You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. For the lab to handle encryption for all the lab disks, lab owner needs to explicitly grant the lab’s **system-assigned identity** reader role on the disk encryption set as well as virtual machine contributor role on the underlying Azure subscription. Lab owner can do so by completing the following steps:
31
+
1. For the lab to handle encryption for all the lab disks, lab owner needs to explicitly grant the lab’s **system-assigned identity** reader role on the disk encryption set as well as virtual machine contributor role on the underlying Azure subscription. The lab owner can do so by completing the following steps:
31
32
32
-
33
-
1. Ensure you are a member of [User Access Administrator role](../role-based-access-control/built-in-roles.md#user-access-administrator) at the Azure subscription level so that you can manage user access to Azure resources.
34
-
1. On the **Disk Encryption Set** page, select **Access control (IAM)** on the left menu.
35
-
1. Select **+ Add** on the toolbar and select **Add a role assignment**.
36
-
37
-
:::image type="content" source="./media/encrypt-disks-customer-managed-keys/add-role-management-menu.png" alt-text="Add role management - menu":::
38
-
1. On the **Add role assignment** page, select the **Reader** role or a role that allows more access.
39
-
1. Type the lab name for which the disk encryption set will be used and select the lab name (system-assigned identity for the lab) from the dropdown-list.
40
-
41
-
:::image type="content" source="./media/encrypt-disks-customer-managed-keys/select-lab.png" alt-text="Select system-managed identity of the lab":::
42
-
1. Select **Save** on the toolbar.
43
-
44
-
:::image type="content" source="./media/encrypt-disks-customer-managed-keys/save-role-assignment.png" alt-text="Save role assignment":::
45
-
3. Add the lab's **system-assigned identity** to the **Virtual Machine Contributor** role using the **Subscription** -> **Access control (IAM)** page. The steps are similar to the ones in the previous steps.
46
-
47
-
48
-
1. Navigate to the **Subscription** page in the Azure portal.
49
-
1. Select **Access control (IAM)**.
50
-
1. Select **+Add** on the toolbar, and select **Add a role assignment**.
51
-
52
-
:::image type="content" source="./media/encrypt-disks-customer-managed-keys/subscription-access-control-page.png" alt-text="Subscription -> Access control (IAM) page":::
53
-
1. On the **Add role assignment** page, select **Virtual Machine Contributor** for the role.
54
-
1. Type the lab name, and select the **lab name** (system-assigned identity for the lab) from the dropdown-list.
55
-
1. Select **Save** on the toolbar.
33
+
1. Ensure you are a member of [User Access Administrator role](../role-based-access-control/built-in-roles.md#user-access-administrator) at the Azure subscription level so that you can manage user access to Azure resources.
34
+
35
+
1. On the **Disk Encryption Set** page, assign at least the Reader role to the lab name for which the disk encryption set will be used.
36
+
37
+
For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
38
+
39
+
1. Navigate to the **Subscription** page in the Azure portal.
40
+
41
+
1. Assign the Virtual Machine Contributor role to the lab name (system-assigned identity for the lab).
56
42
57
43
## Encrypt lab OS disks with a customer-managed key
@@ -97,15 +97,21 @@ You need to create an Azure App registration ID that the on-premises hybrid work
97
97
98
98
4. After App ID registration is completed, make a note of the **Application (client) ID**, which you'll use while installing the hybrid worker.
99
99
100
-
5. In the Azure portal, navigate to Azure Database Migration Service, select **Access control (IAM)**, and then select **Add role assignment** to assign contributor access to the App ID.
100
+
5. In the Azure portal, navigate to Azure Database Migration Service.
101
101
102
-

102
+
6. In the navigation menu, select **Access control (IAM)**.
103
103
104
-
6. Select **Contributor**as the role, assign access to **Azure AD user, or service principal**, and then select the App ID name.
104
+
7. Select **Add**> **Add role assignment**.
105
105
106
-

106
+

107
107
108
-
7. Select **Save** to save the role assignment for the App ID on the Azure Database Migration Service resource.
108
+
8. On the **Role** tab, select the **Contributor** role.
109
+
110
+

111
+
112
+
9. On the **Members** tab, select **User, group, or service principal**, and then select the App ID name.
113
+
114
+
10. On the **Review + assign** tab, select **Review + assign** to assign the role.
0 commit comments