Skip to content

Commit d07d1f9

Browse files
Merge pull request #288026 from cherylmc/SFI-fix-global
SFI VPN Gateway Global AdminFix permissions
2 parents 6d063ea + d238485 commit d07d1f9

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed

articles/virtual-wan/openvpn-azure-ad-tenant.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ titleSuffix: Azure Virtual WAN
55
author: cherylmc
66
ms.service: azure-virtual-wan
77
ms.topic: how-to
8-
ms.date: 09/24/2024
8+
ms.date: 10/08/2024
99
ms.author: cherylmc
1010

1111
#Note that Audience values are not sensitive data.
@@ -32,11 +32,11 @@ Verify that you have a Microsoft Entra tenant. If you don't have a Microsoft Ent
3232

3333
1. Create two accounts in the newly created Microsoft Entra tenant. For steps, see [Add or delete a new user](../active-directory/fundamentals/add-users-azure-active-directory.md).
3434

35-
* Global administrator account
35+
* [Cloud Application Administrator role](/entra/identity/role-based-access-control/permissions-reference#cloud-application-administrator)
3636
* User account
3737

38-
The global administrator account will be used to grant consent to the Azure VPN app registration. The user account can be used to test OpenVPN authentication.
39-
1. Assign one of the accounts the **Global administrator** role. For steps, see [Assign administrator and non-administrator roles to users with Microsoft Entra ID](../active-directory/fundamentals/active-directory-users-assign-role-azure-portal.md).
38+
The Cloud Application Administrator role is used to grant consent to the Azure VPN app registration. The user account can be used to test OpenVPN authentication.
39+
1. Assign one of the accounts the **Cloud Application Administrator** role. For steps, see [Assign administrator and non-administrator roles to users with Microsoft Entra ID](/azure/active-directory-b2c/tenant-management-read-tenant-name).
4040

4141
## <a name="enable-authentication"></a>3. Grant consent to the Azure VPN app registration
4242

articles/vpn-gateway/openvpn-azure-ad-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to set up a Microsoft Entra tenant and P2S gateway for P2
55
author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.topic: how-to
8-
ms.date: 08/14/2024
8+
ms.date: 10/08/2024
99
ms.author: cherylmc
1010

1111
#Note that Audience values are not sensitive data.

includes/vpn-gateway-vwan-azure-ad-tenant.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
author: cherylmc
33
ms.service: azure-vpn-gateway
44
ms.topic: include
5-
ms.date: 09/24/2024
5+
ms.date: 10/08/2024
66
ms.author: cherylmc
77

88
#Note that Audience values are not sensitive data.
99
---
10-
1. Sign in to the Azure portal as a user that is assigned the **Global administrator** role.
10+
1. Sign in to the Azure portal as a user that is assigned the **Cloud Application Administrator** role.
1111

1212
1. Next, grant admin consent for your organization. This allows the Azure VPN application to sign in and read user profiles. Copy and paste the URL that pertains to your deployment location in the address bar of your browser:
1313

@@ -36,10 +36,10 @@
3636
```
3737
3838
> [!NOTE]
39-
> If you're using a global admin account that is not native to the Microsoft Entra tenant to provide consent, replace "common" with the Microsoft Entra tenant ID in the URL. You may also have to replace "common" with your tenant ID in certain other cases as well. For help with finding your tenant ID, see [How to find your Microsoft Entra tenant ID](/azure/active-directory-b2c/tenant-management-read-tenant-name).
39+
> If you're using a Cloud Applicaion Administrator account that is not native to the Microsoft Entra tenant to provide consent, replace "common" with the Microsoft Entra tenant ID in the URL. You may also have to replace "common" with your tenant ID in certain other cases as well. For help with finding your tenant ID, see [How to find your Microsoft Entra tenant ID](/azure/active-directory-b2c/tenant-management-read-tenant-name).
4040
>
4141
42-
1. Select the account that has the **Global administrator** role if prompted.
42+
1. Select the account that has the **Cloud Application Administrator** role if prompted.
4343
4444
1. On the **Permissions requested** page, select **Accept**.
4545

0 commit comments

Comments
 (0)