Skip to content

Commit bcc35ce

Browse files
authored
Merge pull request #194774 from dksimpson/1912257-RBAC-fix-24
Update RBAC role assignment steps - batch 24
2 parents c7a5a20 + 521eb48 commit bcc35ce

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed

articles/azure-sql/database/audit-write-storage-account-behind-vnet-firewall.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ author: sravanisaluru
99
ms.author: srsaluru
1010
ms.date: "03/23/2022"
1111
ms.reviewer: kendralittle, vanto, mathoma
12-
ms.custom: azure-synapse
12+
ms.custom: azure-synapse, subject-rbac-steps
1313
---
1414
# Write audit to a storage account behind VNet and firewall
1515
[!INCLUDE[appliesto-sqldb-asa](../includes/appliesto-sqldb-asa.md)]
@@ -112,12 +112,14 @@ To configure SQL Audit to write events to a storage account behind a VNet or Fir
112112
}
113113
```
114114

115-
2. Open [Azure portal](https://portal.azure.com). Navigate to your storage account. Locate **Access Control (IAM)**, and click **Add role assignment**. Assign **Storage Blob Data Contributor** Azure role to the server hosting the database that you registered with Azure Active Directory (Azure AD) as in the previous step.
115+
1. Assign the Storage Blob Data Contributor role to the server hosting the database that you registered with Azure Active Directory (Azure AD) in the previous step.
116+
117+
For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
116118

117119
> [!NOTE]
118120
> Only members with Owner privilege can perform this step. For various Azure built-in roles, refer to [Azure built-in roles](../../role-based-access-control/built-in-roles.md).
119121
120-
3. Configure the [server's blob auditing policy](/rest/api/sql/server%20auditing%20settings/createorupdate), without specifying a *storageAccountAccessKey*:
122+
1. Configure the [server's blob auditing policy](/rest/api/sql/server%20auditing%20settings/createorupdate), without specifying a *storageAccountAccessKey*:
121123

122124
Sample request
123125

articles/cosmos-db/sql/certificate-based-authentication.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88
ms.date: 06/11/2019
99
ms.author: jroth
1010
ms.reviewer: sngun
11-
ms.custom: devx-track-azurepowershell
11+
ms.custom: devx-track-azurepowershell, subject-rbac-steps
1212

1313
---
1414

@@ -106,13 +106,11 @@ The above command results in the output similar to the screenshot below:
106106

107107
1. Sign into the [Azure portal](https://portal.azure.com/).
108108

109-
1. Navigate to your Azure Cosmos account, open the **Access control (IAM)** blade.
109+
1. Navigate to your Azure Cosmos account.
110110

111-
1. Select **Add** and **Add role assignment**. Add the sampleApp you created in the previous step with **Contributor** role as shown in the following screenshot:
111+
1. Assign the Contributor role to the sample app you created in the previous section.
112112

113-
:::image type="content" source="./media/certificate-based-authentication/configure-cosmos-account-with-identify.png" alt-text="Configure Azure Cosmos account to use the new identity":::
114-
115-
1. Select **Save** after you fill out the form
113+
For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
116114

117115
## Register your certificate with Azure AD
118116

0 commit comments

Comments
 (0)