Skip to content

Commit fc92937

Browse files
authored
Update built-in-roles.md
1 parent ea8f6d4 commit fc92937

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/key-vault/managed-hsm/built-in-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,15 @@ author: mbaldwin
77
ms.service: key-vault
88
ms.subservice: managed-hsm
99
ms.topic: reference
10-
ms.date: 01/04/2023
10+
ms.date: 11/06/2023
1111
ms.author: mbaldwin
1212

1313
---
1414
# Local RBAC built-in roles for Managed HSM
1515

1616
Azure Key Vault Managed HSM local role-based access control (RBAC) has several built-in roles. You can assign these roles to users, service principals, groups, and managed identities.
1717

18-
To allow a principal to perform an operation, you must assign them a role that grants them permissions to perform that operations. All these roles and operations allow you to manage permissions only for *data plane* operations.
18+
To allow a principal to perform an operation, you must assign them a role that grants them permissions to perform that operations. All these roles and operations allow you to manage permissions only for *data plane* operations. For *management plane* operations, see [Azure built-in roles](../../role-based-access-control/built-in-roles.md) and [Secure access to your managed HSMs](secure-your-managed-hsm.md).
1919

2020
To manage control plane permissions for the Managed HSM resource, you must use [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md). Some examples of control plane operations are to create a new managed HSM, or to update, move, or delete a managed HSM.
2121

0 commit comments

Comments
 (0)