You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/managed-applications/concepts-custom-role-definition.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ This article provides an overview of the custom role definition artifact and its
15
15
16
16
## Custom role definition artifact
17
17
18
-
You need to name the custom role definition artifact customRoleDefinition.json. Place it at the same level as createUiDefinition.json and mainTemplate.json in the .zip package that creates a managed application definition. To learn how to create the .zip package and publish a managed application definition, see [Publish a managed application definition.](publish-managed-app-definition-quickstart.md)
18
+
You need to name the custom role definition artifact customRoleDefinition.json. Place it at the same level as createUiDefinition.json and mainTemplate.json in the .zip package that creates a managed application definition. To learn how to create the .zip package and publish a managed application definition, see [Publish a managed application definition.](publish-service-catalog-app.md)
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/managed-applications/concepts-view-definition.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ This article provides an overview of view definition artifact and its capabiliti
15
15
16
16
## View definition artifact
17
17
18
-
The view definition artifact must be named **viewDefinition.json** and placed at the same level as **createUiDefinition.json** and **mainTemplate.json** in the .zip package that creates a managed application definition. To learn how to create the .zip package and publish a managed application definition, see [Publish an Azure Managed Application definition](publish-managed-app-definition-quickstart.md)
18
+
The view definition artifact must be named **viewDefinition.json** and placed at the same level as **createUiDefinition.json** and **mainTemplate.json** in the .zip package that creates a managed application definition. To learn how to create the .zip package and publish a managed application definition, see [Publish an Azure Managed Application definition](publish-service-catalog-app.md)
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/managed-applications/deploy-service-catalog-quickstart.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.author: tomfitz
9
9
---
10
10
# Quickstart: Deploy service catalog app through Azure portal
11
11
12
-
In the [preceding quickstart](publish-managed-app-definition-quickstart.md), you published a managed application definition. In this quickstart, you create a service catalog app from that definition.
12
+
In the [preceding quickstart](publish-service-catalog-app.md), you published a managed application definition. In this quickstart, you create a service catalog app from that definition.
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/managed-applications/publish-service-catalog-app.md
+11-9Lines changed: 11 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -189,13 +189,13 @@ az storage blob upload \
189
189
190
190
### Create an Azure Active Directory user group or application
191
191
192
-
The next step is to select a user group, user, or application for managing the resources on behalf of the customer. This identity has permissions on the managed resource group according to the role that is assigned. The role can be any built-in Role-Based Access Control (RBAC) role like Owner or Contributor. To create a new Active Directory user group, see [Create a group and add members in Azure Active Directory](../../active-directory/fundamentals/active-directory-groups-create-azure-portal.md).
192
+
The next step is to select a user group, user, or application for managing the resources for the customer. This identity has permissions on the managed resource group according to the role that is assigned. The role can be any built-in Role-Based Access Control (RBAC) role like Owner or Contributor. To create a new Active Directory user group, see [Create a group and add members in Azure Active Directory](../../active-directory/fundamentals/active-directory-groups-create-azure-portal.md).
193
193
194
194
You need the object ID of the user group to use for managing the resources.
195
195
196
196
# [PowerShell](#tab/azure-powershell)
197
197
198
-
```powershell
198
+
```azurepowershell-interactive
199
199
$groupID=(Get-AzADGroup -DisplayName mygroup).Id
200
200
```
201
201
@@ -213,7 +213,7 @@ Next, you need the role definition ID of the RBAC built-in role you want to gran
213
213
214
214
# [PowerShell](#tab/azure-powershell)
215
215
216
-
```powershell
216
+
```azurepowershell-interactive
217
217
$ownerID=(Get-AzRoleDefinition -Name Owner).Id
218
218
```
219
219
@@ -231,7 +231,7 @@ If you don't already have a resource group for storing your managed application
@@ -288,7 +290,7 @@ Some of the parameters used in the preceding example are:
288
290
289
291
## Bring your own storage for the managed application definition
290
292
291
-
You can choose to store your managed application definition within a storage account provided by you during creation so that it's location and access can be fully managed by you for your regulatory needs.
293
+
You can choose to store your managed application definition within a storage account provided by you during creation so that its location and access can be fully managed by you for your regulatory needs.
292
294
293
295
> [!NOTE]
294
296
> Bring your own storage is only supported with ARM Template or REST API deployments of the managed application definition.
@@ -307,7 +309,7 @@ Before your managed application definition can be deployed to your storage accou
307
309
1. Select **Access control (IAM)** to display the access control settings for the storage account. Select the **Role assignments** tab to see the list of role assignments.
308
310
1. In the **Add role assignment** window, select the **Contributor** role.
309
311
1. From the **Assign access to** field, select **Azure AD user, group, or service principal**.
310
-
1. Under **Select** search for **Appliance Resource Provider** role and select it.
312
+
1. Under **Select**, search for **Appliance Resource Provider** role and select it.
311
313
1. Save the role assignment.
312
314
313
315
### Deploy the managed application definition with an ARM Template
@@ -384,7 +386,7 @@ Use the following ARM Template to deploy your packaged managed application as a
384
386
}
385
387
```
386
388
387
-
We have added a new property named **storageAccountId** to your applicationDefintion's properties and provide storage account id you wish to store your definition in as its value:
389
+
We have added a new property named **storageAccountId** to your applicationDefintion's properties and provide storage account ID you wish to store your definition in as its value:
388
390
389
391
You can verify that the application definition files are saved in your provided storage account in a container titled **applicationdefinitions**.
0 commit comments