Skip to content

Commit 4132853

Browse files
Merge pull request #227123 from jaesoni/vnet-perms-afec-flag
Vnet perms afec flag
2 parents 05dfe22 + a31a054 commit 4132853

File tree

1 file changed

+11
-1
lines changed

1 file changed

+11
-1
lines changed

articles/application-gateway/configuration-infrastructure.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,17 @@ Since application gateway resources are deployed within a virtual network resour
6060

6161
You should check your [Azure role-based access control](../role-based-access-control/role-assignments-list-portal.md) to verify that users or Service Principals who operate application gateways have at least **Microsoft.Network/virtualNetworks/subnets/join/action** or some higher permission such as the built-in [Network contributor](../role-based-access-control/built-in-roles.md) role on the virtual network. Visit [Add, change, or delete a virtual network subnet](../virtual-network/virtual-network-manage-subnet.md) to know more on subnet permissions.
6262

63-
If a [built-in](../role-based-access-control/built-in-roles.md) role doesn't provide the right permission, you can [create and assign a custom role](../role-based-access-control/custom-roles-portal.md) for this purpose.
63+
If a [built-in](../role-based-access-control/built-in-roles.md) role doesn't provide the right permission, you can [create and assign a custom role](../role-based-access-control/custom-roles-portal.md) for this purpose. Also, [allow sufficient time](../role-based-access-control/troubleshooting.md?tabs=bicep#symptom---role-assignment-changes-are-not-being-detected) after you make changes to a role assignments.
64+
65+
> [!NOTE]
66+
> As a temporary extension, we have introduced a subscription-level Azure Feature Exposure Control (AFEC) flag to help you fix the permissions for all your users and/or service principals' permissions. Register for this interim feature on your own through a subscription owner, contributor, or custom role. </br>
67+
>
68+
> "**name**": "Microsoft.Network/DisableApplicationGatewaySubnetPermissionCheck", </br>
69+
> "**description**": "Disable Application Gateway Subnet Permission Check", </br>
70+
> "**providerNamespace**": "Microsoft.Network", </br>
71+
> "**enrollmentType**": "AutoApprove" </br>
72+
>
73+
> The provision to circumvent the virtual network permission check by using this feature control is **available only for a limited period, until 6th April 2023**. Ensure all the roles and permissions managing Application Gateways are updated by then, as there will be no further extensions. Read more about [Preview Feature registration](../azure-resource-manager/management/preview-features.md?tabs=azure-portal).
6474
6575
## Network security groups
6676

0 commit comments

Comments
 (0)