Skip to content

Commit bee2347

Browse files
authored
Merge pull request #297475 from mumian/0321-eudb-portal
add the portal information
2 parents cdb3c03 + 6377977 commit bee2347

File tree

3 files changed

+70
-47
lines changed

3 files changed

+70
-47
lines changed

articles/azure-resource-manager/management/manage-data-boundary.md

Lines changed: 70 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Configure data boundary
33
description: Learn how to configure data boundary.
44
ms.topic: how-to
5-
ms.date: 02/11/2025
5+
ms.date: 04/01/2025
66
ms.custom: devx-track-azurepowershell, devx-track-azurecli
77
# Customer intent: As an Azure user, I want to create a new data boundary.
88
---
@@ -31,55 +31,59 @@ To configure data boundary, the `DataBoundaryTenantAdministrator` built-in role
3131
1. Elevate access to manage all Azure subscriptions and management groups. For more information, see [Elevate access to manage all Azure subscriptions and management groups](../../role-based-access-control/elevate-access-global-admin.md).
3232
1. With the User Access Administrator privilege, grant yourself the `DataBoundaryTenantAdministrator` role at the tenant scope (`/`) by using Azure CLI or Azure PowerShell or REST API.
3333

34-
# [Azure CLI](#tab/azure-cli)
34+
### [Azure portal](#tab/azure-portal)
3535

36-
```azurecli
37-
DATA_BOUNDARY_TENANT_ADMINISTRATOR_ROLE_ID="d1a38570-4b05-4d70-b8e4-1100bcf76d12"
38-
39-
az role assignment create --assignee "{assignee}" --role DATA_BOUNDARY_TENANT_ADMINISTRATOR_ROLE_ID --scope "/"
40-
```
36+
Not supported by the Azure portal. Use Azure CLI or Azure PowerShell or REST API instead.
4137

42-
# [PowerShell](#tab/azure-powershell)
38+
### [Azure CLI](#tab/azure-cli)
4339

44-
```azurepowershell
45-
$dataBoundaryTenantAdministratorRoleDefinitionId = "d1a38570-4b05-4d70-b8e4-1100bcf76d12"
46-
47-
New-AzRoleAssignment -ObjectId <objectId> -RoleDefinitionId $dataBoundaryTenantAdministratorRoleDefinitionId -Scope "/"
48-
```
40+
```azurecli
41+
DATA_BOUNDARY_TENANT_ADMINISTRATOR_ROLE_ID="d1a38570-4b05-4d70-b8e4-1100bcf76d12"
42+
43+
az role assignment create --assignee "{assignee}" --role DATA_BOUNDARY_TENANT_ADMINISTRATOR_ROLE_ID --scope "/"
44+
```
4945
50-
# [REST API](#tab/rest-api)
51-
52-
```http
53-
PUT https://management.azure.com/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName}?api-version=2020-04-01-preview
54-
```
55-
56-
Request body:
57-
58-
```json
59-
{
60-
"properties": {
61-
"roleDefinitionId": "/providers/Microsoft.Authorization/roleDefinitions/d1a38570-4b05-4d70-b8e4-1100bcf76d12",
62-
"principalId": "{assignee}"
46+
### [PowerShell](#tab/azure-powershell)
47+
48+
```azurepowershell
49+
$dataBoundaryTenantAdministratorRoleDefinitionId = "d1a38570-4b05-4d70-b8e4-1100bcf76d12"
50+
51+
New-AzRoleAssignment -ObjectId <objectId> -RoleDefinitionId $dataBoundaryTenantAdministratorRoleDefinitionId -Scope "/"
52+
```
53+
54+
### [REST API](#tab/rest-api)
55+
56+
```http
57+
PUT https://management.azure.com/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName}?api-version=2020-04-01-preview
58+
```
59+
60+
Request body:
61+
62+
```json
63+
{
64+
"properties": {
65+
"roleDefinitionId": "/providers/Microsoft.Authorization/roleDefinitions/d1a38570-4b05-4d70-b8e4-1100bcf76d12",
66+
"principalId": "{assignee}"
67+
}
6368
}
64-
}
65-
```
66-
67-
Response body:
68-
69-
```json
70-
{
71-
"id": "/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName}",
72-
"type": "Microsoft.Authorization/roleAssignments",
73-
"name": "{roleAssignmentName}",
74-
"properties": {
75-
"roleDefinitionId": "/providers/Microsoft.Authorization/roleDefinitions/d1a38570-4b05-4d70-b8e4-1100bcf76d12",
76-
"principalId": "{assignee}",
77-
"principalType": "User", // Could also be "Group", "ServicePrincipal", etc.
69+
```
70+
71+
Response body:
72+
73+
```json
74+
{
75+
"id": "/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName}",
76+
"type": "Microsoft.Authorization/roleAssignments",
77+
"name": "{roleAssignmentName}",
78+
"properties": {
79+
"roleDefinitionId": "/providers/Microsoft.Authorization/roleDefinitions/d1a38570-4b05-4d70-b8e4-1100bcf76d12",
80+
"principalId": "{assignee}",
81+
"principalType": "User", // Could also be "Group", "ServicePrincipal", etc.
82+
}
7883
}
79-
}
80-
```
81-
82-
---
84+
```
85+
86+
---
8387
8488
For more information, see [Assign Azure roles](../../role-based-access-control/role-assignments-powershell.md).
8589
@@ -94,7 +98,19 @@ Data boundary geo currently has two options:
9498
9599
To opt in a tenant to data boundary, use the following commands.
96100
97-
# [Azure CLI](#tab/azure-cli)
101+
### [Azure portal](#tab/azure-portal)
102+
103+
Use these steps to create a data boundary:
104+
105+
1. Open the [Azure portal](https://portal.azure.com).
106+
1. In the search box, type **azure data boundaries**, and then select **Azure Data Boundaries**.
107+
1. In **Boundary region**, select data boundary geo, either `Global` or `EU`, and then select **Save**.
108+
109+
:::image type="content" source="./media/manage-data-boundary/azure-tenant-configure-data-boundary.png" alt-text="Screenshot of configuring data boundary.":::
110+
111+
The `Boundary region` can only be configured for empty tenants.
112+
113+
### [Azure CLI](#tab/azure-cli)
98114
99115
```azurecli
100116
az data-boundary create --data-boundary <data-boundary-geo> --default default
@@ -104,15 +120,15 @@ The `--default` switch is currently mandatory but will be phased out in the futu
104120

105121
For more information, see [Azure CLI Reference](/cli/azure/reference-index).
106122

107-
# [PowerShell](#tab/azure-powershell)
123+
### [PowerShell](#tab/azure-powershell)
108124

109125
```azurepowershell
110126
Set-AzDataBoundary -DataBoundary <data-boundary-geo>
111127
```
112128

113129
For more information, see [Azure PowerShell Reference](/powershell/module/az.resources).
114130

115-
# [REST API](#tab/rest-api)
131+
### [REST API](#tab/rest-api)
116132

117133
```http
118134
PUT https://management.azure.com/providers/Microsoft.Resources/dataBoundaries/default?api-version=2024-08-01
@@ -155,6 +171,13 @@ To get data boundary at specified scopes. The scopes include:
155171
|Subscription | subscriptions/{subscriptionId} |
156172
|Resource group | subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName} |
157173

174+
# [Azure portal](#tab/azure-portal)
175+
176+
1. Open the [Azure portal](https://portal.azure.com).
177+
1. In the search box, type **azure data boundaries**, and then select **Azure Data Boundaries**. The following screenshot shows a `Global` data boundary.
178+
179+
:::image type="content" source="./media/manage-data-boundary/azure-tenant-read-data-boundary.png" alt-text="Screenshot of showing data boundary.":::
180+
158181
# [Azure CLI](#tab/azure-cli)
159182

160183
```azurecli
45.3 KB
Loading
21.5 KB
Loading

0 commit comments

Comments
 (0)