Skip to content

Commit 9be79c3

Browse files
authored
Merge pull request #88989 from JnHs/jh-lh-091819
clarifications
2 parents 2e4f9c8 + 108879a commit 9be79c3

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/lighthouse/how-to/onboard-customer.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to onboard a customer to Azure delegated resource managem
44
author: JnHs
55
ms.author: jenhayes
66
ms.service: lighthouse
7-
ms.date: 08/29/2019
7+
ms.date: 09/19/2019
88
ms.topic: overview
99
manager: carmonm
1010
---
@@ -15,7 +15,7 @@ This article explains how you, as a service provider, can onboard a customer to
1515

1616
You can repeat this process if you are managing resources for multiple customers. Then, when an authorized user signs in to your tenant, that user can be authorized across customer tenancy scopes to perform management operations without having to sign in to every individual customer tenant.
1717

18-
You can associate your Microsoft Partner Network (MPN) ID with your onboarded subscriptions to track your impact across customer engagements and receive recognition. For more info, see [Link a partner ID to your Azure accounts](https://docs.microsoft.com/azure/billing/billing-partner-admin-link-started). Note that you'll need to perform this association separately for each customer tenant in which you're managing resources.
18+
You can associate your Microsoft Partner Network (MPN) ID with your onboarded subscriptions to track your impact across customer engagements and receive recognition. For more info, see [Link a partner ID to your Azure accounts](https://docs.microsoft.com/azure/billing/billing-partner-admin-link-started). Note that you'll need to perform this association in your service provider tenant.
1919

2020
> [!NOTE]
2121
> Customers can be onboarded automatically when they purchase a managed services offer (public or private) that you published to Azure Marketplace. For more info, see [Publish Managed Services offers to Azure Marketplace](publish-managed-services-offers.md). You can also use the onboarding process described here with an offer published to Azure Marketplace.

articles/lighthouse/how-to/publish-managed-services-offers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to publish a managed service offer that onboards customer
44
author: JnHs
55
ms.author: jenhayes
66
ms.service: lighthouse
7-
ms.date: 08/29/2019
7+
ms.date: 09/19/2019
88
ms.topic: overview
99
manager: carmonm
1010
---
@@ -66,7 +66,7 @@ Finally, complete the **Manifest Details** section. This creates a manifest with
6666
- **Azure AD Object ID**: The Azure AD identifier of a user, user group, or application which will be granted certain permissions (as described by the Role Definition) to your customers' resources.
6767
- **Azure AD Object Display Name**: A friendly name to help the customer understand the purpose of this authorization. The customer will see this name when delegating resources.
6868
- **Role Definition**: Select one of the available Azure AD built-in roles from the list. This role will determine the permissions that the user in the **Azure AD Object ID** field will have on your customers' resources. For info about these roles, see [Built-in roles](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles).
69-
- **Assignable Roles**: If you have selected User Access Administrator in the **Role Definition** for this authorization, you can add one or more assignable roles here. The user in the **Azure AD Object ID** field will be able to assign these **Assignable Roles** to [managed identities](https://docs.microsoft.com/azure/managed-applications/publish-managed-identity). Note that no other permissions normally associated with the User Access Administrator role will apply to this user. (If you did not select User Access Administrator for this user’s Role Definition, this field has no effect.)
69+
- **Assignable Roles**: This is required only if you have selected User Access Administrator in the **Role Definition** for this authorization. If so, you must add one or more assignable roles here. The user in the **Azure AD Object ID** field will be able to assign these **Assignable Roles** to [managed identities](https://docs.microsoft.com/azure/managed-applications/publish-managed-identity). Note that no other permissions normally associated with the User Access Administrator role will apply to this user. If you do not select one or more roles here, your submission will not pass certification. (If you did not select User Access Administrator for this user’s Role Definition, this field has no effect.)
7070

7171
> [!TIP]
7272
> In most cases, you'll want to assign permissions to an Azure AD user group or service principal, rather than to a series of individual user accounts. This lets you add or remove access for individual users without having to update and republish the plan when your access requirements change.

0 commit comments

Comments
 (0)