Skip to content

Commit 3dd9775

Browse files
committed
fix note
1 parent 335e438 commit 3dd9775

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/lighthouse/how-to/view-service-provider-activity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,6 @@ ms.topic: conceptual
99

1010
Customers who have delegated subscriptions for Azure delegated resource management can [view Azure Activity log](../../azure-monitor/platform/platform-logs-overview.md) data to see all actions taken. This gives customers full visibility into operations that service providers are performing through Azure delegated resource management, along with those done by users within the customer's own Azure Active Directory (Azure AD) tenant.
1111

12-
> [!NOTE]
13-
> Customers can view the role assignments that grant permissions to service providers [in the **Delegations** section of the **Service providers** page.](view-manage-service-providers.md#view-delegations). However, they won't see any users from the service provider's tenant when viewing role assignments for the delegated scope in the Azure portal or via APIs.
14-
1512
## View activity log data
1613

1714
You can [view the activity log](../../azure-monitor/platform/activity-log-view.md) from the **Monitor** menu in the Azure portal. To limit results to a specific subscription, you can use the filters to select a specific subscription. You can also [view and retrieve activity log events](../../azure-monitor/platform/activity-log-view.md) programmatically.
@@ -23,6 +20,9 @@ In the activity log, you'll see the name of the operation and its status, along
2320

2421
Logged activity is available in the Azure portal for the past 90 days. To learn how to store this data for longer than 90 days, see [Collect and analyze Azure activity logs in Log Analytics workspace in Azure Monitor](../../azure-monitor/platform/activity-log-collect.md)
2522

23+
> [!NOTE]
24+
> Users from the service provider appear in the activity log, but these users and their role assignments are not shown in **Access Control (IAM)** or when retrieving role assignment info via APIs.
25+
2626
## Set alerts for critical operations
2727

2828
To stay aware of critical operations that service providers (or users in your own tenant) are performing, we recommend creating [activity log alerts](../../azure-monitor/platform/activity-log-alerts.md). For example, you may want to track all administrative actions for a subscription, or be notified when any virtual machine in a particular resource group is deleted. When you create alerts, they will include actions taken by users in the customer's own tenant as well as in any managing tenants.

0 commit comments

Comments
 (0)