You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/deploy-iot-ops/howto-deploy-iot-operations.md
+23-12Lines changed: 23 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -146,6 +146,13 @@ One at a time, run each Azure CLI command on the **Automation** tab in a termina
146
146
az extension add --upgrade --name azure-iot-ops
147
147
```
148
148
149
+
> [!IMPORTANT]
150
+
> For [preview releases](./howto-upgrade.md#upgrade-to-preview-version), you need to append the `--allow-preview` flag to the `az extension add` command to install the preview version of the Azure IoT Operations CLI extension.
151
+
>
152
+
> ```azurecli
153
+
> az extension add --upgrade --name azure-iot-ops --allow-preview
154
+
> ```
155
+
149
156
1. Copy and run the provided [az iot ops schema registry create](/cli/azure/iot/ops/schema/registry#az-iot-ops-schema-registry-create) command to create a schema registry which is used by Azure IoT Operations components. If you chose to use an existing schema registry, this command isn't displayed on the **Automation** tab.
150
157
151
158
> [!NOTE]
@@ -163,6 +170,9 @@ One at a time, run each Azure CLI command on the **Automation** tab in a termina
163
170
1. In the left menu, select **Namespaces**.
164
171
1. Then select **+ Create** to create a new namespace. Make sure to use the same resource group as your Arc-enabled Kubernetes cluster.
165
172
173
+
> [!NOTE]
174
+
> Namespace resources are available from [2507 preview release](https://github.com/Azure/azure-iot-operations/releases/tag/v1.2.35). If you're using an earlier release version, namespaces aren't available and you can skip this step.
175
+
166
176
1. To prepare the cluster for Azure IoT Operations deployment, copy and run the provided [az iot ops init](/cli/azure/iot/ops#az-iot-ops-init) command.
167
177
168
178
> [!TIP]
@@ -174,25 +184,26 @@ One at a time, run each Azure CLI command on the **Automation** tab in a termina
174
184
175
185
* If you want to use an existing namespace, add the following parameter to the `create` command:
* If you want to use the preview connector configuration, add the following parameter to the `create` command:
182
192
183
-
```bash
184
-
--feature connectors.settings.preview=Enabled
185
-
```
193
+
```bash
194
+
--feature connectors.settings.preview=Enabled
195
+
```
196
+
197
+
> [!NOTE]
198
+
> The `--feature` configuration parameter is only available in the [latest GA version](https://github.com/Azure/azure-iot-operations/releases/tag/v1.1.59). If you're using the [2507 preview release](https://github.com/Azure/azure-iot-operations/releases/tag/v1.2.35), this parameter isn't available.
186
199
187
200
* If you followed the optional prerequisites to set up your own certificate authority issuer, add the `--trust-settings` parameters to the `create` command:
1. Enable secret sync for the deployed Azure IoT Operations instance. Copy and run the provided [az iot ops secretsync enable](/cli/azure/iot/ops/secretsync#az-iot-ops-secretsync-enable) command.
1. Enable secret sync for the deployed Azure IoT Operations instance. Copy and run the provided [az iot ops secretsync enable](/cli/azure/iot/ops/secretsync#az-iot-ops-secretsync-enable) command. This command:
196
207
197
208
* Creates a federated identity credential using the user-assigned managed identity.
198
209
* Adds a role assignment to the user-assigned managed identity for access to the Azure Key Vault.
Copy file name to clipboardExpand all lines: articles/iot-operations/deploy-iot-ops/howto-deploy-iot-test-operations.md
+20-6Lines changed: 20 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -132,6 +132,14 @@ One at a time, run each Azure CLI command on the **Automation** tab in a termina
132
132
az extension add --upgrade --name azure-iot-ops
133
133
```
134
134
135
+
136
+
> [!IMPORTANT]
137
+
> For [preview releases](./howto-upgrade.md#upgrade-to-preview-version), you need to append the `--allow-preview` flag to the `az extension add` command to install the preview version of the Azure IoT Operations CLI extension.
138
+
>
139
+
> ```azurecli
140
+
> az extension add --upgrade --name azure-iot-ops --allow-preview
141
+
> ```
142
+
135
143
1. Copy and run the provided [az iot ops schema registry create](/cli/azure/iot/ops/schema/registry#az-iot-ops-schema-registry-create) command to create a schema registry which is used by Azure IoT Operations components. If you chose to use an existing schema registry, this command isn't displayed on the **Automation** tab.
136
144
137
145
1. Azure IoT Operations uses *namespaces* to organize assets and devices. Each Azure IoT Operations instance uses a single namespace for its assets and devices. You can use an existing namespace or run the `az iot ops ns create` command to create an Azure Device Registry namespace. Replace `<my namespace name>` with a unique name for your namespace.
@@ -145,6 +153,9 @@ One at a time, run each Azure CLI command on the **Automation** tab in a termina
145
153
1. In the search box, type and select **Azure Device Registry**.
146
154
1. In the left menu, select **Namespaces**.
147
155
1. Then select **+ Create** to create a new namespace. Make sure to use the same resource group as your Arc-enabled Kubernetes cluster.
156
+
157
+
> [!NOTE]
158
+
> Namespace resources are available from [2507 preview release](https://github.com/Azure/azure-iot-operations/releases/tag/v1.2.35). If you're using an earlier release version, namespaces aren't available and you can skip this step.
148
159
149
160
1. Prepare the cluster for Azure IoT Operations deployment. Copy and run the provided [az iot ops init](/cli/azure/iot/ops#az-iot-ops-init) command.
150
161
@@ -157,15 +168,18 @@ One at a time, run each Azure CLI command on the **Automation** tab in a termina
157
168
158
169
* If you want to use an existing namespace, add the following parameter to the `create` command:
* If you want to use the preview connector configuration, add the following parameter to the `create` command:
165
176
166
-
```azurecli
167
-
--feature connectors.settings.preview=Enabled
168
-
```
177
+
```azurecli
178
+
--feature connectors.settings.preview=Enabled
179
+
```
180
+
181
+
> [!NOTE]
182
+
> The `--feature` configuration parameter is only available in the [latest GA version](https://github.com/Azure/azure-iot-operations/releases/tag/v1.1.59). If you're using the [2507 preview release](https://github.com/Azure/azure-iot-operations/releases/tag/v1.2.35), this parameter isn't available.
169
183
170
184
1. Once all of the Azure CLI commands complete successfully, you can close the **Install Azure IoT Operations** wizard.
Copy file name to clipboardExpand all lines: articles/iot-operations/deploy-iot-ops/overview-deploy.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,11 +72,14 @@ The following table describes Azure IoT Operations deployment and management tas
72
72
73
73
| Task | Required permission | Comments |
74
74
| ---- | ------------------- | -------- |
75
-
| Deploy Azure IoT Operations |**Contributor** role at the resource group level. ||
76
-
| Register resource providers | Microsoft.ExtendedLocation/register/action Microsoft.SecretSyncController/register/action Microsoft.Kubernetes/register/action Microsoft.KubernetesConfiguration/register/action Microsoft.IoTOperations/register/action Microsoft.DeviceRegistry/register/action| Only required to do once per subscription. |
77
-
| Create a schema registry. |**Microsoft.Authorization/roleAssignments/write** permissions at the resource group level. ||
78
-
| Create secrets in Key Vault |**Key Vault Secrets Officer** role at the resource level. | Only required for secure settings deployment. |
79
-
| Enable resource sync rules on an Azure IoT Operations instance |**Microsoft.Authorization/roleAssignments/write** permissions at the resource group level. | Resource sync rules are disabled by default, but can be enabled as part of the [az iot ops rsync](/cli/azure/iot/ops#az-iot-ops-rsync) command. |
75
+
| Deploy Azure IoT Operations |[Azure IoT Operations Onboarding role](../secure-iot-ops/built-in-rbac.md#azure-iot-operations-onboarding-role)| This role has all required permissions to read and write Azure IoT operations and Azure Device Registry resources. This role has `Microsoft.Authorization/roleAssignments/write` permissions.|
76
+
| Register resource providers |[Contributor role](/azure/role-based-access-control/built-in-roles/privileged#contributor) at subscription level| Only required to do once per subscription. You need to register the following resource providers: `Microsoft.ExtendedLocation`, `Microsoft.SecretSyncController`, `Microsoft.Kubernetes`, `Microsoft.KubernetesConfiguration`, `Microsoft.IoTOperations`, and `Microsoft.DeviceRegistry`. |
77
+
| Create secrets in Key Vault |[Key Vault Secrets Officer role](/azure/role-based-access-control/built-in-roles/security#key-vault-secrets-officer) at the resource level | Only required for secure settings deployment to synchronize secrets from Azure Key Vault. |
78
+
| Create and manage storage accounts |[Storage Account Contributor role](/azure/role-based-access-control/built-in-roles/storage#storage-account-contributor)| Required for Azure IoT Operations deployment. |
79
+
| Create a resource group | Resource Group Contributor role | Required to create a resource group for storing Azure IoT Operations resources. |
80
+
| Onboard a cluster to Azure Arc |[Kubernetes Cluster - Azure Arc Onboarding role](/azure/role-based-access-control/built-in-roles/containers#kubernetes-cluster---azure-arc-onboarding)| Arc-enabled clusters are required to deploy Azure IoT Operations. |
81
+
| Manage deployment of Azure resource bridge|[Azure Resource Bridge Deployment role](/azure/role-based-access-control/built-in-roles/hybrid-multicloud#azure-resource-bridge-deployment-role)| Required to deploy Azure IoT Operations. |
82
+
| Provide permissions to deployment|[Azure Arc Enabled Kubernetes Cluster User role](/azure/role-based-access-control/built-in-roles/containers#azure-arc-enabled-kubernetes-cluster-user-role)| Required to grant permission of deployment to the Azure Arc-enabled Kubernetes cluster. |
80
83
81
84
> [!TIP]
82
85
> You must enable resource sync rules on the Azure IoT Operations instance to use the automatic asset discovery capabilities of the Akri services. To learn more, see [What is OPC UA asset discovery (preview)?](../discover-manage-assets/overview-akri.md).
Copy file name to clipboardExpand all lines: articles/iot-operations/includes/supported-versions.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,15 +3,16 @@ title: include file
3
3
description: include file with details of currently supported versions
4
4
author: dominicbetts
5
5
ms.topic: include
6
-
ms.date: 06/16/2025
6
+
ms.date: 07/30/2025
7
7
ms.author: dobett
8
8
---
9
9
10
10
Microsoft always supports three generally available (GA) versions of Azure IoT Operations at any one time: the latest version, and the two previous minor versions.
11
11
12
12
Currently, there are only two minor versions available. [Azure support](https://azure.microsoft.com/support/plans) is currently available for the following versions:
13
13
14
-
-[1.1.x](https://github.com/Azure/azure-iot-operations/releases/tag/v1.1.19) (latest GA version)
Copy file name to clipboardExpand all lines: articles/iot-operations/reference/custom-rbac.md
+16-7Lines changed: 16 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Custom RBAC for your resources
2
+
title: Custom RBAC Roles
3
3
description: Use the Azure portal to secure access to Azure IoT Operations resources such as data flows and assets by using Azure role-based access control.
4
4
author: dominicbetts
5
5
ms.author: dobett
@@ -9,26 +9,33 @@ ms.date: 04/16/2025
9
9
#CustomerIntent: As an IT administrator, I want configure Azure RBAC custom roles on resources in my Azure IoT Operations instance to control access to them.
10
10
---
11
11
12
-
# Custom RBAC for your Azure IoT Operations resources
12
+
# Custom RBAC roles for your Azure IoT Operations resources
13
13
14
-
To define custom roles that grant specific permissions to users, you can use Azure RBAC. For example, you can define an **Onboarding** role that grants sufficient permissions to a user to complete the Azure Arc connect process and deploy Azure IoT Operations securely.
15
-
16
-
This article includes a list of example that you can download and use in your environment. These custom roles are JSON files that list the specific permissions and scope for the role.
14
+
To define custom roles that grant specific permissions to users, you can use Azure RBAC. This article includes a list of example that you can download and use as reference to build your custom roles.
17
15
18
16
To learn more about custom roles in Azure RBAC, see [Azure custom roles](/azure/role-based-access-control/custom-roles).
19
17
20
-
## Example custom roles
18
+
Azure IoT operations also offers built-in roles designed to simplify and secure access management for Azure IoT Operations resources. For more information, see [Built-in RBAC roles for IoT Operations](../secure-iot-ops/built-in-rbac.md).
19
+
20
+
## Examples of custom roles
21
21
22
-
The following sections list the example Azure IoT Operations custom roles you can download and use:
22
+
The following sections list the example Azure IoT Operations custom roles you can download and use as reference. These custom roles are JSON files that list the specific permissions and scope for the role, which you should use as a starting point to create your own custom roles.
23
+
24
+
> [!NOTE]
25
+
> The following custom roles are examples only. You need to review and modify the permissions in the JSON files to suit your specific requirements.
23
26
24
27
### Onboarding roles
25
28
29
+
You can define an *Onboarding* role that grants sufficient permissions to a user to complete the Azure Arc connect process and deploy Azure IoT Operations securely.
30
+
26
31
| Custom role | Description |
27
32
| ----------- | ----------- |
28
33
|[Onboarding](https://github.com/Azure-Samples/explore-iot-operations/blob/main/samples/custom-rbac/Onboarding.json)| This is privileged role. The user can complete Azure Arc connect process and deploy Azure IoT Operations securely. |
29
34
30
35
### Viewer roles
31
36
37
+
You can define different *Viewer* roles that grant read-only access to the Azure IoT Operations instance and its resources. These roles are useful for users who need to monitor the instance without making changes.
38
+
32
39
| Custom role | Description |
33
40
| ----------- | ----------- |
34
41
|[Instance viewer](https://github.com/Azure-Samples/explore-iot-operations/blob/main/samples/custom-rbac/Instance%20Viewer.json)| This role allows the user to view the Azure IoT Operations instance. |
@@ -41,6 +48,8 @@ The following sections list the example Azure IoT Operations custom roles you ca
41
48
42
49
### Administrator roles
43
50
51
+
You can define different *Administrator* roles that grant full access to the Azure IoT Operations instance and its resources. These roles are useful for users who need to manage the instance and its resources.
52
+
44
53
| Custom role | Description |
45
54
| ----------- | ----------- |
46
55
|[Instance administrator](https://github.com/Azure-Samples/explore-iot-operations/blob/main/samples/custom-rbac/Instance%20Administrator.json)| This is privileged role. The user can deploy an instance. The role includes permissions to create and update instances, brokers, authentications, listeners, dataflow profiles, dataflow endpoints, schema registries, and user assigned identities. The role also includes permission to delete instances. |
0 commit comments