Skip to content

Commit dfe18e8

Browse files
committed
updated rbac
1 parent ad41c06 commit dfe18e8

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

articles/active-directory-domain-services/scoped-synchronization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 01/20/2021
13+
ms.date: 03/07/2022
1414
ms.author: justinha
1515
ms.custom: devx-track-azurepowershell
1616

@@ -33,7 +33,7 @@ To complete this article, you need the following resources and privileges:
3333
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3434
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
3535
* If needed, complete the tutorial to [create and configure an Azure Active Directory Domain Services managed domain][tutorial-create-instance].
36-
* You need *global administrator* privileges in your Azure AD tenant to change the Azure AD DS synchronization scope.
36+
* You need [Application Administrator](/azure/active-directory/roles/permissions-reference#application-administrator) and [Groups Administrator](/azure/active-directory/roles/permissions-reference#groups-administrator) Azure AD roles in your tenant to change the Azure AD DS synchronization scope.
3737

3838
## Scoped synchronization overview
3939

articles/active-directory-domain-services/tutorial-configure-ldaps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 03/23/2021
11+
ms.date: 03/07/2022
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to secure access to an Azure Active Directory Domain Services managed domain using secure lightweight directory access protocol (LDAPS)
@@ -44,7 +44,7 @@ To complete this tutorial, you need the following resources and privileges:
4444
* If needed, [create and configure an Azure Active Directory Domain Services managed domain][create-azure-ad-ds-instance].
4545
* The *LDP.exe* tool installed on your computer.
4646
* If needed, [install the Remote Server Administration Tools (RSAT)][rsat] for *Active Directory Domain Services and LDAP*.
47-
* You need global administrator privileges in your Azure AD tenant to enable secure LDAP.
47+
* You need [Application Administrator](/azure/active-directory/roles/permissions-reference#application-administrator) and [Groups Administrator](/azure/active-directory/roles/permissions-reference#groups-administrator) Azure AD roles in your tenant to enable secure LDAP.
4848

4949
## Sign in to the Azure portal
5050

articles/active-directory-domain-services/tutorial-configure-networking.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 07/06/2020
11+
ms.date: 03/07/2022
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to create and configure a virtual network subnet or network peering for application workloads in an Azure Active Directory Domain Services managed domain
@@ -39,8 +39,8 @@ To complete this tutorial, you need the following resources and privileges:
3939
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
4040
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
4141
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
42-
* You need *global administrator* privileges in your Azure AD tenant to configure Azure AD DS.
43-
* You need *Contributor* privileges in your Azure subscription to create the required Azure AD DS resources.
42+
* You need [Application Administrator](/azure/active-directory/roles/permissions-reference#application-administrator) and [Groups Administrator](/azure/active-directory/roles/permissions-reference#groups-administrator) Azure AD roles in your tenant to enable Azure AD DS.
43+
* You need [Contributor](/azure/role-based-access-control/built-in-roles#contributor) Azure role to create the required Azure AD DS resources.
4444
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
4545
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services managed domain][create-azure-ad-ds-instance].
4646

0 commit comments

Comments
 (0)