You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-Have an Owner role to the resource group to grant access by using [Azure built-in roles](../../role-based-access-control/built-in-roles.md).
28
+
-Granting access using [Azure built-in roles](../../role-based-access-control/built-in-roles.md) requires having an Owner role to the resource group.
29
29
- Understand the [unsupported scenarios](#unsupported-scenarios).
30
30
31
31
## Unsupported scenarios
@@ -53,9 +53,9 @@ The following Software Development Kits (SDKs) and features are unsupported for
53
53
54
54
For more information on how to create a Microsoft Entra application and service principal that can access resources, see [Create a service principal](../../active-directory/develop/howto-create-service-principal-portal.md).
55
55
56
-
1. Assign a role to the Azure service.
56
+
1. Assign the required RBAC role to the Azure identity, service principal, or Azure user account.
57
57
58
-
Follow the steps in [Assign Azure roles](../../role-based-access-control/role-assignments-portal.yml) to add the Monitoring Metrics Publisher role from the target Application Insights resource to the Azure resource from which the telemetry is sent.
58
+
Follow the steps in [Assign Azure roles](../../role-based-access-control/role-assignments-portal.yml) to add the Monitoring Metrics Publisher role to the expected identity, service principal, or Azure user account by setting the target Application Insights resource as the role scope.
59
59
60
60
> [!NOTE]
61
61
> Although the Monitoring Metrics Publisher role says "metrics," it will publish all telemetry to the Application Insights resource.
@@ -70,6 +70,7 @@ The following Software Development Kits (SDKs) and features are unsupported for
70
70
Application Insights .NET SDK supports the credential classes provided by [Azure Identity](https://github.com/Azure/azure-sdk-for-net/tree/master/sdk/identity/Azure.Identity#credential-classes).
71
71
72
72
- We recommend `DefaultAzureCredential` for local development.
73
+
- Ensure you're authenticated on Visual Studio with the expected Azure user account. For more information, see [Authenticate via Visual Studio](https://github.com/Azure/azure-sdk-for-net/tree/main/sdk/identity/Azure.Identity#authenticate-via-visual-studio).
73
74
- We recommend `ManagedIdentityCredential` for system-assigned and user-assigned managed identities.
74
75
- For system-assigned, use the default constructor without parameters.
75
76
- For user-assigned, provide the client ID to the constructor.
0 commit comments