You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/managed-grafana/how-to-authentication-permissions.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,8 @@ ms.service: managed-grafana
5
5
ms.topic: how-to
6
6
author: maud-lv
7
7
ms.author: malev
8
-
ms.date: 08/22/2022
8
+
ms.date: 12/13/2022
9
+
ms.custom: engagement-fy23
9
10
---
10
11
11
12
# Set up Azure Managed Grafana authentication and permissions
@@ -32,7 +33,7 @@ Open your CLI and run the `az login` command to sign in to Azure.
32
33
az login
33
34
```
34
35
35
-
This command will prompt your web browser to launch and load an Azure sign-in page. If the browser fails to open, use device code flow with `az login --use-device-code`. For more sign-in options, go to [sign in with the Azure CLI](/cli/azure/authenticate-azure-cli).
36
+
This command will prompt your web browser to launch and load an Azure sign-in page.
36
37
37
38
---
38
39
@@ -87,12 +88,14 @@ System-assigned managed identity is the default authentication method provided t
87
88
88
89
##### With managed identity disabled
89
90
90
-
1.Azure Managed Grafana can also access data sources with managed identity disabled. You can use a service principal for authentication, using a client ID and secret. To use this method, in the **Permissions** tab, set the box **System assigned managed identity** to **Off**.
91
+
Azure Managed Grafana can also access data sources with managed identity disabled. You can use a service principal for authentication, using a client ID and secret.
91
92
92
-
1.**Add role assignment to this identity with 'Monitoring Reader' role on target subscription** is disabled.
93
+
1.In the **Permissions** tab, set the box **System assigned managed identity** to **Off**. The line **Add role assignment to this identity with 'Monitoring Reader' role on target subscription** is automatically grayed out.
93
94
94
95
1. Under **Grafana administrator role**, if you have the Owner or User Access Administrator role for the subscription, the box **Include myself** is checked by default. Optionally select **Add** to grant the Grafana administrator role to more members. If you don't have the necessary role, you won't be able to manage Grafana access rights yourself.
95
96
97
+
:::image type="content" source="media/authentication/create-form-permission-disabled.png" alt-text="Screenshot of the Azure portal. Create workspace form. Permission tab with managed identity disabled.":::
98
+
96
99
> [!NOTE]
97
100
> Turning off system-assigned managed identity disables the Azure Monitor data source plugin for your Azure Managed Grafana instance. In this scenario, use a service principal instead of Azure Monitor to access data sources.
0 commit comments