Skip to content

Commit ad41c06

Browse files
committed
updated RBAC
1 parent 0d42949 commit ad41c06

File tree

5 files changed

+10
-10
lines changed

5 files changed

+10
-10
lines changed

articles/active-directory-domain-services/create-resource-forest-powershell.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/27/2020
11+
ms.date: 03/07/2022
1212
ms.author: justinha
1313
ms.custom: devx-track-azurepowershell
1414

@@ -51,8 +51,8 @@ To complete this article, you need the following resources and privileges:
5151
* Install and configure Azure AD PowerShell.
5252
* If needed, follow the instructions to [install the Azure AD PowerShell module and connect to Azure AD](/powershell/azure/active-directory/install-adv2).
5353
* Make sure that you sign in to your Azure AD tenant using the [Connect-AzureAD][Connect-AzureAD] cmdlet.
54-
* You need *global administrator* privileges in your Azure AD tenant to enable Azure AD DS.
55-
* You need *Contributor* privileges in your Azure subscription to create the required Azure AD DS resources.
54+
* You need [Application Administrator](/azure/active-directory/roles/permissions-reference#application-administrator) and [Groups Administrator](/azure/active-directory/roles/permissions-reference#groups-administrator) Azure AD roles in your tenant to enable Azure AD DS.
55+
* You need [Contributor](/azure/role-based-access-control/built-in-roles#contributor) Azure role to create the required Azure AD DS resources.
5656

5757
## Sign in to the Azure portal
5858

articles/active-directory-domain-services/csp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 07/09/2020
12+
ms.date: 03/07/2022
1313
ms.author: justinha
1414

1515
---
@@ -49,7 +49,7 @@ There are two ways in which you can use Azure AD DS with an Azure CSP subscripti
4949

5050
In this deployment model, Azure AD DS is enabled within a virtual network that belongs to the Azure CSP subscription. The CSP partner's admin agents have the following privileges:
5151

52-
* *Global administrator* privileges in the customer's Azure AD tenant.
52+
* You need [Application Administrator](/azure/active-directory/roles/permissions-reference#application-administrator) and [Groups Administrator](/azure/active-directory/roles/permissions-reference#groups-administrator) Azure AD roles in your tenant to enable Azure AD DS.
5353
* *Subscription owner* privileges on the Azure CSP subscription.
5454

5555
![Direct deployment model](./media/csp/csp_direct_deployment_model.png)

articles/active-directory-domain-services/deploy-azure-app-proxy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 07/09/2020
13+
ms.date: 03/07/2022
1414
ms.author: justinha
1515

1616
---

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 08/11/2021
11+
ms.date: 03/07/2022
1212
ms.author: justinha
1313
ms.custom: devx-track-azurepowershell
1414

@@ -198,7 +198,7 @@ To prepare the managed domain for migration, complete the following steps:
198198
199199
1. Create a variable to hold the credentials for by the migration script using the [Get-Credential][get-credential] cmdlet.
200200
201-
The user account you specify needs *global administrator* privileges in your Azure AD tenant to enable Azure AD DS and then *Contributor* privileges in your Azure subscription to create the required Azure AD DS resources.
201+
The user account you specify needs [Application Administrator](/azure/active-directory/roles/permissions-reference#application-administrator) and [Groups Administrator](/azure/active-directory/roles/permissions-reference#groups-administrator) Azure AD roles in your tenant to enable Azure AD DS and [Contributor](/azure/role-based-access-control/built-in-roles#contributor) Azure role to create the required Azure AD DS resources.
202202
203203
When prompted, enter an appropriate user account and password:
204204

articles/active-directory-domain-services/powershell-scoped-synchronization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/08/2021
12+
ms.date: 03/07/2022
1313
ms.author: justinha
1414
ms.custom: devx-track-azurepowershell
1515

@@ -32,7 +32,7 @@ To complete this article, you need the following resources and privileges:
3232
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3333
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
3434
* If needed, complete the tutorial to [create and configure an Azure Active Directory Domain Services managed domain][tutorial-create-instance].
35-
* You need *global administrator* privileges in your Azure AD tenant to change the Azure AD DS synchronization scope.
35+
* You need [Application Administrator](/azure/active-directory/roles/permissions-reference#application-administrator) and [Groups Administrator](/azure/active-directory/roles/permissions-reference#groups-administrator) Azure AD roles in your tenant to change the Azure AD DS synchronization scope.
3636

3737
## Scoped synchronization overview
3838

0 commit comments

Comments
 (0)