Skip to content

Commit f3896fa

Browse files
Merge pull request #229429 from bandersmsft/ghissue105562
MCM - Update view-reservations for ghissue 105562
2 parents ddc6376 + fcae369 commit f3896fa

File tree

1 file changed

+12
-10
lines changed

1 file changed

+12
-10
lines changed

articles/cost-management-billing/reservations/view-reservations.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.reviewer: nitinarora
66
ms.service: cost-management-billing
77
ms.subservice: reservations
88
ms.topic: how-to
9-
ms.date: 12/06/2022
9+
ms.date: 03/03/2023
1010
ms.author: banders
1111
---
1212

@@ -132,16 +132,19 @@ When you use the PowerShell script to assign the ownership role and it runs succ
132132
- Accept wildcard characters: False
133133

134134
## Tenant-level access
135-
[User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) rights are required before you can grant users or groups the Reservation Administrator and Reservation Reader roles at the tenant level. In order to get User Access Administrator rights at the tenant level, follow [Elevate access](../../role-based-access-control/elevate-access-global-admin.md) steps.
136135

137-
## Add a Reservation Administrator role or Reservation Reader role at the tenant level
136+
[User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) rights are required before you can grant users or groups the Reservations Administrator and Reservations Reader roles at the tenant level. In order to get User Access Administrator rights at the tenant level, follow [Elevate access](../../role-based-access-control/elevate-access-global-admin.md) steps.
137+
138+
### Add a Reservations Administrator role or Reservations Reader role at the tenant level
138139
You can assign these roles from [Azure portal](https://portal.azure.com).
139140

140141
1. Sign in to the Azure portal and navigate to **Reservations**.
141-
2. At the top of the page, select **Role Assignment**.
142-
3. To make modifications, add user as a Reservation Administrator or Reservation Reader using Access control.
142+
1. Select a reservation that you have access to.
143+
1. At the top of the page, select **Role Assignment**.
144+
1. Select the **Roles** tab.
145+
1. To make modifications, add a user as a Reservations Administrator or Reservations Reader using Access control.
143146

144-
## Add a Reservation Administrator role at the tenant level using Azure PowerShell script
147+
### Add a Reservation Administrator role at the tenant level using Azure PowerShell script
145148

146149
Use the following Azure PowerShell script to add a Reservation Administrator role at the tenant level with PowerShell.
147150

@@ -152,7 +155,7 @@ Connect-AzAccount -Tenant <TenantId>
152155
New-AzRoleAssignment -Scope "/providers/Microsoft.Capacity" -PrincipalId <ObjectId> -RoleDefinitionName "Reservations Administrator"
153156
```
154157

155-
### Parameters
158+
#### Parameters
156159

157160
**-ObjectId** Azure AD ObjectId of the user, group, or service principal.
158161
- Type: String
@@ -169,7 +172,7 @@ New-AzRoleAssignment -Scope "/providers/Microsoft.Capacity" -PrincipalId <Object
169172
- Accept pipeline input: False
170173
- Accept wildcard characters: False
171174

172-
## Assign a Reservation Reader role at the tenant level using Azure PowerShell script
175+
### Assign a Reservation Reader role at the tenant level using Azure PowerShell script
173176

174177
Use the following Azure PowerShell script to assign the Reservation Reader role at the tenant level with PowerShell.
175178

@@ -183,7 +186,7 @@ Connect-AzAccount -Tenant <TenantId>
183186
New-AzRoleAssignment -Scope "/providers/Microsoft.Capacity" -PrincipalId <ObjectId> -RoleDefinitionName "Reservations Reader"
184187
```
185188

186-
### Parameters
189+
#### Parameters
187190

188191
**-ObjectId** Azure AD ObjectId of the user, group, or service principal.
189192
- Type: String
@@ -200,7 +203,6 @@ New-AzRoleAssignment -Scope "/providers/Microsoft.Capacity" -PrincipalId <Object
200203
- Accept pipeline input: False
201204
- Accept wildcard characters: False
202205

203-
204206
## Next steps
205207

206208
- [Manage Azure Reservations](manage-reserved-vm-instance.md).

0 commit comments

Comments
 (0)