Skip to content

Commit 44526b8

Browse files
committed
Add image and add more details.
1 parent 021de06 commit 44526b8

File tree

3 files changed

+7
-4
lines changed

3 files changed

+7
-4
lines changed

articles/managed-grafana/how-to-authentication-permissions.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,8 @@ ms.service: managed-grafana
55
ms.topic: how-to
66
author: maud-lv
77
ms.author: malev
8-
ms.date: 08/22/2022
8+
ms.date: 12/13/2022
9+
ms.custom: engagement-fy23
910
---
1011

1112
# Set up Azure Managed Grafana authentication and permissions
@@ -32,7 +33,7 @@ Open your CLI and run the `az login` command to sign in to Azure.
3233
az login
3334
```
3435

35-
This command will prompt your web browser to launch and load an Azure sign-in page. If the browser fails to open, use device code flow with `az login --use-device-code`. For more sign-in options, go to [sign in with the Azure CLI](/cli/azure/authenticate-azure-cli).
36+
This command will prompt your web browser to launch and load an Azure sign-in page.
3637

3738
---
3839

@@ -87,12 +88,14 @@ System-assigned managed identity is the default authentication method provided t
8788

8889
##### With managed identity disabled
8990

90-
1. Azure Managed Grafana can also access data sources with managed identity disabled. You can use a service principal for authentication, using a client ID and secret. To use this method, in the **Permissions** tab, set the box **System assigned managed identity** to **Off**.
91+
Azure Managed Grafana can also access data sources with managed identity disabled. You can use a service principal for authentication, using a client ID and secret.
9192

92-
1. **Add role assignment to this identity with 'Monitoring Reader' role on target subscription** is grayed out.
93+
1. In the **Permissions** tab, set the box **System assigned managed identity** to **Off**. The line **Add role assignment to this identity with 'Monitoring Reader' role on target subscription** is automatically grayed out.
9394

9495
1. Under **Grafana administrator role**, if you have the Owner or User Access Administrator role for the subscription, the box **Include myself** is checked by default. Optionally select **Add** to grant the Grafana administrator role to more members. If you don't have the necessary role, you won't be able to manage Grafana access rights yourself.
9596

97+
:::image type="content" source="media/authentication/create-form-permission-disabled.png" alt-text="Screenshot of the Azure portal. Create workspace form. Permission tab with managed identity disabled.":::
98+
9699
> [!NOTE]
97100
> Turning off system-assigned managed identity disables the Azure Monitor data source plugin for your Azure Managed Grafana instance. In this scenario, use a service principal instead of Azure Monitor to access data sources.
98101
31 KB
Loading
-23.9 KB
Loading

0 commit comments

Comments
 (0)