You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/manage-mqtt-broker/howto-configure-authorization.md
+61-63Lines changed: 61 additions & 63 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -170,7 +170,7 @@ Because the `principals` field is a logical OR, you can further restrict access
170
170
171
171
# [Portal](#tab/portal)
172
172
173
-
In the **Broker authorization details** for your authorization policy, use the following configuration:
173
+
In the broker authorization rules for your authorization policy, use the following configuration:
174
174
175
175
```json
176
176
[
@@ -207,6 +207,8 @@ In the **Broker authorization details** for your authorization policy, use the f
207
207
208
208
# [Bicep](#tab/bicep)
209
209
210
+
To edit an authorization policy, create a Bicep `.bicep` file with the following content. Update the settings as needed, and replace the placeholder values like `<AIO_INSTANCE_NAME>` with your own.
@@ -331,7 +333,7 @@ As the application has an authorization attribute called `authz-sat`, there's no
331
333
332
334
# [Portal](#tab/portal)
333
335
334
-
In the **Broker authorization details** for your authorization policy, use the following configuration:
336
+
In the Broker authorization rules for your authorization policy, use the following configuration:
335
337
336
338
```json
337
339
[
@@ -370,6 +372,8 @@ In the **Broker authorization details** for your authorization policy, use the f
370
372
371
373
# [Bicep](#tab/bicep)
372
374
375
+
To edit an authorization policy, create a Bicep `.bicep` file with the following content. Update the settings as needed, and replace the placeholder values like `<AIO_INSTANCE_NAME>` with your own.
@@ -543,7 +547,7 @@ The `method` field specifies the access level.
543
547
544
548
The `keyType` field specifies the type of key matching.
545
549
- `pattern`to use *glob* style pattern matching
546
-
- `string`to do exact match, for example when a key contains characters that might be otherwise matched as a pettern (`*`, `?`, `[0-9]`)
550
+
- `string`to do exact match, for example when a key contains characters that might be otherwise matched as a pattern (`*`, `?`, `[0-9]`)
547
551
- `binary`to match a binary key
548
552
549
553
The `keys` field specifies the keys to match. The keys can be specified as *Glob* style patterns, token substitutions, or exact strings.
@@ -561,72 +565,66 @@ Here's an example of how you might author your state store resources:
561
565
562
566
# [Portal](#tab/portal)
563
567
564
-
1. In the Azure portal, navigate to your IoT Operations instance.
565
-
1. Under **Azure IoT Operations resources**, select **MQTT Broker**.
566
-
1. Select the **Authorization** tab.
567
-
1. Choose an existing authentication policy or create a new one by selecting **Create authorization policy**.
568
-
1. In the **Rules** field, add a configuration similar to the following:
569
-
570
-
:::image type="content" source="media/howto-configure-authorization/state-store-resources.png" alt-text="Screenshot using the Azure portal to configure a broker policy with state store resources.":::
568
+
In the Broker authorization rules for your authorization policy, add a similar configuration:
To edit an authorization policy, create a Bicep `.bicep` file with the following content. Update the settings as needed, and replace the placeholder values like `<AIO_INSTANCE_NAME>` with your own.
0 commit comments