Skip to content

Commit 57e6884

Browse files
committed
wip
1 parent 37cdaf7 commit 57e6884

2 files changed

Lines changed: 20 additions & 0 deletions

File tree

docs/infrastructure/new-subscription-setup.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,3 +68,12 @@ Once the feature 'EncryptionAtHost' is registered, invoking 'az provider registe
6868
"type": "Microsoft.Features/providers/features"
6969
}
7070
alastairlock@Mac lung_cancer_screening %
71+
72+
73+
74+
75+
76+
az role assignment create \
77+
--assignee 6b64ad54-d76b-4ab8-975b-1e99b1a406cd \
78+
--role "User Access Administrator" \
79+
--scope /subscriptions/9061cb83-ab36-43cf-9ec8-88431961af30

infrastructure/terraform/hub/virtual_desktop.tf

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,17 @@ resource "azurerm_role_assignment" "avd_autoscale_blue" {
4141
principal_id = local.principal_id
4242
}
4343

44+
45+
resource "azurerm_role_assignment" "avd_autoscale_blue_vm_contributor" {
46+
for_each = (local.deploy_blue_avd ? var.regions : {})
47+
48+
scope = azurerm_resource_group.avd_blue[each.key].id
49+
role_definition_name = "Virtual Machine Contributor"
50+
51+
# Azure Virtual Desktop autoscale service principal (Microsoft-managed)
52+
principal_id = local.principal_id
53+
}
54+
4455
# Assign role to Terraform SP so it can create role assignments
4556
resource "azurerm_role_assignment" "terraform_user_access_blue" {
4657
for_each = (local.deploy_blue_avd ? var.regions : {})

0 commit comments

Comments
 (0)