Skip to content

Commit dd4f1d1

Browse files
committed
Update RBAC role assignment steps - batch 18
1 parent b8112e0 commit dd4f1d1

File tree

2 files changed

+2
-3
lines changed

2 files changed

+2
-3
lines changed

articles/azure-resource-manager/managed-applications/publish-managed-identity.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ ms.topic: conceptual
55
ms.author: jobreen
66
author: jjbfour
77
ms.date: 05/13/2019
8+
ms.custom: subject-rbac-steps
89
---
910
# Azure Managed Application with Managed Identity
1011

@@ -191,9 +192,7 @@ A basic Azure Resource Manager template that deploys a Managed Application with
191192

192193
## Granting access to Azure resources
193194

194-
Once a Managed Application is granted an identity, it can be granted access to existing Azure resources. This process can be done through the Access control (IAM) interface in the Azure portal. The name of the Managed Application or **user-assigned identity** can be searched to add a role assignment.
195-
196-
![Add role assignment for Managed Application](./media/publish-managed-identity/identity-role-assignment.png)
195+
Once a Managed Application is granted an identity, it can be granted access to existing Azure resources. This process can be done through the Access control (IAM) interface in the Azure portal. The name of the Managed Application or **user-assigned identity** can be searched to add a role assignment. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
197196

198197
## Linking existing Azure resources
199198

0 commit comments

Comments
 (0)