Skip to content

Commit 3e6914d

Browse files
committed
Update concepts-identity.md
1 parent 836d3f5 commit 3e6914d

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/azure-vmware/concepts-identity.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ You can view the privileges granted to the Azure VMware Solution CloudAdmin role
2626
1. Under **Access Control**, select **Roles**.
2727
1. From the list of roles, select **CloudAdmin** and then select **Privileges**.
2828

29-
:::image type="content" source="media/concepts/role-based-access-control-cloudadmin-privileges.png" alt-text="Image shows the roles and privileges for CloudAdmin in the vSphere Client.":::
29+
:::image type="content" source="media/concepts/role-based-access-control-cloudadmin-privileges.png" alt-text="Screenshot shows the roles and privileges for CloudAdmin in the vSphere Client.":::
3030

3131
The CloudAdmin role in Azure VMware Solution has the following privileges on vCenter Server. For more information, see the [VMware product documentation](https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-ED56F3C4-77D0-49E3-88B6-B99B8B437B62.html).
3232

@@ -140,16 +140,16 @@ You can view the permissions granted to the Azure VMware Solution cloudadmin rol
140140
> [!NOTE]
141141
> **Private clouds created before June 2022** will switch from **admin** role to **cloudadmin** role. You'll receive a notification through Azure Service Health that includes the timeline of this change so you can change the NSX-T credentials you've used for other integration.
142142
143-
## NSX-T LDAP Integration for Role Based Access Control (RBAC)
143+
## NSX-T LDAP integration for role based access control (RBAC)
144144

145-
In an Azure VMware Solution deployment, the NSX-T can be integrated with external LDAP directory service to add remote directory users or group, and assign them an NSX-T RBAC role, like on-prem deployment. For more information on how to enable NSX-T LDAP integration, see the [VMware product documentation](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-DB5A44F1-6E1D-4E5C-8B50-D6161FFA5BD2.html).
145+
In an Azure VMware Solution deployment, the NSX-T can be integrated with external LDAP directory service to add remote directory users or group, and assign them an NSX-T RBAC role, like on-premises deployment. For more information on how to enable NSX-T LDAP integration, see the [VMware product documentation](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-DB5A44F1-6E1D-4E5C-8B50-D6161FFA5BD2.html).
146146

147-
Unlike on-prem deployment, not all pre-defined NSX-T RBAC roles are supported with Azure VMware solution to keep Azure VMware Solution IaaS control plane config management separate from tenant network and security configuration. Please see the next section, Supported NSX-T RBAC roles, for more details.
147+
Unlike on-premises deployment, not all pre-defined NSX-T RBAC roles are supported with Azure VMware solution to keep Azure VMware Solution IaaS control plane config management separate from tenant network and security configuration. Please see the next section, Supported NSX-T RBAC roles, for more details.
148148

149149
> [!NOTE]
150150
> NSX-T LDAP Integration supported only with SDDC’s with NSX-T “cloudadmin” user.
151151
152-
### Supported and Unsupported NSX-T RBAC roles
152+
### Supported and unsupported NSX-T RBAC roles
153153

154154
In an Azure VMware Solution deployment, the following NSX-T predefined RBAC roles are supported with LDAP integration:
155155

@@ -158,7 +158,7 @@ Unlike on-prem deployment, not all pre-defined NSX-T RBAC roles are supported wi
158158
- LB Admin
159159
- LB Operator
160160
- VPN Admin
161-
- Network Operator
161+
- Network Operator
162162

163163
In an Azure VMware Solution deployment, the following NSX-T predefined RBAC roles are not supported with LDAP integration:
164164

@@ -167,12 +167,12 @@ Unlike on-prem deployment, not all pre-defined NSX-T RBAC roles are supported wi
167167
- Netx Partner Admin
168168
- GI Partner Admin
169169

170-
You can create custom roles in NSX-T with permissions lesser than or equal to Cloudadmin role created by Microsoft. Following are examples on how to create a supported "Network Admin" and "Security Admin" role.
170+
You can create custom roles in NSX-T with permissions lesser than or equal to Cloudadmin role created by Microsoft. Following are examples on how to create a supported "Network Admin" and "Security Admin" role.
171171

172172
> [!NOTE]
173173
> Custom role creation will fail if you assign a permission not allowed by Cloudadmin role.
174174
175-
#### Create “AVS Network Admin” role
175+
#### Create “AVS network admin” role
176176

177177
Use the following steps to create this custom role.
178178

@@ -188,7 +188,7 @@ You can create custom roles in NSX-T with permissions lesser than or equal to Cl
188188

189189
1. **Apply** the changes and **Save** the Role.
190190

191-
#### Create “AVS Security Admin” role
191+
#### Create “AVS security admin” role
192192

193193
Use the following steps to create this custom role.
194194

0 commit comments

Comments
 (0)