Skip to content

Commit dd46a41

Browse files
authored
Merge pull request #193831 from dksimpson/1912257-RBAC-fix-12
Update RBAC role assignment steps - batch 12
2 parents 656e4dc + 10ed624 commit dd46a41

File tree

8 files changed

+61
-31
lines changed

8 files changed

+61
-31
lines changed

articles/site-recovery/azure-to-azure-how-to-enable-replication-private-endpoints.md

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: harshacs
66
ms.service: site-recovery
77
ms.topic: article
88
ms.date: 07/14/2020
9-
ms.custom: references_regions
9+
ms.custom: references_regions, subject-rbac-steps
1010
---
1111
# Replicate machines with private endpoints
1212

@@ -220,22 +220,29 @@ following role permissions depending on the type of storage account:
220220
- [Classic Storage Account Contributor](../role-based-access-control/built-in-roles.md#classic-storage-account-contributor)
221221
- [Classic Storage Account Key Operator Service Role](../role-based-access-control/built-in-roles.md#classic-storage-account-key-operator-service-role)
222222

223-
The following steps describe how to add a role-assignment to your storage accounts, one at a time:
223+
The following steps describe how to add a role assignment to your storage accounts, one at a time. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
224224

225-
1. Go to the storage account and navigate to **Access control (IAM)** on the left side of the page.
225+
1. In the Azure portal, navigate to your Azure SQL Server page.
226226

227-
1. Once on **Access control (IAM)**, in the "Add a role assignment" box select **Add**.
227+
1. Select **Access control (IAM)**.
228228

229-
:::image type="content" source="./media/azure-to-azure-how-to-enable-replication-private-endpoints/storage-role-assignment.png" alt-text="Shows the Access control (IAM) page on a storage account and the 'Add a role assignment' button in the Azure portal.":::
229+
1. Select **Add > Add role assignment**.
230230

231-
1. In the "Add a role assignment" side page, choose the role from the list above in the **Role**
232-
drop-down. Enter the **name** of the vault and select **Save**.
231+
:::image type="content" source="../../includes/role-based-access-control/media/add-role-assignment-menu-generic.png" alt-text="Screenshot that shows Access control (IAM) page with Add role assignment menu open.":::
233232

234-
:::image type="content" source="./media/azure-to-azure-how-to-enable-replication-private-endpoints/storage-role-assignment-select-role.png" alt-text="Shows the Access control (IAM) page on a storage account and the options to select a Role and which principal to grant that role to in the Azure portal.":::
233+
1. On the **Roles** tab, select one of the roles listed in the beginning of this section.
235234

236-
In addition to these permissions, MS trusted services need to be allowed access as well. Go to
237-
"Firewalls and virtual networks" and select "Allow trusted Microsoft services to access this storage
238-
account" checkbox in **Exceptions**.
235+
1. On the **Members** tab, select **Managed identity**, and then select **Select members**.
236+
237+
1. Select **System-assigned managed identity**, search for a vault, and then select it.
238+
239+
1. On the **Review + assign** tab, select **Review + assign** to assign the role.
240+
241+
In addition to these permissions, you need to allow access to Microsoft trusted services. To do so, follow these steps:
242+
243+
1. Go to **Firewalls and virtual networks**.
244+
245+
1. In **Exceptions**, select **Allow trusted Microsoft services to access this storage account**.
239246

240247
## Protect your virtual machines
241248

articles/site-recovery/hybrid-how-to-enable-replication-private-endpoints.md

Lines changed: 18 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ ms.author: harshacs
66
ms.service: site-recovery
77
ms.topic: article
88
ms.date: 07/14/2020
9+
ms.custom: subject-rbac-steps
910
---
1011
# Replicate on-premises machines by using private endpoints
1112

@@ -208,22 +209,29 @@ following role permissions, depending on the type of storage account.
208209
- [Classic Storage Account Contributor](../role-based-access-control/built-in-roles.md#classic-storage-account-contributor)
209210
- [Classic Storage Account Key Operator Service Role](../role-based-access-control/built-in-roles.md#classic-storage-account-key-operator-service-role)
210211

211-
These steps describe how to add a role assignment to your storage account:
212+
The following steps describe how to add a role assignment to your storage account. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
212213

213-
1. Go to the storage account. Select **Access control (IAM)** in the left pane.
214+
1. Go to the storage account.
214215

215-
1. In the **Add a role assignment** section, select **Add**:
216+
1. Select **Access control (IAM)**.
216217

217-
:::image type="content" source="./media/hybrid-how-to-enable-replication-private-endpoints/storage-role-assignment.png" alt-text="Screenshot that shows the Access control (IAM) page for a storage account.":::
218+
1. Select **Add > Add role assignment**.
218219

219-
1. On the **Add a role assignment** page, in the **Role**
220-
list, select the role from the list at the start of this section. Enter the name of the vault and then select **Save**.
220+
:::image type="content" source="../../includes/role-based-access-control/media/add-role-assignment-menu-generic.png" alt-text="Screenshot that shows Access control (IAM) page with Add role assignment menu open.":::
221221

222-
:::image type="content" source="./media/hybrid-how-to-enable-replication-private-endpoints/storage-role-assignment-select-role.png" alt-text="Screenshot that shows the Add role assignment page.":::
222+
1. On the **Roles** tab, select one of the roles listed in the beginning of this section.
223223

224-
After you add these permissions, you need to allow access to Microsoft trusted services. Go to
225-
**Firewalls and virtual networks** and select **Allow trusted Microsoft services to access this storage
226-
account** in **Exceptions**.
224+
1. On the **Members** tab, select **Managed identity**, and then select **Select members**.
225+
226+
1. Select **System-assigned managed identity**, search for a vault, and then select it.
227+
228+
1. On the **Review + assign** tab, select **Review + assign** to assign the role.
229+
230+
In addition to these permissions, you need to allow access to Microsoft trusted services. To do so, follow these steps:
231+
232+
1. Go to **Firewalls and virtual networks**.
233+
234+
1. In **Exceptions**, select **Allow trusted Microsoft services to access this storage account**.
227235

228236
### Protect your virtual machines
229237

articles/site-recovery/vmware-azure-multi-tenant-csp-disaster-recovery.md

Lines changed: 25 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ ms.service: site-recovery
77
ms.topic: conceptual
88
ms.date: 11/27/2018
99
ms.author: mayg
10+
ms.custom: subject-rbac-steps
1011
---
1112

1213
# Set up VMware disaster recovery in a multi-tenancy environment with the Cloud Solution Provider (CSP) program
@@ -61,24 +62,38 @@ You can now perform and manage all Site Recovery operations for the tenant in th
6162

6263
1. Ensure that the disaster recovery infrastructure is set up. Partners access tenant subscriptions through the CSP portal, regardless of whether disaster recovery is managed or self-service. Set up the vault and register infrastructure to the tenant subscriptions.
6364
1. Provide the tenant with the [account you created](#create-a-tenant-account).
64-
1. You can add a new user to the tenant subscription through the CSP portal as follows:
6565

66-
1. Go to the tenant’s CSP subscription page, and then select the **Users and licenses** option.
66+
You can add a new user to the tenant subscription through the CSP portal as follows:
6767

68-
![The tenant's CSP subscription page](./media/vmware-azure-multi-tenant-csp-disaster-recovery/users-and-licences.png)
68+
1. Go to the tenants CSP subscription page, and then select the **Users and licenses** option.
6969

70-
1. Now create a new user by entering the relevant details and selecting permissions, or by uploading the list of users in a CSV file.
70+
![The tenant's CSP subscription page](./media/vmware-azure-multi-tenant-csp-disaster-recovery/users-and-licences.png)
7171

72-
1. After you've created a new user, go back to the Azure portal. In the **Subscription** page, select the relevant subscription.
72+
1. Create a new user by entering the relevant details and selecting permissions, or by uploading the list of users in a CSV file.
7373

74-
1. Select **Access control (IAM)**, and then click **Role assignments**.
74+
1. After you've created a new user, go back to the Azure portal.
7575

76-
1. Click **Add role assignment** to add a user with the relevant access level. The users that were created through the CSP portal are displayed on the Role assignments tab.
76+
The following steps describe how to assign a role to a user. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
7777

78-
![Add a user](./media/vmware-azure-multi-tenant-csp-disaster-recovery/add-user-subscription.png)
78+
1. In the **Subscription** page, select the relevant subscription.
7979

80-
- For most management operations, the *Contributor* role is sufficient. Users with this access level can do everything on a subscription except change access levels (for which *Owner*-level access is required).
81-
- Site Recovery also has three [predefined user roles](site-recovery-role-based-linked-access-control.md), that can be used to further restrict access levels as required.
80+
1. In the navigation menu, select **Access control (IAM)**.
81+
82+
1. Select **Add** > **Add role assignment**.
83+
84+
:::image type="content" source="../../includes/role-based-access-control/media/add-role-assignment-menu-generic.png" alt-text="Screenshot that shows Access control (IAM) page with Add role assignment menu open.":::
85+
86+
1. On the **Role** tab, select a role.
87+
88+
For most management operations, the *Contributor* role is sufficient. Users with this access level can do everything on a subscription except change access levels (for which *Owner*-level access is required).
89+
90+
Site Recovery also has three [predefined user roles](site-recovery-role-based-linked-access-control.md), that can be used to further restrict access levels as required.
91+
92+
:::image type="content" source="../../includes/role-based-access-control/media/add-role-assignment-role-generic.png" alt-text="Screenshot that shows Add role assignment page with the Role tab selected.":::
93+
94+
1. On the **Members** tab, select **User, group, or service principal**, and then select a user with the relevant access level. The users that were created through the CSP portal are displayed here.
95+
96+
1. On the **Review + assign** tab, select **Review + assign** to assign the role.
8297

8398
## Multi-tenant environments
8499

0 commit comments

Comments
 (0)