Skip to content

Commit 4657980

Browse files
committed
docs: fix metadata, orphaned text, table, style edits
1 parent 88ebeb6 commit 4657980

1 file changed

Lines changed: 23 additions & 23 deletions

File tree

articles/firewall/roles-permissions.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -5,57 +5,57 @@ description: Learn about roles and permissions for Azure Firewall.
55
author: raboilla
66
ms.service: azure-firewall
77
ms.topic: concept-article
8-
ms.date: 12/9/2024
8+
ms.date: 03/28/2026
99
ms.author: duau
1010

1111
# Customer intent: "As an IT administrator, I want to configure roles and permissions for Azure Firewall, so that I can ensure the right access controls and functionalities are in place for users managing network resources."
1212
---
1313
# About roles and permissions for Azure Firewall
1414

15-
The Azure Firewall utilizes multiple resources, such as virtual networks and IP addresses, during both creation and management operations.
16-
Because of this, it's essential to verify permissions on all involved resources during these operations.
15+
Azure Firewall uses multiple resources, such as virtual networks and IP addresses, during both creation and management operations.
16+
Because of this dependency, you need to verify permissions on all involved resources during these operations.
1717

1818
## Azure built-in roles
1919

20-
You can choose to assign [Azure built-in roles](../role-based-access-control/built-in-roles.md) to a user, group, service principal, or managed identity such as [Network contributor](../role-based-access-control/built-in-roles.md#network-contributor), which support all the required permissions for creating the gateway.
20+
Assign [Azure built-in roles](../role-based-access-control/built-in-roles.md) to a user, group, service principal, or managed identity, such as [Network contributor](../role-based-access-control/built-in-roles.md#network-contributor), which supports all the required permissions for creating the gateway.
2121
For more information, see [Steps to assign an Azure role](../role-based-access-control/role-assignments-steps.md).
2222

2323
## Custom roles
2424

25-
If the [Azure built-in roles](../role-based-access-control/built-in-roles.md) don't meet the specific needs of your organization, you can create your own custom roles.
26-
Just like built-in roles, you can assign custom roles to users, groups, and service principals at management group, subscription, and resource group scopes.
27-
For more information, see [Steps to create a custom role](../role-based-access-control/custom-roles.md#steps-to-create-a-custom-role) .
25+
If the [Azure built-in roles](../role-based-access-control/built-in-roles.md) don't meet the specific needs of your organization, create your own custom roles.
26+
Like built-in roles, assign custom roles to users, groups, and service principals at management group, subscription, and resource group scopes.
27+
For more information, see [Steps to create a custom role](../role-based-access-control/custom-roles.md#steps-to-create-a-custom-role).
2828

29-
To ensure proper functionality, check your custom role permissions to confirm user service principals, and managed identities operating the Azure Firewall have the necessary permissions.
29+
To ensure proper functionality, check your custom role permissions to confirm user service principals and managed identities operating the Azure Firewall have the necessary permissions.
3030
To add any missing permissions listed here, see [Update a custom role](../role-based-access-control/custom-roles-portal.md#update-a-custom-role).
3131

3232
## Permissions
3333

34-
Depending on whether you're creating new resources or using existing ones, add the appropriate permissions from the following list for Azure Firewall in a Hub VNET:
34+
Depending on whether you're creating new resources or using existing ones, add the appropriate permissions from the following list for Azure Firewall in a hub VNET:
3535

36-
|Resource | Resource status | Required Azure permissions |
36+
| Resource | Resource status | Required Azure permissions |
3737
|---|---|---|
38-
| Subnet | Create new| Microsoft.Network/virtualNetworks/subnets/write<br>Microsoft.Network/virtualNetworks/subnets/join/action |
39-
| Subnet | Use existing| Microsoft.Network/virtualNetworks/subnets/read<br>Microsoft.Network/virtualNetworks/subnets/join/action |
40-
| IP addresses| Create new| Microsoft.Network/publicIPAddresses/write<br>Microsoft.Network/publicIPAddresses/join/action |
41-
| IP addresses | Use existing| Microsoft.Network/publicIPAddresses/read<br>Microsoft.Network/publicIPAddresses/join/action |
42-
| Azure Firewall | Create new/Update existing| Microsoft.Network/virtualNetworks/subnets/join/action<br>Microsoft.Network/publicIPAddresses/join/action<br>Microsoft.Network/virtualHubs/read |
38+
| Subnet | Create new | Microsoft.Network/virtualNetworks/subnets/write<br>Microsoft.Network/virtualNetworks/subnets/join/action |
39+
| Subnet | Use existing | Microsoft.Network/virtualNetworks/subnets/read<br>Microsoft.Network/virtualNetworks/subnets/join/action |
40+
| IP addresses | Create new | Microsoft.Network/publicIPAddresses/write<br>Microsoft.Network/publicIPAddresses/join/action |
41+
| IP addresses | Use existing | Microsoft.Network/publicIPAddresses/read<br>Microsoft.Network/publicIPAddresses/join/action |
42+
| Azure Firewall | Create new or Update existing | Microsoft.Network/virtualNetworks/subnets/join/action<br>Microsoft.Network/publicIPAddresses/join/action<br>Microsoft.Network/virtualHubs/read |
4343

44-
If you are creating an Azure Firewall in Azure Virtual WAN, add the following permission:
44+
If you're creating an Azure Firewall in Azure Virtual WAN, add the following permission:
4545

46-
|Resource | Resource status | Required Azure permissions |
46+
| Resource | Resource status | Required Azure permissions |
4747
|---|---|---|
48-
| virtualHubs | Create new/Update existing | Microsoft.Network/virtualHubs/read
48+
| virtualHubs | Create new/Update existing | Microsoft.Network/virtualHubs/read |
4949

5050
For more information, see [Azure permissions for Networking](../role-based-access-control/permissions/networking.md) and [Virtual network permissions](../virtual-network/virtual-network-manage-subnet.md#permissions).
5151

5252
## Roles scope
5353

54-
In the process of custom role definition, you can specify a role assignment scope at four levels: management group, subscription, resource group, and resources. To grant access, you assign roles to users, groups, service principals, or managed identities at a particular scope.
54+
When you create a custom role, specify a role assignment scope at one of four levels: management group, subscription, resource group, or resource. To grant access, assign roles to users, groups, service principals, or managed identities at a particular scope.
5555

5656
These scopes are structured in a parent-child relationship, with each level of hierarchy making the scope more specific. You can assign roles at any of these levels of scope, and the level you select determines how widely the role is applied.
5757

58-
For example, a role assigned at the subscription level can cascade down to all resources within that subscription, while a role assigned at the resource group level will only apply to resources within that specific group. Learn more about scope level
58+
For example, a role assigned at the subscription level can cascade down to all resources within that subscription, while a role assigned at the resource group level only applies to resources within that specific group.
5959
For more information, see [Scope levels](../role-based-access-control/scope-overview.md#scope-levels).
6060

6161
## Additional services
@@ -64,7 +64,7 @@ To view roles and permissions for other services, see the following links:
6464

6565
- [Azure Application Gateway](../application-gateway/configuration-infrastructure.md)
6666

67-
- [Azure ExpressRoute](../expressroute/roles-permissions.md)
67+
- [Azure ExpressRoute](../expressroute/roles-permissions.md)
6868

6969
- [Azure Route Server](../route-server/roles-permissions.md)
7070

@@ -75,9 +75,9 @@ To view roles and permissions for other services, see the following links:
7575
- [Azure VPN Gateway](../vpn-gateway/roles-permissions.md)
7676

7777
> [!NOTE]
78-
> Allow sufficient time for [Azure Resource Manager cache](../role-based-access-control/troubleshooting.md) to refresh after role assignment changes.
78+
> After you change role assignments, allow sufficient time for [Azure Resource Manager cache](../role-based-access-control/troubleshooting.md) to refresh.
7979
8080
## Next steps
8181

82-
[What is Azure Role Based Access](../role-based-access-control/overview.md)
82+
[What's Azure Role Based Access](../role-based-access-control/overview.md)
8383
[Azure Role Based Access Control](/azure/role-based-access-control/role-assignments-list-portal)

0 commit comments

Comments
 (0)