Skip to content

Commit 51e5abc

Browse files
author
pcoma55
committed
fixing RBAC image links
1 parent cba9e05 commit 51e5abc

7 files changed

+7
-7
lines changed

articles/planetary-computer/application-authentication.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -73,19 +73,19 @@ Below is a step-by-step example showing how to configure Role-Based Access Contr
7373

7474
1. On Azure portal go to Microsoft Planetary Computer Pro resource IAM tab on the left.
7575

76-
:::image type="content" source="media/RBAC_IAM_blade.png" alt-text="Screenshot of the IAM blade in the Azure portal for configuring RBAC.":::
76+
:::image type="content" source="media/role-based-access-control-identity-access-management-blade.png" alt-text="Screenshot of the IAM blade in the Azure portal for configuring RBAC.":::
7777

7878
1. Select on **Add role Assignment** and then select **GeoCatalog Administrator** under "Job function roles"
7979

80-
:::image type="content" source="media/RBAC_role_assignment.png" alt-text="Screenshot of the role assignment selection in the Azure portal.":::
80+
:::image type="content" source="media/role-based-access-control-role-assignment.png" alt-text="Screenshot of the role assignment selection in the Azure portal.":::
8181

8282
1. Select the **Next** button and then select radio button of **Managed identity**
8383

84-
:::image type="content" source="media/RBAC_managed_id.png" alt-text="Screenshot of the managed identity selection in the Azure portal.":::
84+
:::image type="content" source="media/role-based-access-control-managed-id.png" alt-text="Screenshot of the managed identity selection in the Azure portal.":::
8585

8686
1. Select on **Select members** and select the subscription and the User-assigned managed identity on the **Select managed identities** pane on the right-hand side.
8787

88-
:::image type="content" source="media/RBAC_selected_members.png" alt-text="Screenshot of the selected members pane in the Azure portal.":::
88+
:::image type="content" source="media/role-based-access-control-selected-members.png" alt-text="Screenshot of the selected members pane in the Azure portal.":::
8989

9090
1. Select on **Next** to verify the information and finish **review + assign**.
9191

articles/planetary-computer/manage-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,16 +41,16 @@ You can use the Azure portal to assign RBAC roles to Planetary Computer Pro user
4141

4242
1. Within Azure portal, go to your GeoCatalog resource **Access control (IAM)** tab in the left sidebar:
4343

44-
:::image type="content" source="media/RBAC_IAM_blade.png" alt-text="Screenshot of the Access control (IAM) tab in the Azure portal, showing role assignment options.":::
44+
:::image type="content" source="media/role-based-access-control-identity-access-management-blade.png" alt-text="Screenshot of the Access control (IAM) tab in the Azure portal, showing role assignment options.":::
4545

4646
1. Select **Add** > **Add role Assignment**.
4747
1. Select **GeoCatalog Administrator** from the list of **Job function roles**, and then select the **Next** button at the bottom of the page:
4848

49-
:::image type="content" source="media/RBAC_role_assignment.png" alt-text="Screenshot showing the RBAC role assignment options in the Azure portal.":::
49+
:::image type="content" source="media/role-based-access-control-role-assignment.png" alt-text="Screenshot showing the RBAC role assignment options in the Azure portal.":::
5050

5151
1. Select the radio button of **User, group, or service principal**:
5252

53-
:::image type="content" source="media/RBAC_members_section.png" alt-text="Screenshot showing the members section during RBAC role assignment in the Azure portal.":::
53+
:::image type="content" source="media/role-based-access-control-members-section.png" alt-text="Screenshot showing the members section during RBAC role assignment in the Azure portal.":::
5454

5555
1. Select **Select members**
5656
1. Search for the user on the **Select members** pane that appears on the right-hand side. Select a name or identity from the list to add it to the list of **Selected Members**. Repeat this step for each of the users that need to be assigned this role.

0 commit comments

Comments
 (0)