Skip to content

Commit b74b8b7

Browse files
authored
Merge pull request #100354 from JnHs/jh-deploy-sub
emphasized subscription-level deployment
2 parents 049f380 + 61b3822 commit b74b8b7

File tree

1 file changed

+10
-7
lines changed

1 file changed

+10
-7
lines changed

articles/lighthouse/how-to/onboard-customer.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Onboard a customer to Azure delegated resource management
33
description: Learn how to onboard a customer to Azure delegated resource management, allowing their resources to be accessed and managed through your own tenant.
4-
ms.date: 12/17/2019
4+
ms.date: 01/07/2020
55
ms.topic: conceptual
66
---
77

@@ -27,9 +27,12 @@ To onboard a customer's tenant, it must have an active Azure subscription. You'l
2727

2828
- The tenant ID of the service provider's tenant (where you will be managing the customer's resources)
2929
- The tenant ID of the customer's tenant (which will have resources managed by the service provider)
30-
- The subscription IDs for each specific subscription in the customer's tenant that will be managed by the service provider (or that contains the resource group(s) that will be managed by the service provider)
30+
- The subscription IDs for each specific subscription in the customer's tenant that will be managed by the service provider (or that contains the resource group(s) that will be managed by the service provider).
3131

32-
If you don't have this info already, you can retrieve it in one of the following ways. Be sure and use these exact values in your deployment.
32+
> [!NOTE]
33+
> Even if you only wish to onboard one or more resource groups within a subscription, the deployment must be done at the subscription level, so you'll need the subscription ID.
34+
35+
If you don't have these ID values already, you can retrieve them in one of the following ways. Be sure and use these exact values in your deployment.
3336

3437
### Azure portal
3538

@@ -108,9 +111,9 @@ To onboard your customer, you'll need to create an [Azure Resource Manager](../.
108111
|Field |Definition |
109112
|---------|---------|
110113
|**mspOfferName** |A name describing this definition. This value is displayed to the customer as the title of the offer. |
111-
|**mspOfferDescription** |A brief description of your offer (for example, "Contoso VM management offer"), |
114+
|**mspOfferDescription** |A brief description of your offer (for example, "Contoso VM management offer"). |
112115
|**managedByTenantId** |Your tenant ID. |
113-
|**authorizations** |The **principalId** values for the users/groups/SPNs from your tenant, each with a **principalIdDisplayName** to help your customer understand the purpose of the authorization, and mapped to a built-in **roleDefinitionId** value to specify the level of access, |
116+
|**authorizations** |The **principalId** values for the users/groups/SPNs from your tenant, each with a **principalIdDisplayName** to help your customer understand the purpose of the authorization, and mapped to a built-in **roleDefinitionId** value to specify the level of access. |
114117

115118
> [!TIP]
116119
> Be sure that your **managedByTenantID**, **principalIdDisplayName**, and **roleDefinitionId** entries are identical to the values used by Azure. Do not use any capital letters in these values.
@@ -127,7 +130,7 @@ The template you choose will depend on whether you are onboarding an entire subs
127130
|Subscription (when using an offer published to Azure Marketplace) |[marketplaceDelegatedResourceManagement.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/Azure-Delegated-Resource-Management/templates/marketplace-delegated-resource-management/marketplaceDelegatedResourceManagement.json) |[marketplaceDelegatedResourceManagement.parameters.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/Azure-Delegated-Resource-Management/templates/marketplace-delegated-resource-management/marketplaceDelegatedResourceManagement.parameters.json) |
128131

129132
> [!IMPORTANT]
130-
> The process described here requires a separate deployment for each subscription being onboarded, even if they are in the same customer tenant. Separate deployments are also required if you are onboarding multiple resource groups within different subscriptions in the same customer tenant. However, onboarding multiple resource groups within a single subscription can be done in one deployment.
133+
> The process described here requires a separate subscription-level deployment for each subscription being onboarded, even if you are onboarding subscriptions in the same customer tenant. Separate deployments are also required if you are onboarding multiple resource groups within different subscriptions in the same customer tenant. However, onboarding multiple resource groups within a single subscription can be done in one subscription-level deployment.
131134
>
132135
> Separate deployments are also required for multiple offers being applied to the same subscription (or resource groups within a subscription). Each offer applied must use a different **mspOfferName**.
133136
@@ -193,7 +196,7 @@ Once you have updated your parameter file, a user in the customer's tenant must
193196
Because this is a subscription-level deployment, it cannot be initiated in the Azure portal. The deployment may be done by using PowerShell or Azure CLI, as shown below.
194197

195198
> [!IMPORTANT]
196-
> This deployment must be done by a non-guest account in the customer’s tenant who has the [Owner built-in role](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#owner) for the subscription being onboarded (or which contains the resource groups that are being onboarded). To see all users who can delegate the subscription, a user in the customer's tenant can select the subscription in the Azure portal, open **Access control (IAM)**, [list all roles](../../role-based-access-control/role-definitions-list.md#list-all-roles), then select **Owner** to see all users with that role.
199+
> This subscription-level deployment must be done by a non-guest account in the customer’s tenant who has the [Owner built-in role](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#owner) for the subscription being onboarded (or which contains the resource groups that are being onboarded). To see all users who can delegate the subscription, a user in the customer's tenant can select the subscription in the Azure portal, open **Access control (IAM)**, [list all roles](../../role-based-access-control/role-definitions-list.md#list-all-roles), then select **Owner** to see all users with that role.
197200
198201
### PowerShell
199202

0 commit comments

Comments
 (0)