You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
4. Open the ReaderSupportRole.json file in an editor.
65
65
66
-
The following shows the JSON output. For information about the different properties, see [Azure custom roles](../role-based-access-control/custom-roles.md).
66
+
Here's the JSON output. For information about the different properties, see [Azure custom roles](../role-based-access-control/custom-roles.md).
67
67
68
68
```json
69
69
{
@@ -87,11 +87,11 @@ Use the following high-level procedure to define custom roles:
operation to the **Actions** property. Be sure to include a comma after the read operation. This action allows the user to create and update rule collection groups.
90
-
6. In **AssignableScopes**, add your subscription ID with the following format:
90
+
6. In **AssignableScopes**, add your subscription ID with the following format.
You must add explicit subscription IDs, otherwise you won't be allowed to import the role into your subscription.
94
+
You must add explicit subscription IDs. Otherwise, you aren't allowed to import the role into your subscription.
95
95
7. Delete the **Id** property line and change the **IsCustom** property to true.
96
96
8. Change the **Name** and **Description** properties to *AZFM Rule Collection Group Author* and *Users in this role can edit Firewall Policy rule collection groups*
97
97
@@ -154,7 +154,7 @@ Firewall Policy with custom roles now provides selective access to firewall poli
154
154
Users don’t have permissions to:
155
155
- Delete the Azure Firewall or firewall policy.
156
156
- Update firewall policy hierarchy or DNS settings or threat intelligence.
157
-
- Update firewall policy where they are not members of AZFM Rule Collection Group Author group.
157
+
- Update firewall policy where they aren't members of AZFM Rule Collection Group Author group.
158
158
159
159
Security administrators can use base policy to enforce guardrails and block certain types of traffic (for example ICMP) as required by their enterprise.
0 commit comments