You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article describes how to use the Role-based Access Control (RBAC) to control access to Arc virtual machines (VMs) running on Azure Local.
15
+
This article describes how to use the Role-based Access Control (RBAC) to control access to Azure Local virtual machines (VMs).
16
16
17
17
You can use the builtin RBAC roles to control access to VMs and VM resources such as virtual disks, network interfaces, VM images, logical networks and storage paths. You can assign these roles to users, groups, service principals and managed identities.
18
18
@@ -26,14 +26,12 @@ To control access to VMs and VM resources on Azure Local, you can use the follow
26
26
27
27
Here's a table that describes the VM actions granted by each role for the VMs and the various VM resources. The VM resources are referred to resources required to create a VM and include virtual disks, network interfaces, VM images, logical networks, and storage paths:
28
28
29
-
30
29
| Builtin role | VMs | VM resources |
31
30
|--|--|--|
32
31
| Azure Stack HCI Administrator | Create, list, delete VMs<br><br> Start, stop, restart VMs | Create, list, delete all VM resources including logical networks, VM images, and storage paths |
33
32
| Azure Stack HCI VM Contributor | Create, list, delete VMs<br><br> Start, stop, restart VMs | Create, list, delete all VM resources except logical networks, VM images, and storage paths |
34
33
| Azure Stack HCI VM Reader | List all VMs | List all VM resources |
35
34
36
-
37
35
## Prerequisites
38
36
39
37
Before you begin, make sure to complete the following prerequisites:
@@ -44,18 +42,17 @@ Before you begin, make sure to complete the following prerequisites:
44
42
45
43
## Assign RBAC roles to users
46
44
47
-
You can assign RBAC roles to user via the Azure portal. Follow these steps to assign RBAC roles to users:
45
+
You can assign RBAC roles to users via the Azure portal. Follow these steps to assign RBAC roles to users:
48
46
49
47
1. In the Azure portal, search for the scope to grant access to, for example, search for subscriptions, resource groups, or a specific resource. In this example, we use the subscription in which your Azure Local is deployed.
50
48
51
-
52
-
1. Go to your subscription and then go to **Access control (IAM) > Role assignments**. From the top command bar, select **+ Add** and then select **Add role assignment**.
49
+
1. Go to your subscription and then go to **Access control (IAM)** > **Role assignments**. From the top command bar, select **+ Add** and then select **Add role assignment**.
53
50
54
51
If you don't have permissions to assign roles, the **Add role assignment** option is disabled.
55
52
56
53
:::image type="content" source="./media/assign-vm-rbac-roles/add-role-assignment-1.png" alt-text="Screenshot showing RBAC role assignment in Azure portal for your Azure Local." lightbox="./media/assign-vm-rbac-roles/add-role-assignment-1.png":::
57
54
58
-
1. On the **Role** tab, select an RBAC role to assign and choose from one of the following builtin roles:
55
+
1. On the **Role** tab, select an RBAC role to assign and select one of the following builtin roles:
59
56
60
57
-**Azure Stack HCI Administrator**
61
58
-**Azure Stack HCI VM Contributor**
@@ -71,7 +68,7 @@ You can assign RBAC roles to user via the Azure portal. Follow these steps to as
71
68
72
69
:::image type="content" source="./media/assign-vm-rbac-roles/add-role-assignment-4.png" alt-text="Screenshot showing Review + assign tab during role assignment in Azure portal for your Azure Local instance." lightbox="./media/assign-vm-rbac-roles/add-role-assignment-4.png":::
73
70
74
-
1. Verify the role assignment. Go to **Access control (IAM) > Check access > View my access**. You should see the role assignment.
71
+
1. Verify the role assignment. Go to **Access control (IAM)** > **Check access** > **View my access**. You should see the role assignment.
75
72
76
73
:::image type="content" source="./media/assign-vm-rbac-roles/add-role-assignment-5.png" alt-text="Screenshot showing newly assigned role in Azure portal for your Azure Local instance." lightbox="./media/assign-vm-rbac-roles/add-role-assignment-5.png":::
0 commit comments