Skip to content

Commit 50ffbc9

Browse files
authored
Merge pull request #101438 from JnHs/jh-newrole
add note about newly-added roles
2 parents b954b00 + 9370c41 commit 50ffbc9

File tree

2 files changed

+7
-2
lines changed

2 files changed

+7
-2
lines changed

articles/lighthouse/concepts/tenants-users-roles.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Tenants, roles, and users in Azure Lighthouse scenarios
33
description: Understand the concepts of Azure Active Directory tenants, users, and roles, as well as how they can be used in Azure Lighthouse scenarios.
4-
ms.date: 11/05/2019
4+
ms.date: 01/16/2020
55
ms.topic: conceptual
66
---
77

@@ -25,6 +25,9 @@ All [built-in roles](../../role-based-access-control/built-in-roles.md) are curr
2525
- Any built-in roles with [DataActions](../../role-based-access-control/role-definitions.md#dataactions) permission are not supported.
2626
- The [User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) built-in role is supported, but only for the limited purpose of [assigning roles to a managed identity in the customer tenant](../how-to/deploy-policy-remediation.md#create-a-user-who-can-assign-roles-to-a-managed-identity-in-the-customer-tenant). No other permissions typically granted by this role will apply. If you define a user with this role, you must also specify the built-in role(s) that this user can assign to managed identities.
2727

28+
> [!NOTE]
29+
> Once an applicable new built-in role is added to Azure, it can be assigned when [onboarding a customer using Azure Resource Manager templates](../how-to/onboard-customer.md). There may be a delay before the newly-added role becomes available in Cloud Partner Portal when [publishing a managed service offer](../how-to/publish-managed-services-offers.md).
30+
2831
## Best practices for defining users and roles
2932

3033
When creating your authorizations, we recommend the following best practices:

articles/lighthouse/how-to/publish-managed-services-offers.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Publish a managed services offer to Azure Marketplace
33
description: Learn how to publish a managed service offer that onboards customers to Azure delegated resource management.
4-
ms.date: 01/09/2020
4+
ms.date: 01/16/2020
55
ms.topic: conceptual
66
---
77

@@ -81,6 +81,8 @@ For each **Authorization**, you'll need to provide the following. You can then s
8181
- **Azure AD Object ID**: The Azure AD identifier of a user, user group, or application which will be granted certain permissions (as described by the Role Definition) to your customers' resources.
8282
- **Azure AD Object Display Name**: A friendly name to help the customer understand the purpose of this authorization. The customer will see this name when delegating resources.
8383
- **Role Definition**: Select one of the available Azure AD built-in roles from the list. This role will determine the permissions that the user in the **Azure AD Object ID** field will have on your customers' resources. For descriptions of these roles, see [Built-in roles](../../role-based-access-control/built-in-roles.md) and [Role support for Azure delegated resource management](../concepts/tenants-users-roles.md#role-support-for-azure-delegated-resource-management).
84+
> [!NOTE]
85+
> As applicable new built-in roles are added to Azure, they will become available here, although there may be some delay before they appear.
8486
- **Assignable Roles**: This is required only if you have selected User Access Administrator in the **Role Definition** for this authorization. If so, you must add one or more assignable roles here. The user in the **Azure AD Object ID** field will be able to assign these **Assignable Roles** to [managed identities](../../active-directory/managed-identities-azure-resources/overview.md), which is required in order to [deploy policies that can be remediated](deploy-policy-remediation.md). Note that no other permissions normally associated with the User Access Administrator role will apply to this user. If you do not select one or more roles here, your submission will not pass certification. (If you did not select User Access Administrator for this user’s Role Definition, this field has no effect.)
8587

8688
> [!TIP]

0 commit comments

Comments
 (0)