Skip to content

Commit c178b42

Browse files
authored
Merge pull request #77382 from spelluru/rbacregions
RBAC is supported in all regions now
2 parents f7c6c26 + 4c91daf commit c178b42

File tree

4 files changed

+4
-4
lines changed

4 files changed

+4
-4
lines changed

articles/event-hubs/event-hubs-managed-service-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Once you've enabled the feature, a new service identity is created in your Azure
7171

7272
### Create a new Event Hubs namespace
7373

74-
Next, [create an Event Hubs namespace](event-hubs-create.md) in one of the Azure regions that has preview support for managed identities for Azure resources: **US East**, **US East 2**, or **West Europe**.
74+
Next, [create an Event Hubs namespace](event-hubs-create.md).
7575

7676
Navigate to the namespace **Access Control (IAM)** page on the portal, and then click **Add role assignment** to add the managed identity to the **Owner** role. To do so, search for the name of the web application in the **Add permissions** panel **Select** field, and then click the entry. Then click **Save**. The managed identity for the web application now has access to the Event Hubs namespace, and to the event hub you previously created.
7777

articles/event-hubs/event-hubs-role-based-access-control.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ If you still want to create a specific account for this scenario, [follow these
4646

4747
### Create an Event Hubs namespace
4848

49-
Next, [create an Event Hubs namespace](event-hubs-create.md) in one of the Azure regions that have Event Hubs preview support for RBAC: **US East**, **US East 2**, or **West Europe**.
49+
Next, [create an Event Hubs namespace](event-hubs-create.md).
5050

5151
Once the namespace is created, navigate to its **Access Control (IAM)** page on the portal, and then click **Add role assignment** to add the Azure AD user account to the Owner role. If you use your own user account and you created the namespace, you are already in the Owner role. To add a different account to the role, search for the name of the web application in the **Add permissions** panel **Select** field, and then click the entry. Then click **Save**. The user account now has access to the Event Hubs namespace, and to the event hub you previously created.
5252

articles/service-bus-messaging/service-bus-managed-service-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Once you've enabled the feature, a new service identity is created in your Azure
6464

6565
### Create a new Service Bus Messaging namespace
6666

67-
Next, [create a Service Bus Messaging namespace](service-bus-create-namespace-portal.md) in one of the Azure regions that have preview support for RBAC: **US East**, **US East 2**, or **West Europe**.
67+
Next, [create a Service Bus Messaging namespace](service-bus-create-namespace-portal.md).
6868

6969
Navigate to the namespace **Access Control (IAM)** page on the portal, and then click **Add role assignment** to add the managed identity to the **Owner** role. To do so, search for the name of the web application in the **Add permissions** panel **Select** field, and then click the entry. Then click **Save**.
7070

articles/service-bus-messaging/service-bus-role-based-access-control.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ If you still want to create a specific account for this scenario, [follow these
5151

5252
### Create a Service Bus namespace
5353

54-
Next, [create a Service Bus Messaging namespace](service-bus-create-namespace-portal.md) in one of the Azure regions that have preview support for RBAC: **US East**, **US East 2**, or **West Europe**.
54+
Next, [create a Service Bus Messaging namespace](service-bus-create-namespace-portal.md).
5555

5656
Once the namespace is created, navigate to its **Access Control (IAM)** page on the portal, and then click **Add role assignment** to add the Azure AD user account to the Owner role. If you use your own user account and you created the namespace, you are already in the Owner role. To add a different account to the role, search for the name of the web application in the **Add permissions** panel **Select** field, and then click the entry. Then click **Save**.
5757

0 commit comments

Comments
 (0)