Skip to content

Commit 7a0073b

Browse files
Merge pull request #257660 from chen-karen/main
updating RBAC documentation
2 parents dcb6c7c + fc92937 commit 7a0073b

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/key-vault/managed-hsm/built-in-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,15 @@ author: mbaldwin
77
ms.service: key-vault
88
ms.subservice: managed-hsm
99
ms.topic: reference
10-
ms.date: 01/04/2023
10+
ms.date: 11/06/2023
1111
ms.author: mbaldwin
1212

1313
---
1414
# Local RBAC built-in roles for Managed HSM
1515

1616
Azure Key Vault Managed HSM local role-based access control (RBAC) has several built-in roles. You can assign these roles to users, service principals, groups, and managed identities.
1717

18-
To allow a principal to perform an operation, you must assign them a role that grants them permissions to perform that operations. All these roles and operations allow you to manage permissions only for *data plane* operations.
18+
To allow a principal to perform an operation, you must assign them a role that grants them permissions to perform that operations. All these roles and operations allow you to manage permissions only for *data plane* operations. For *management plane* operations, see [Azure built-in roles](../../role-based-access-control/built-in-roles.md) and [Secure access to your managed HSMs](secure-your-managed-hsm.md).
1919

2020
To manage control plane permissions for the Managed HSM resource, you must use [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md). Some examples of control plane operations are to create a new managed HSM, or to update, move, or delete a managed HSM.
2121

articles/key-vault/managed-hsm/secure-your-managed-hsm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.custom: devx-track-azurecli
99
ms.service: key-vault
1010
ms.subservice: managed-hsm
1111
ms.topic: tutorial
12-
ms.date: 11/14/2022
12+
ms.date: 11/06/2023
1313
ms.author: mbaldwin
1414
# Customer intent: As a managed HSM administrator, I want to set access control and configure the Managed HSM, so that I can ensure it's secure and auditors can properly monitor all activities for this Managed HSM.
1515
---
@@ -84,7 +84,7 @@ The following table summarizes the role assignments to teams and resources to ac
8484

8585
The three team roles need access to other resources along with managed HSM permissions. To deploy VMs (or the Web Apps feature of Azure App Service), developers and operators need `Contributor` access to those resource types. Auditors need read access to the Storage account where the managed HSM logs are stored.
8686

87-
To assign management plane roles (Azure RBAC) you can use Azure portal or any of the other management interfaces such as Azure CLI or Azure PowerShell. To assign managed HSM data plane roles you must use Azure CLI.
87+
To assign management plane roles (Azure RBAC) you can use Azure portal or any of the other management interfaces such as Azure CLI or Azure PowerShell. To assign managed HSM data plane roles you must use Azure CLI. For more information on management plane roles, see [Azure built-in roles](../../role-based-access-control/built-in-roles.md). For more information on Managed HSM data plane roles, see [Local RBAC built-in roles for Managed HSM](built-in-roles.md).
8888

8989
The Azure CLI snippets in this section are built with the following assumptions:
9090

0 commit comments

Comments
 (0)