Skip to content

Commit bf00e7d

Browse files
Merge pull request #297557 from MicrosoftDocs/main
Merged by Learn.Build PR Management system
2 parents 88ea62f + 8cfa537 commit bf00e7d

File tree

17 files changed

+529
-588
lines changed

17 files changed

+529
-588
lines changed

articles/azure-cache-for-redis/cache-management-faq.yml

Lines changed: 84 additions & 61 deletions
Large diffs are not rendered by default.

articles/azure-signalr/howto-custom-domain.md

Lines changed: 83 additions & 97 deletions
Large diffs are not rendered by default.
Lines changed: 27 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,62 +1,59 @@
11
---
2-
title: include file
3-
description: include file
2+
title: Include file
3+
description: Include file
44
author: terencefan
55
ms.service: azure-signalr-service
6-
ms.topic: include
6+
ms.topic: Include
77
ms.date: 03/12/2025
88
ms.author: tefa
9-
ms.custom: include file
9+
ms.custom: Include file
1010
---
1111

12-
The following steps describe how to assign a **SignalR App Server** role to a service principal or a managed identity for an Azure SignalR Service resource. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.yml).
12+
The following steps describe how to assign a SignalR App Server role to a service principal or a managed identity for an Azure SignalR Service resource. For detailed steps, see [Assign Azure roles by using the Azure portal](../../role-based-access-control/role-assignments-portal.yml).
1313

1414
> [!NOTE]
15-
> A role can be assigned to any scope, including management group, subscription, resource group, or single resource. To learn more about scope, see [Understand scope for Azure RBAC](../../role-based-access-control/scope-overview.md).
15+
> You can assign a role to any scope, including management group, subscription, resource group, or single resource. To learn more about scope, see [Understand scope for Azure RBAC](../../role-based-access-control/scope-overview.md).
1616
1717
1. In the [Azure portal](https://portal.azure.com/), go to your Azure SignalR Service resource.
1818

19-
1. Select **Access control (IAM)** in the sidebar.
19+
1. On the left pane, select **Access control (IAM)**.
2020

2121
1. Select **Add** > **Add role assignment**.
2222

2323
:::image type="content" source="~/reusable-content/ce-skilling/azure/media/role-based-access-control/add-role-assignment-menu-generic.png" alt-text="Screenshot that shows the page for access control and selections for adding a role assignment.":::
2424

25-
1. On the **Role** tab, select **SignalR App Server** or other SignalR built-in roles depends on your scenario.
25+
1. On the **Role** tab, select **SignalR App Server**. Other Azure SignalR Service built-in roles depend on your scenario.
2626

2727
| Role | Description | Use case |
2828
| ------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------- |
29-
| [SignalR App Server](../../role-based-access-control/built-in-roles.md#signalr-app-server) | Access to the server connection creation and key generation APIs. | Most commonly used for app server with Azure SignalR resource run in **Default** mode. |
30-
| [SignalR Service Owner](../../role-based-access-control/built-in-roles.md#signalr-service-owner) | Full access to all data-plane APIs, including REST APIs, the server connection creation, and key/token generation APIs. | For negotiation server with Azure SignalR resource run in **Serverless** mode, as it requires both REST API permissions and authentication API permissions. |
31-
| [SignalR REST API Owner](../../role-based-access-control/built-in-roles.md#signalr-rest-api-owner) | Full access to data-plane REST APIs. | For using [Azure SignalR Management SDK](/azure/azure-signalr/signalr-howto-use-management-sdk) to manage connections and groups, but does **NOT** make server connections or handle negotiation requests. |
32-
| [SignalR REST API Reader](../../role-based-access-control/built-in-roles.md#signalr-rest-api-reader) | Read-only access to data-plane REST APIs. | Use it when write a monitoring tool that calls readonly REST APIs. |
29+
| [SignalR App Server](../../role-based-access-control/built-in-roles.md#signalr-app-server) | Access to the APIs that create server connections and generate keys. | Most commonly used for an app server with an Azure SignalR resource running in Default mode. |
30+
| [SignalR Service Owner](../../role-based-access-control/built-in-roles.md#signalr-service-owner) | Full access to all data-plane APIs, including REST APIs, the APIs that create server connections, and the APIs that generate keys/tokens. | Used for a negotiation server with an Azure SignalR Service resource running in Serverless mode. It requires both REST API permissions and authentication API permissions. |
31+
| [SignalR REST API Owner](../../role-based-access-control/built-in-roles.md#signalr-rest-api-owner) | Full access to data-plane REST APIs. | Used for the [Azure SignalR Management SDK](/azure/azure-signalr/signalr-howto-use-management-sdk) to manage connections and groups, but it *doesn't* make server connections or handle negotiation requests. |
32+
| [SignalR REST API Reader](../../role-based-access-control/built-in-roles.md#signalr-rest-api-reader) | Read-only access to data-plane REST APIs. | Used when you write a monitoring tool that calls read-only REST APIs. |
3333

34-
1. Select Next.
34+
1. Select **Next**.
3535

36+
1. For Microsoft Entra application:
3637

37-
1. For Microsoft Entra application.
38+
1. In the **Assign access to** row, select **User, group, or service principal**.
39+
1. In the **Members** row, choose **select members**, and then choose the identity in the pop-up window.
3840

41+
1. For managed identity for Azure resources:
3942

40-
1. In the `Assign access` to row, select **User, group, or service principal**.
41-
1. In the `Members` row, click `select members`, then choose the identity in the pop-up window.
43+
1. In the **Assign access to** row, select **Managed identity**.
44+
1. In the **Members** row, choose **select members**, and then choose the application in the pop-up window.
4245

43-
1. For managed identity for Azure resources.
46+
1. Select **Next**.
4447

45-
1. In the `Assign access` to row, select **Managed identity**.
46-
1. In the `Members` row, click `select members`, then choose the application in the pop-up window.
47-
48-
1. Select Next.
49-
50-
51-
1. Review your assignment, then click **Review + assign** to confirm the role assignment.
48+
1. Review your assignment, and then select **Review + assign** to confirm the role assignment.
5249

5350
> [!IMPORTANT]
5451
> Newly added role assignments might take up to 30 minutes to propagate.
5552
56-
To learn more about how to assign and manage Azure roles, see these articles:
53+
To learn more about how to assign and manage Azure roles, see:
5754

58-
- [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.yml)
59-
- [Assign Azure roles using the REST API](../../role-based-access-control/role-assignments-rest.md)
60-
- [Assign Azure roles using Azure PowerShell](../../role-based-access-control/role-assignments-powershell.md)
61-
- [Assign Azure roles using the Azure CLI](../../role-based-access-control/role-assignments-cli.md)
62-
- [Assign Azure roles using Azure Resource Manager templates](../../role-based-access-control/role-assignments-template.md)
55+
- [Assign Azure roles by using the Azure portal](../../role-based-access-control/role-assignments-portal.yml)
56+
- [Assign Azure roles by using the REST API](../../role-based-access-control/role-assignments-rest.md)
57+
- [Assign Azure roles by using Azure PowerShell](../../role-based-access-control/role-assignments-powershell.md)
58+
- [Assign Azure roles by using the Azure CLI](../../role-based-access-control/role-assignments-cli.md)
59+
- [Assign Azure roles by using Azure Resource Manager templates](../../role-based-access-control/role-assignments-template.md)

0 commit comments

Comments
 (0)