Skip to content

Commit 420300b

Browse files
Merge pull request #212324 from dominicbetts/harsha-central-aad
IoT Central: add AAD details
2 parents b5437ca + 4a7e184 commit 420300b

File tree

1 file changed

+8
-2
lines changed

1 file changed

+8
-2
lines changed

articles/iot-central/core/howto-manage-users-roles.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,10 @@ Every user must have a user account before they can sign in and access an applic
2727

2828
:::image type="content" source="media/howto-manage-users-roles/manage-users-pnp.png" alt-text="Screenshot of manage users page in IoT Central.":::
2929

30-
1. To add a user on the **Users** page, choose **+ Assign user**. To add a service principal on the **Users** page, choose **+ Assign service principal**. Start typing the name of the service principal to auto-populate the form.
30+
1. To add a user on the **Users** page, choose **+ Assign user**. To add a service principal on the **Users** page, choose **+ Assign service principal**. To add an Azure Active Directory group on the **Users** page, choose **+ Assign group**. Start typing the name of the Active Directory group or service principal to auto-populate the form.
3131

3232
> [!NOTE]
33-
> A service principal must belong to the same Azure Active Directory tenant as the Azure subscription associated with the IoT Central application.
33+
> Service principals and Active Directory groups must belong to the same Azure Active Directory tenant as the Azure subscription associated with the IoT Central application.
3434
3535
1. If your application uses [organizations](howto-create-organizations.md), choose an organization to assign to the user from the **Organization** drop-down menu.
3636

@@ -48,6 +48,12 @@ Every user must have a user account before they can sign in and access an applic
4848
> [!NOTE]
4949
> If a user is deleted from Azure Active Directory and then added back, they won't be able to sign into the IoT Central application. To re-enable access, the application's administrator should delete and re-add the user in the application as well.
5050
51+
The following limitations apply to Azure Active Directory groups and service principals:
52+
53+
- Total number of Azure Active Directory groups for each IoT Central application can't be more than 20.
54+
- Total number of unique Azure Active Directory groups from the same Azure Active Directory tenant can't be more than 200 across all IoT Central applications.
55+
- Service principals that are part of an Azure Active Directory group aren't automatically granted access to the application. The service principals must be added explicitly.
56+
5157
### Edit the roles and organizations that are assigned to users
5258

5359
Roles and organizations can't be changed after they're assigned. To change the role or organization that's assigned to a user, delete the user, and then add the user again with a different role or organization.

0 commit comments

Comments
 (0)