Configuring custom role for network peering to use environment validation
Applies to: Kyvos Enterprise Kyvos Cloud (SaaS on AWS) Kyvos AWS Marketplace
Kyvos Azure Marketplace Kyvos GCP Marketplace Kyvos Single Node Installation (Kyvos SNI)
Creating a custom role
Login to your Azure portal.
Navigate to Virtual Network and click Properties on the navigation bar. Copy the Resource ID and paste it on a notepad. You will need this for creating the custom role.
Navigate to Network Security group and click Properties on the navigation bar. Copy the Resource ID and paste it on a notepad. You will need this for creating the custom role.
Navigate to Resource Group and click Access Control (IAM) on the navigation bar.
Click Add > Add custom role as shown below.
Click the JSON tab, and then click Edit.
Delete the existing JSON text.
Copy the following text and paste it into the JSON textbox.
{ "properties": { "roleName": "<rolename>", "description": "", "assignableScopes": [ "<Virtual Network Resource ID>", "<Security Group Resource ID>" ], "permissions": [ { "actions": [ "Microsoft.Network/virtualNetworks/subnets/read", "Microsoft.Network/virtualNetworks/read", "Microsoft.Network/networkSecurityGroups/read", "Microsoft.Network/virtualNetworks/virtualNetworkPeerings/read" ], "notActions": [], "dataActions": [], "notDataActions": [] } ] } }Replace the <Virtual Network Resource ID> and <Security Group Resource ID> with the respective Resource IDs that you copied earlier (in steps 2-3).
Click Save. The JSON automatically assigns the required permissions.
Now go to the Basics tab, provide a unique name for your role.
Click on Review + Create. Then click Create.