Skip to content

Commit b15fc8d

Browse files
authored
Merge pull request #102413 from JnHs/jh-azurelighthouse-databricksupport
remove Databricks note
2 parents 2c9c97c + b0c25b0 commit b15fc8d

File tree

3 files changed

+3
-9
lines changed

3 files changed

+3
-9
lines changed

articles/lighthouse/concepts/cross-tenant-management-experience.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Cross-tenant management experiences
33
description: Azure delegated resource management enables a cross-tenant management experience.
4-
ms.date: 02/07/2020
4+
ms.date: 02/14/2020
55
ms.topic: conceptual
66
---
77

@@ -126,7 +126,7 @@ With all scenarios, please be aware of the following current limitations:
126126

127127
- Requests handled by Azure Resource Manager can be performed using Azure delegated resource management. The operation URIs for these requests start with `https://management.azure.com`. However, requests that are handled by an instance of a resource type (such as KeyVault secrets access or storage data access) aren’t supported with Azure delegated resource management. The operation URIs for these requests typically start with an address that is unique to your instance, such as `https://myaccount.blob.core.windows.net` or `https://mykeyvault.vault.azure.net/`. The latter also are typically data operations rather than management operations.
128128
- Role assignments must use role-based access control (RBAC) [built-in roles](../../role-based-access-control/built-in-roles.md). All built-in roles are currently supported with Azure delegated resource management except for Owner or any built-in roles with [DataActions](../../role-based-access-control/role-definitions.md#dataactions) permission. The User Access Administrator role is supported only for limited use in [assigning roles to managed identities](../how-to/deploy-policy-remediation.md#create-a-user-who-can-assign-roles-to-a-managed-identity-in-the-customer-tenant). Custom roles and [classic subscription administrator roles](../../role-based-access-control/classic-administrators.md) are not supported.
129-
- Currently, you can’t onboard a subscription (or resource group within a subscription) for Azure delegated resource management if the subscription uses Azure Databricks. Similarly, if a subscription has been registered for onboarding with the **Microsoft.ManagedServices** resource provider, you won’t be able to create a Databricks workspace for that subscription at this time.
129+
- While you can onboard subscriptions that use Azure Databricks, users in the managing tenant can’t launch Azure Databricks workspaces on a delegated subscription at this time.
130130
- While you can onboard subscriptions and resource groups for Azure delegated resource management which have resource locks, those locks will not prevent actions from being performed by users in the managing tenant. [Deny assignments](../../role-based-access-control/deny-assignments.md) that protect system-managed resources, such as those created by Azure managed applications or Azure Blueprints (system-assigned deny assignments), do prevent users in the managing tenant from acting on those resources; however, at this time users in the customer tenant can’t create their own deny assignments (user-assigned deny assignments).
131131

132132
## Next steps

articles/lighthouse/how-to/onboard-customer.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Onboard a customer to Azure delegated resource management
33
description: Learn how to onboard a customer to Azure delegated resource management, allowing their resources to be accessed and managed through your own tenant.
4-
ms.date: 01/20/2020
4+
ms.date: 01/28/2020
55
ms.topic: conceptual
66
---
77

@@ -18,9 +18,6 @@ To track your impact across customer engagements and receive recognition, associ
1818
1919
The onboarding process requires actions to be taken from within both the service provider's tenant and from the customer's tenant. All of these steps are described in this article.
2020

21-
> [!IMPORTANT]
22-
> Currently, you can’t onboard a subscription (or resource group within a subscription) for Azure delegated resource management if the subscription uses Azure Databricks. Similarly, if a subscription has been registered for onboarding with the **Microsoft.ManagedServices** resource provider, you won’t be able to create a Databricks workspace for that subscription at this time.
23-
2421
## Gather tenant and subscription details
2522

2623
To onboard a customer's tenant, it must have an active Azure subscription. You'll need to know the following:

articles/lighthouse/how-to/publish-managed-services-offers.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -151,9 +151,6 @@ After a customer adds your offer, they'll be able to [delegate one or more speci
151151
152152
After the customer delegates a subscription (or one or more resource groups within a subscription), the **Microsoft.ManagedServices** resource provider will be registered for that subscription, and users in your tenant will be able to access the delegated resources according to the authorizations in your offer.
153153

154-
> [!NOTE]
155-
> At this time, subscriptions (or resource groups within a subscription) can't be delegated if the subscription uses Azure Databricks. Similarly, if a subscription (or resource groups within a subscription) has already been delegated, it currently isn't possible to create Databricks workspaces in that subscription.
156-
157154
## Next steps
158155

159156
- Learn about [cross-tenant management experiences](../concepts/cross-tenant-management-experience.md).

0 commit comments

Comments
 (0)