Skip to content

Commit 3c9f151

Browse files
author
RoseHJM
committed
Updated sequence for assigning roles to managed identity & images.
1 parent bb56873 commit 3c9f151

File tree

6 files changed

+26
-36
lines changed

6 files changed

+26
-36
lines changed
-3.93 KB
Loading
24.6 KB
Loading
-3.92 KB
Loading
27.9 KB
Loading

articles/deployment-environments/quickstart-create-and-configure-devcenter.md

Lines changed: 24 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The following diagram shows the steps you perform in this quickstart to configur
2323
First, you create a dev center to organize your deployment environments resources. Next, you create a key vault to store the GitHub personal access token (PAT) that is used to grant Azure access to your GitHub repository. Then, you attach an identity to the dev center and assign that identity access to the key vault. Then, you add a catalog that stores your IaC templates to the dev center. Finally, you create environment types to define the types of environments that development teams can create.
2424

2525

26-
The following diagram shows the steps you perform in the [Create and configure a project quickstart](quickstart-create-and-configure-projects.md) to configure a project associated with a dev center for Deployment Environments.
26+
The following diagram shows the remaining steps you must perform before you can create a deployment environment. You perform these steps in the [Create and configure a project quickstart](quickstart-create-and-configure-projects.md)
2727

2828
:::image type="content" source="media/quickstart-create-and-configure-devcenter/dev-box-build-stages-1b.png" alt-text="Diagram showing the stages required to configure a project for Deployment Environments.":::
2929

@@ -143,11 +143,11 @@ Using an authentication token like a GitHub PAT enables you to share your reposi
143143
- Select **Create**.
144144
1. Leave this tab open, you need to come back to the Key Vault later.
145145

146-
## Attach an identity to the dev center
146+
## Configure a managed identity for the dev center
147147

148148
After you create a dev center, attach an [identity](concept-environments-key-concepts.md#identities) to the dev center. You can attach either a system-assigned managed identity or a user-assigned managed identity. Learn about the two [types of identities](how-to-configure-managed-identity.md#add-a-managed-identity).
149149

150-
In this quickstart, you configure a system-assigned managed identity for your dev center.
150+
In this quickstart, you configure a system-assigned managed identity for your dev center. You then assign roles to the managed identity to allow the dev center to create environment types in your subscription and read the key vault secret that contains the GitHub PAT.
151151

152152
### Attach a system-assigned managed identity
153153

@@ -161,23 +161,32 @@ To attach a system-assigned managed identity to your dev center:
161161

162162
1. In the **Enable system assigned managed identity** dialog, select **Yes**.
163163

164-
### Assign the system-assigned managed identity access to the key vault secret
165-
Make sure that the identity has access to the key vault secret that contains the personal access token to access your repository. Key Vaults support two methods of access; Azure role-based access control (RBAC) or Vault access policy. In this quickstart, you use an RBAC key vault.
164+
### Assign roles for the dev center managed identity
166165

167-
Configure vault access:
168-
1. In the Azure portal, go to the key vault that contains the secret with the personal access token.
166+
Before you can create environment types, you must give the managed identity that represents your dev center access to the subscriptions where you configure the [project environment types](concept-environments-key-concepts.md#project-environment-types). You must also give the managed identity access to the key vault secret that stores your GitHub PAT.
169167

170-
1. In the left menu, select **Access control (IAM)**.
168+
1. Navigate to your dev center.
169+
1. On the left menu under Settings, select **Identity**.
170+
1. Under System assigned > Permissions, select **Azure role assignments**.
171171

172-
1. Select **Add** > **Add role assignment**.
172+
:::image type="content" source="media/quickstart-create-configure-projects/system-assigned-managed-identity.png" alt-text="Screenshot that shows a system-assigned managed identity with Role assignments highlighted.":::
173173

174-
1. Assign the following role. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
174+
1. To give access to the subscription, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
175175

176-
| Setting | Value |
177-
| --- | --- |
178-
| **Role** | Select **Key Vault Secrets User**. |
179-
| **Assign access to** | Select **Managed identity**. |
180-
| **Members** | Select the dev center managed identity that you created in [Attach a system-assigned managed identity](#attach-a-system-assigned-managed-identity). |
176+
|Name |Value |
177+
|---------|----------|
178+
|**Scope**|Subscription|
179+
|**Subscription**|Select the subscription in which to use the managed identity.|
180+
|**Role**|Owner|
181+
182+
1. To give access to the key vault, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
183+
184+
|Name |Value |
185+
|---------|----------|
186+
|**Scope**|Key Vault|
187+
|**Subscription**|Select the subscription in which to use the managed identity.|
188+
|**Resource**|Select the key vault that you created earlier.|
189+
|**Role**|Key Vault Secrets User|
181190

182191
## Add a catalog to the dev center
183192
Azure Deployment Environments supports attaching Azure DevOps repositories and GitHub repositories. You can store a set of curated IaC templates in a repository. Attaching the repository to a dev center as a catalog gives your development teams access to the templates and enables them to quickly create consistent environments.

articles/deployment-environments/quickstart-create-and-configure-projects.md

Lines changed: 2 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -65,26 +65,7 @@ To create a project in your dev center:
6565

6666
:::image type="content" source="media/quickstart-create-configure-projects/created-project.png" alt-text="Screenshot that shows the project overview pane.":::
6767

68-
### Assign a managed identity the owner role to the subscription
69-
Before you can create environment types, you must give the managed identity that represents your dev center access to the subscriptions where you configure the [project environment types](concept-environments-key-concepts.md#project-environment-types).
70-
71-
In this quickstart you assign the Owner role to the system-assigned managed identity that you configured previously: [Attach a system-assigned managed identity](quickstart-create-and-configure-devcenter.md#attach-a-system-assigned-managed-identity).
72-
73-
1. Navigate to your dev center.
74-
1. On the left menu under Settings, select **Identity**.
75-
1. Under System assigned > Permissions, select **Azure role assignments**.
76-
77-
:::image type="content" source="media/quickstart-create-configure-projects/system-assigned-managed-identity.png" alt-text="Screenshot that shows a system-assigned managed identity with Role assignments highlighted.":::
78-
79-
1. In Azure role assignments, select **Add role assignment (Preview)**, enter or select the following information, and then select **Save**:
80-
81-
|Name |Value |
82-
|---------|----------|
83-
|**Scope**|Subscription|
84-
|**Subscription**|Select the subscription in which to use the managed identity.|
85-
|**Role**|Owner|
86-
87-
## Configure a project
68+
## Create a project environment type
8869

8970
To configure a project, add a [project environment type](how-to-configure-project-environment-types.md):
9071

@@ -110,7 +91,7 @@ To configure a project, add a [project environment type](how-to-configure-projec
11091
> [!NOTE]
11192
> At least one identity (system-assigned or user-assigned) must be enabled for deployment identity. The identity is used to perform the environment deployment on behalf of the developer. Additionally, the identity attached to the dev center should be [assigned the Owner role](how-to-configure-managed-identity.md) for access to the deployment subscription for each environment type.
11293
113-
## Give project access to the development team
94+
## Give access to the development team
11495

11596
1. In the Azure portal, go to your project.
11697

0 commit comments

Comments
 (0)