Skip to content

Commit d44bc53

Browse files
committed
content updates
1 parent ff85de5 commit d44bc53

File tree

3 files changed

+55
-65
lines changed

3 files changed

+55
-65
lines changed

articles/azure-resource-manager/managed-applications/deploy-service-catalog-quickstart.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Shows consumers of Azure Managed Applications how to deploy a servi
44
author: davidsmatlak
55
ms.author: davidsmatlak
66
ms.topic: quickstart
7-
ms.date: 08/17/2022
7+
ms.date: 02/21/2023
88
---
99

1010
# Quickstart: Deploy service catalog managed application from Azure portal
@@ -71,7 +71,7 @@ Go to the managed resource group with the name prefix **mrg-ManagedStorage** to
7171

7272
:::image type="content" source="./media/deploy-service-catalog-quickstart/view-managed-resource-group.png" alt-text="Screenshot that shows the managed resource group that contains the resource deployed by the managed application.":::
7373

74-
The storage account that's created by the managed application has a role assignment. In the [publish the definition](publish-service-catalog-app.md#create-an-azure-active-directory-user-group-or-application) article, you created an Azure Active Directory group. That group was used in the managed application definition. When you deployed the managed application, a role assignment for that group was added to the managed storage account.
74+
The storage account that's created by the managed application has a role assignment. In the [publish the definition](publish-service-catalog-app.md#get-group-id-and-role-definition-id) article, you created an Azure Active Directory group. That group was used in the managed application definition. When you deployed the managed application, a role assignment for that group was added to the managed storage account.
7575

7676
To see the role assignment from the Azure portal:
7777

articles/azure-resource-manager/managed-applications/publish-service-catalog-app.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: davidsmatlak
55
ms.author: davidsmatlak
66
ms.topic: quickstart
77
ms.custom: subject-armqs, devx-track-azurecli, devx-track-azurepowershell, subject-rbac-steps, mode-api, mode-arm
8-
ms.date: 02/15/2023
8+
ms.date: 02/21/2023
99
---
1010

1111
# Quickstart: Create and publish an Azure Managed Application definition
@@ -20,7 +20,7 @@ To publish a managed application to your service catalog, do the following tasks
2020
- Decide which user, group, or application needs access to the resource group in the user's subscription.
2121
- Create the managed application definition that points to the _.zip_ package and requests access for the identity.
2222

23-
If your managed application definition is more than 120-MB or if you want to use your own storage account for your organization's compliance reasons, go to [Quickstart: Bring your own storage to create and publish an Azure Managed Application definition](publish-service-catalog-bring-your-own-storage.md).
23+
If your managed application definition is more than 120 MB or if you want to use your own storage account for your organization's compliance reasons, go to [Quickstart: Bring your own storage to create and publish an Azure Managed Application definition](publish-service-catalog-bring-your-own-storage.md).
2424

2525
> [!NOTE]
2626
> You can use Bicep to develop a managed application definition but it must be converted to ARM template JSON before you can publish the definition in Azure. To convert Bicep to JSON, use the Bicep [build](../bicep/bicep-cli.md#build) command. After the file is converted to JSON it's recommended to verify the code for accuracy.
@@ -31,7 +31,7 @@ If your managed application definition is more than 120-MB or if you want to use
3131

3232
To complete this quickstart, you need the following items:
3333

34-
- An Azure account with an active subscription and permissions to Azure Active Directory. If you don't have an account, [create a free account](https://azure.microsoft.com/free/) before you begin.
34+
- An Azure account with an active subscription and permissions to Azure Active Directory resources like users, groups, or service principals. If you don't have an account, [create a free account](https://azure.microsoft.com/free/) before you begin.
3535
- [Visual Studio Code](https://code.visualstudio.com/) with the latest [Azure Resource Manager Tools extension](https://marketplace.visualstudio.com/items?itemName=msazurermtools.azurerm-vscode-tools). If you're using Bicep, install the [Bicep extension for Visual Studio Code](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-bicep).
3636
- Install the latest version of [Azure PowerShell](/powershell/azure/install-az-ps) or [Azure CLI](/cli/azure/install-azure-cli).
3737

@@ -251,12 +251,12 @@ Upload _app.zip_ to an Azure storage account so you can use it when you deploy t
251251
# [PowerShell](#tab/azure-powershell)
252252

253253
```azurepowershell-interactive
254-
New-AzResourceGroup -Name storageGroup -Location eastus
254+
New-AzResourceGroup -Name storageGroup -Location westus3
255255
256256
$storageAccount = New-AzStorageAccount `
257257
-ResourceGroupName storageGroup `
258258
-Name "demostorageaccount" `
259-
-Location eastus `
259+
-Location westus3 `
260260
-SkuName Standard_LRS `
261261
-Kind StorageV2
262262
@@ -274,12 +274,12 @@ Set-AzStorageBlobContent `
274274
# [Azure CLI](#tab/azure-cli)
275275

276276
```azurecli-interactive
277-
az group create --name storageGroup --location eastus
277+
az group create --name storageGroup --location westus3
278278
279279
az storage account create \
280280
--name demostorageaccount \
281281
--resource-group storageGroup \
282-
--location eastus \
282+
--location westus3 \
283283
--sku Standard_LRS \
284284
--kind StorageV2
285285
```
@@ -356,13 +356,13 @@ Create a resource group for your managed application definition.
356356
# [PowerShell](#tab/azure-powershell)
357357

358358
```azurepowershell-interactive
359-
New-AzResourceGroup -Name appDefinitionGroup -Location westcentralus
359+
New-AzResourceGroup -Name appDefinitionGroup -Location westus3
360360
```
361361

362362
# [Azure CLI](#tab/azure-cli)
363363

364364
```azurecli-interactive
365-
az group create --name appDefinitionGroup --location westcentralus
365+
az group create --name appDefinitionGroup --location westus3
366366
```
367367

368368
---
@@ -377,12 +377,12 @@ The `blob` command that's run from Azure PowerShell or Azure CLI creates a varia
377377
$blob = Get-AzStorageBlob -Container appcontainer -Blob app.zip -Context $ctx
378378
379379
New-AzManagedApplicationDefinition `
380-
-Name "ManagedStorage" `
381-
-Location "westcentralus" `
380+
-Name "sampleManagedAppDefinition" `
381+
-Location "westus3" `
382382
-ResourceGroupName appDefinitionGroup `
383383
-LockLevel ReadOnly `
384-
-DisplayName "Managed Storage Account" `
385-
-Description "Managed Azure Storage Account" `
384+
-DisplayName "Sample Managed application definition" `
385+
-Description "Sample Managed application definition" `
386386
-Authorization "${principalid}:$roleid" `
387387
-PackageFileUri $blob.ICloudBlob.StorageUri.PrimaryUri.AbsoluteUri
388388
```
@@ -399,12 +399,12 @@ blob=$(az storage blob url \
399399
--name app.zip --output tsv)
400400
401401
az managedapp definition create \
402-
--name "ManagedStorage" \
403-
--location "westcentralus" \
402+
--name "sampleManagedAppDefinition" \
403+
--location "westus3" \
404404
--resource-group appDefinitionGroup \
405405
--lock-level ReadOnly \
406-
--display-name "Managed Storage Account" \
407-
--description "Managed Azure Storage Account" \
406+
--display-name "Sample Managed application definition" \
407+
--description "Sample Managed application definition" \
408408
--authorizations "$principalid:$roleid" \
409409
--package-file-uri "$blob"
410410
```
@@ -416,7 +416,7 @@ When the command completes, you have a managed application definition in your re
416416
Some of the parameters used in the preceding example are:
417417

418418
- **resource group**: The name of the resource group where the managed application definition is created.
419-
- **lock level**: The type of lock placed on the managed resource group. It prevents the customer from performing undesirable operations on this resource group. Currently, `ReadOnly` is the only supported lock level. When `ReadOnly` is specified, the customer can only read the resources present in the managed resource group. The publisher identities that are granted access to the managed resource group are exempt from the lock.
419+
- **lock level**: The `lockLevel` on the managed resource group prevents the customer from performing undesirable operations on this resource group. Currently, `ReadOnly` is the only supported lock level. `ReadOnly` specifies that the customer can only read the resources present in the managed resource group. The publisher identities that are granted access to the managed resource group are exempt from the lock level.
420420
- **authorizations**: Describes the principal ID and the role definition ID that are used to grant permission to the managed resource group.
421421

422422
- **Azure PowerShell**: `"${principalid}:$roleid"` or you can use curly braces for each variable `"${principalid}:${roleid}"`. Use a comma to separate multiple values: `"${principalid1}:$roleid1", "${principalid2}:$roleid2"`.

0 commit comments

Comments
 (0)