You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert

26
26
27
-
Using Azure delegated resource management, authorized users can sign in to the service provider’s tenant to access these resources, as shown here:
27
+
Using Azure delegated resource management, authorized users can sign in to the service provider's tenant to access these resources, as shown here:
28
28
29
29

30
30
@@ -58,6 +58,7 @@ Most tasks and services can be performed on delegated resources across managed t
58
58
59
59
- Back up and restore customer data in customer tenants
60
60
- Use the [Backup Explorer](../../backup/monitor-azure-backup-with-backup-explorer.md) to help view operational information of backup items (including Azure resources not yet configured for backup) and monitoring information (jobs and alerts) for delegated subscriptions. The Backup Explorer is currently available only for Azure VM data.
61
+
- Use [Backup Reports](../../backup/configure-reports.md) across delegated subscriptions to track historical trends, analyze backup storage consumption, and audit backups and restores.
61
62
62
63
[Azure Kubernetes Service (AKS)](../../aks/index.yml):
63
64
@@ -85,15 +86,15 @@ Most tasks and services can be performed on delegated resources across managed t
- Monitor compliance to security policies and ensure security coverage across all tenants’ resources
89
+
- Monitor compliance to security policies and ensure security coverage across all tenants' resources
89
90
- Continuous regulatory compliance monitoring across multiple customers in a single view
90
91
- Monitor, triage, and prioritize actionable security recommendations with secure score calculation
91
92
- Cross-tenant security posture management
92
93
- Manage security policies
93
94
- Take action on resources that are out of compliance with actionable security recommendations
94
95
- Collect and store security-related data
95
96
- Cross-tenant threat detection and protection
96
-
- Detect threats across tenants’ resources
97
+
- Detect threats across tenants' resources
97
98
- Apply advanced threat protection controls such as just-in-time (JIT) VM access
98
99
- Harden network security group configuration with Adaptive Network Hardening
99
100
- Ensure servers are running only the applications and processes they should be with adaptive application controls
@@ -131,10 +132,10 @@ Support requests:
131
132
## Current limitations
132
133
With all scenarios, please be aware of the following current limitations:
133
134
134
-
- Requests handled by Azure Resource Manager can be performed using Azure delegated resource management. The operation URIs for these requests start with `https://management.azure.com`. However, requests that are handled by an instance of a resource type (such as KeyVault secrets access or storage data access) aren’t supported with Azure delegated resource management. The operation URIs for these requests typically start with an address that is unique to your instance, such as `https://myaccount.blob.core.windows.net` or `https://mykeyvault.vault.azure.net/`. The latter also are typically data operations rather than management operations.
135
+
- Requests handled by Azure Resource Manager can be performed using Azure delegated resource management. The operation URIs for these requests start with `https://management.azure.com`. However, requests that are handled by an instance of a resource type (such as KeyVault secrets access or storage data access) aren't supported with Azure delegated resource management. The operation URIs for these requests typically start with an address that is unique to your instance, such as `https://myaccount.blob.core.windows.net` or `https://mykeyvault.vault.azure.net/`. The latter also are typically data operations rather than management operations.
135
136
- Role assignments must use role-based access control (RBAC) [built-in roles](../../role-based-access-control/built-in-roles.md). All built-in roles are currently supported with Azure delegated resource management except for Owner or any built-in roles with [DataActions](../../role-based-access-control/role-definitions.md#dataactions) permission. The User Access Administrator role is supported only for limited use in [assigning roles to managed identities](../how-to/deploy-policy-remediation.md#create-a-user-who-can-assign-roles-to-a-managed-identity-in-the-customer-tenant). Custom roles and [classic subscription administrator roles](../../role-based-access-control/classic-administrators.md) are not supported.
136
-
- While you can onboard subscriptions that use Azure Databricks, users in the managing tenant can’t launch Azure Databricks workspaces on a delegated subscription at this time.
137
-
- While you can onboard subscriptions and resource groups for Azure delegated resource management which have resource locks, those locks will not prevent actions from being performed by users in the managing tenant. [Deny assignments](../../role-based-access-control/deny-assignments.md) that protect system-managed resources, such as those created by Azure managed applications or Azure Blueprints (system-assigned deny assignments), do prevent users in the managing tenant from acting on those resources; however, at this time users in the customer tenant can’t create their own deny assignments (user-assigned deny assignments).
137
+
- While you can onboard subscriptions that use Azure Databricks, users in the managing tenant can't launch Azure Databricks workspaces on a delegated subscription at this time.
138
+
- While you can onboard subscriptions and resource groups for Azure delegated resource management which have resource locks, those locks will not prevent actions from being performed by users in the managing tenant. [Deny assignments](../../role-based-access-control/deny-assignments.md) that protect system-managed resources, such as those created by Azure managed applications or Azure Blueprints (system-assigned deny assignments), do prevent users in the managing tenant from acting on those resources; however, at this time users in the customer tenant can't create their own deny assignments (user-assigned deny assignments).
0 commit comments