You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/create-file-share.md
+14-7Lines changed: 14 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,7 @@ ms.topic: how-to
6
6
ms.date: 12/08/2021
7
7
ms.author: helohr
8
8
manager: femila
9
+
ms.custom: subject-rbac-steps
9
10
---
10
11
# Create a profile container with Azure Files and AD DS
11
12
@@ -84,19 +85,25 @@ To assign Azure role-based access control (Azure RBAC) permissions:
84
85
85
86
1. Open the Azure portal.
86
87
87
-
2. Open the storage account you created in [Set up a storage account](#set-up-a-storage-account).
88
+
1. Open the storage account you created in [Set up a storage account](#set-up-a-storage-account).
89
+
90
+
1. Select **File shares**, then select the name of the file share you plan to use.
88
91
89
-
3. Select **File shares**, then select the name of the file share you plan to use.
92
+
1. Select **Access control (IAM)**.
90
93
91
-
4. Select **Access Control (IAM)**.
94
+
1. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
92
95
93
-
5. Select **Add a role assignment**.
96
+
1. Assign the following role. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
94
97
95
-
6. In the **Add role assignment** tab, select **Storage File Data SMB Share Elevated Contributor** for the administrator account.
98
+
| Setting | Value |
99
+
| --- | --- |
100
+
| Role | Storage File Data SMB Share Elevated Contributor |
101
+
| Assign access to | User, group, or service principal |
102
+
| Members |\<Name of the administrator account> |
96
103
97
-
To assign users permissions for their FSLogix profiles, follow these same instructions. However, when you get to step 5, select **Storage File Data SMB Share Contributor** instead.
104
+
To assign users permissions for their FSLogix profiles, select the **Storage File Data SMB Share Contributor** role instead.
98
105
99
-
7. Select **Save**.
106
+

100
107
101
108
## Assign users permissions on the Azure file share
Copy file name to clipboardExpand all lines: articles/virtual-desktop/create-profile-container-adds.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,7 @@ ms.topic: how-to
6
6
ms.date: 12/08/2021
7
7
ms.author: helohr
8
8
manager: femila
9
+
ms.custom: subject-rbac-steps
9
10
---
10
11
11
12
# Create a profile container with Azure Files and Azure AD DS
@@ -56,17 +57,19 @@ To assign users access permissions:
56
57
57
58
1. From the Azure portal, open the file share you created in [Set up an Azure Storage account](#set-up-an-azure-storage-account).
58
59
59
-
2. Select **Access Control (IAM)**.
60
+
1. Select **Access control (IAM)**.
60
61
61
-
3. Select **Add a role assignment**.
62
+
1. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
62
63
63
-
4. In the **Add role assignment** tab, select the appropriate built-in role from the role list. You'll need to at least select **Storage File Data SMB Share Contributor** for the account to get proper permissions.
64
+
1. Assign the following role. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
64
65
65
-
5. For **Assign access to**, select **Azure Active Directory user, group, or service principal**.
66
+
| Setting | Value |
67
+
| --- | --- |
68
+
| Role | Storage File Data SMB Share Contributor |
69
+
| Assign access to | User, group, or service principal |
70
+
| Members |\<Name or email address for the target Azure Active Directory identity> |
66
71
67
-
6. Select a name or email address for the target Azure Active Directory identity.
68
-
69
-
7. Select **Save**.
72
+

Copy file name to clipboardExpand all lines: articles/virtual-desktop/start-virtual-machine-connect.md
+14-9Lines changed: 14 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,7 @@ ms.topic: how-to
6
6
ms.date: 04/14/2022
7
7
ms.author: helohr
8
8
manager: femila
9
+
ms.custom: subject-rbac-steps
9
10
---
10
11
# Start Virtual Machine on Connect
11
12
@@ -68,19 +69,23 @@ To use the Azure portal to create a custom role for Start VM on Connect:
68
69
69
70
After that, you'll need to assign the role to the Azure Virtual Desktop service principal.
70
71
71
-
To assign the custom role:
72
+
The following steps describe how to assign the custom role. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
72
73
73
-
1. In the **Access control (IAM) tab**, select **Add role assignment**.
74
+
1. In the navigation menu of the subscription, select **Access control (IAM)**.
74
75
75
-
2. Search for and select the role you just created.
76
+
1. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
76
77
77
-
3. On the **Members** tab, enter and select **Windows Virtual Desktop** in the search bar.
78
+
1. On the **Role** tab, search for and select the role you just created.
78
79
79
-
>[!NOTE]
80
-
>You might see both the Windows Virtual Desktop and Windows Virtual Desktop Azure Resource Manager Provider first party applications appear if you've deployed Azure Virtual Desktop (classic). Assign the role to both apps.
81
-
>
82
-
> [!div class="mx-imgBorder"]
83
-
> 
80
+
1. On the **Members** tab, search for and select **Windows Virtual Desktop**.
81
+
82
+
> [!NOTE]
83
+
> If you've deployed Azure Virtual Desktop (classic), both the Windows Virtual Desktop and Windows Virtual Desktop Azure Resource Manager Provider first party applications might appear. If so, assign the role to both apps.
84
+
>
85
+
86
+

87
+
88
+
1. On the **Review + assign** tab, select **Review + assign** to assign the role.
84
89
85
90
### Create a custom role with a JSON file template
0 commit comments