Skip to content

Commit 9f4c50f

Browse files
authored
Update configuration-infrastructure.md
1 parent 3a49666 commit 9f4c50f

File tree

1 file changed

+11
-0
lines changed

1 file changed

+11
-0
lines changed

articles/application-gateway/configuration-infrastructure.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,17 @@ Subnet Size /24 = 255 IP addresses - 5 reserved from the platform = 250 availabl
5454
> [!TIP]
5555
> It is possible to change the subnet of an existing Application Gateway within the same virtual network. You can do this using Azure PowerShell or Azure CLI. For more information, see [Frequently asked questions about Application Gateway](application-gateway-faq.yml#can-i-change-the-virtual-network-or-subnet-for-an-existing-application-gateway)
5656
57+
### VNet permissions to create and deploy an Application Gateway
58+
59+
To enhance the security posture, permission checks are enforced to create and deploy an Application Gateway inside a VNET.Please follow the below steps to check if you have the permissions and add the required permissions.
60+
61+
- [Check your RBAC policy](../role-based-access-control/role-assignments-list-portal.md) to verify that the users and service principals who operate application gateways have permissions that include the action **Microsoft.Network/virtualNetworks/subnets/join/action** (Join Virtual Network)
62+
- For more details on available permissions, visit [permissions](../virtual-network/virtual-network-manage-subnet.md)
63+
64+
- Update any assigned roles that don’t have the appropriate permissions.
65+
66+
- If a [built-in](../role-based-access-control/built-in-roles.md) role doesn't provide the right permission, [create and assign a custom role](../role-based-access-control/custom-roles-portal.md) to achieve this.
67+
5768
## Network security groups
5869

5970
Network security groups (NSGs) are supported on Application Gateway. But there are some restrictions:

0 commit comments

Comments
 (0)