you must give the managed identity that represents your dev center access to the subscriptions where you configure the [project environment types](concept-environments-key-concepts.md#project-environment-types).
70
-
71
-
In this quickstart you assign the Owner role to the system-assigned managed identity that you configured previously: [Attach a system-assigned managed identity](quickstart-create-and-configure-devcenter.md#attach-a-system-assigned-managed-identity).
72
-
73
-
1. Navigate to your dev center.
74
-
1. On the left menu under Settings, select **Identity**.
75
-
1. Under System assigned > Permissions, select **Azure role assignments**.
76
-
77
-
:::image type="content" source="media/quickstart-create-configure-projects/system-assigned-managed-identity.png" alt-text="Screenshot that shows a system-assigned managed identity with Role assignments highlighted.":::
78
-
79
-
1. In Azure role assignments, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
80
-
81
-
|Name |Value |
82
-
|---------|----------|
83
-
|**Scope**|Subscription|
84
-
|**Subscription**|Select the subscription in which to use the managed identity.|
85
-
|**Role**|Owner|
86
-
87
-
## Configure a project
68
+
## Create a project environment type
88
69
89
70
To configure a project, add a [project environment type](how-to-configure-project-environment-types.md):
90
71
@@ -110,7 +91,7 @@ To configure a project, add a [project environment type](how-to-configure-projec
110
91
> [!NOTE]
111
92
> At least one identity (system-assigned or user-assigned) must be enabled for deployment identity. The identity is used to perform the environment deployment on behalf of the developer. Additionally, the identity attached to the dev center should be [assigned the Owner role](how-to-configure-managed-identity.md) for access to the deployment subscription for each environment type.
0 commit comments