Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit e8f6a26

Browse files
committedApr 9, 2022
Update RBAC role assignment steps - batch 21
1 parent b9f1bc1 commit e8f6a26

File tree

5 files changed

+29
-27
lines changed

5 files changed

+29
-27
lines changed
 

‎articles/stream-analytics/blob-output-managed-identity.md

Lines changed: 19 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ ms.author: ebnkruma
66
ms.service: stream-analytics
77
ms.topic: how-to
88
ms.date: 07/07/2021
9+
ms.custom: subject-rbac-steps
910
---
1011

1112
# Use Managed Identity to authenticate your Azure Stream Analytics job to Azure Blob Storage
@@ -171,35 +172,37 @@ Unless you need the job to create containers on your behalf, you should choose *
171172

172173
1. Navigate to the container's configuration pane within your storage account.
173174

174-
2. Select **Access Control (IAM)** on the left-hand side.
175+
1. Select **Access control (IAM)**.
175176

176-
3. Under the "Add a role assignment" section click **Add**.
177+
1. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
177178

178-
4. In the role assignment pane:
179+
1. Assign the following role. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
179180

180-
1. Set the **Role** to "Storage Blob Data Contributor"
181-
2. Ensure the **Assign access to** dropdown is set to "Azure AD user, group, or service principal".
182-
3. Type the name of your Stream Analytics job in the search field.
183-
4. Select your Stream Analytics job and click **Save**.
181+
| Setting | Value |
182+
| --- | --- |
183+
| Role | Storage Blob Data Contributor |
184+
| Assign access to | User, group, or service principal |
185+
| Members | <Name of your Stream Analytics job> |
184186

185-
![Grant container access](./media/stream-analytics-managed-identities-blob-output-preview/stream-analytics-container-access-portal.png)
187+
![Screenshot that shows Add role assignment page in Azure portal.](../../includes/role-based-access-control/media/add-role-assignment-page.png)
186188

187189
#### Account level access
188190

189191
1. Navigate to your storage account.
190192

191-
2. Select **Access Control (IAM)** on the left-hand side.
193+
1. Select **Access control (IAM)**.
192194

193-
3. Under the "Add a role assignment" section click **Add**.
195+
1. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
194196

195-
4. In the role assignment pane:
197+
1. Assign the following role. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
196198

197-
1. Set the **Role** to "Storage Blob Data Contributor"
198-
2. Ensure the **Assign access to** dropdown is set to "Azure AD user, group, or service principal".
199-
3. Type the name of your Stream Analytics job in the search field.
200-
4. Select your Stream Analytics job and click **Save**.
199+
| Setting | Value |
200+
| --- | --- |
201+
| Role | Storage Blob Data Contributor |
202+
| Assign access to | User, group, or service principal |
203+
| Members | <Name of your Stream Analytics job> |
201204

202-
![Grant account access](./media/stream-analytics-managed-identities-blob-output-preview/stream-analytics-account-access-portal.png)
205+
![Screenshot that shows Add role assignment page in Azure portal.](../../includes/role-based-access-control/media/add-role-assignment-page.png)
203206

204207
### Grant access via the command line
205208

‎articles/stream-analytics/event-hubs-managed-identity.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ ms.author: ebnkruma
66
ms.service: stream-analytics
77
ms.topic: how-to
88
ms.date: 07/07/2021
9+
ms.custom: subject-rbac-steps
910
---
1011

1112
# Use managed identities to access Event Hub from an Azure Stream Analytics job
@@ -38,21 +39,19 @@ First, you create a managed identity for your Azure Stream Analytics job. 
3839

3940
For the Stream Analytics job to access your Event Hub using managed identity, the service principal you created must have special permissions to the Event Hub.
4041

41-
1. Go to **Access Control (IAM)** in your Event Hub.
42+
1. Select **Access control (IAM)**.
4243

43-
1. Select **+ Add** and **Add role assignment**.
44+
1. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
4445

45-
1. On the **Add role assignment** page, enter the following options:
46+
1. Assign the following role. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
4647

47-
|Parameter|Value|
48-
|---------|-----|
49-
|Role|Azure Event Hubs Data Owner|
50-
|Assign access to|User, group, or service principal|
51-
|Select|Enter the name of your Stream Analytics job|
48+
| Setting | Value |
49+
| --- | --- |
50+
| Role | Azure Event Hubs Data Owner |
51+
| Assign access to | User, group, or service principal |
52+
| Members | <Name of your Stream Analytics job> |
5253

53-
:::image type="content" source="media/event-hubs-managed-identity/add-role-assignment.png" alt-text="Add role assignment":::
54-
55-
1. Select **Save** and wait a minute or so for changes to propagate.
54+
![Screenshot that shows Add role assignment page in Azure portal.](../../includes/role-based-access-control/media/add-role-assignment-page.png)
5655

5756
You can also grant this role at the Event Hub Namespace level, which will naturally propagate the permissions to all Event Hubs created under it. That is, all Event Hubs under a Namespace can be used as a managed-identity-authenticating resource in your Stream Analytics job.
5857

0 commit comments

Comments
 (0)
Please sign in to comment.