Skip to content

Commit 8926961

Browse files
committed
add mention to the resource
1 parent 1b0f63e commit 8926961

File tree

2 files changed

+10
-12
lines changed

2 files changed

+10
-12
lines changed

articles/iot-operations/connect-to-cloud/howto-configure-kafka-endpoint.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -371,14 +371,13 @@ The secret must be in the same namespace as the Kafka dataflow endpoint. The sec
371371

372372
### System-assigned managed identity
373373

374-
Before you configure the dataflow endpoint, assign a role to the Azure IoT Operations managed identity that grants permission to connect to the cloud resource:
374+
Before you configure the dataflow endpoint, assign a role to the Azure IoT Operations managed identity that grants permission to connect to the Kafka broker:
375375

376376
1. In Azure portal, go to your Azure IoT Operations instance and select **Overview**.
377377
1. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*.
378-
1. Your system-assigned managed identity can be found using the same name of the Azure IoT Operations Arc extension.
379-
1. Go to the cloud resource you need to grant permissions > **Access control (IAM)** > **Add role assignment**.
378+
1. Go to the cloud resource you need to grant permissions. For example, go to the Event Hubs namespace > **Access control (IAM)** > **Add role assignment**.
380379
1. On the **Role** tab select an appropriate role.
381-
1. On the **Members** tab, for **Assign access to**, select **User, group, or service principal** option, then select **+ Select members** and search for the name of the Azure IoT Operations Arc extension. For example, *azure-iot-operations-xxxx7*.
380+
1. On the **Members** tab, for **Assign access to**, select **User, group, or service principal** option, then select **+ Select members** and search for the Azure IoT Operations managed identity. For example, *azure-iot-operations-xxxx7*.
382381

383382
Then, configure the dataflow endpoint with system-assigned managed identity settings.
384383

@@ -444,9 +443,9 @@ kafkaSettings:
444443

445444
To use user-assigned managed identity for authentication, you must first deploy Azure IoT Operations with secure settings enabled. Then you need to [set up a user-assigned managed identity for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections). To learn more, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
446445

447-
Before you configure the dataflow endpoint, assign a role to the user-assigned managed identity that grants permission to connect to the cloud resource:
446+
Before you configure the dataflow endpoint, assign a role to the user-assigned managed identity that grants permission to connect to the Kafka broker:
448447

449-
1. In Azure portal, go to the cloud resource you need to grant permissions > **Access control (IAM)** > **Add role assignment**.
448+
1. In Azure portal, go to the cloud resource you need to grant permissions. For example, go to the Event Grid namespace > **Access control (IAM)** > **Add role assignment**.
450449
1. On the **Role** tab select an appropriate role.
451450
1. On the **Members** tab, for **Assign access to**, select **Managed identity** option, then select **+ Select members** and search for your user-assigned managed identity.
452451

articles/iot-operations/connect-to-cloud/howto-configure-mqtt-endpoint.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -489,14 +489,13 @@ mqttSettings:
489489

490490
### System-assigned managed identity
491491

492-
Before you configure the dataflow endpoint, assign a role to the Azure IoT Operations managed identity that grants permission to connect to the cloud resource:
492+
Before you configure the dataflow endpoint, assign a role to the Azure IoT Operations managed identity that grants permission to connect to the MQTT broker:
493493

494494
1. In Azure portal, go to your Azure IoT Operations instance and select **Overview**.
495495
1. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*.
496-
1. Your system-assigned managed identity can be found using the same name of the Azure IoT Operations Arc extension.
497-
1. Go to the cloud resource you need to grant permissions > **Access control (IAM)** > **Add role assignment**.
496+
1. Go to the cloud resource you need to grant permissions. For example, go to the Event Grid namespace > **Access control (IAM)** > **Add role assignment**.
498497
1. On the **Role** tab select an appropriate role.
499-
1. On the **Members** tab, for **Assign access to**, select **User, group, or service principal** option, then select **+ Select members** and search for the name of the Azure IoT Operations Arc extension. For example, *azure-iot-operations-xxxx7*.
498+
1. On the **Members** tab, for **Assign access to**, select **User, group, or service principal** option, then select **+ Select members** and search for the Azure IoT Operations managed identity. For example, *azure-iot-operations-xxxx7*.
500499

501500
Then, configure the dataflow endpoint with system-assigned managed identity settings.
502501

@@ -563,9 +562,9 @@ mqttSettings:
563562

564563
To use user-assigned managed identity for authentication, you must first deploy Azure IoT Operations with secure settings enabled. Then you need to [set up a user-assigned managed identity for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections). To learn more, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
565564

566-
Before you configure the dataflow endpoint, assign a role to the user-assigned managed identity that grants permission to connect to the cloud resource:
565+
Before you configure the dataflow endpoint, assign a role to the user-assigned managed identity that grants permission to connect to the MQTT broker:
567566

568-
1. In Azure portal, go to the cloud resource you need to grant permissions > **Access control (IAM)** > **Add role assignment**.
567+
1. In Azure portal, go to the cloud resource you need to grant permissions. For example, go to the Event Grid namespace > **Access control (IAM)** > **Add role assignment**.
569568
1. On the **Role** tab select an appropriate role.
570569
1. On the **Members** tab, for **Assign access to**, select **Managed identity** option, then select **+ Select members** and search for your user-assigned managed identity.
571570

0 commit comments

Comments
 (0)