Skip to content

Commit 438eee7

Browse files
authored
Added new Groups Picker Blade on Identity Screen and updated params to match (#750)
* removed Key expiration * updated Groups UI
1 parent 73e0d94 commit 438eee7

File tree

3 files changed

+79
-71
lines changed

3 files changed

+79
-71
lines changed

workload/arm/deploy-baseline.json

+20-17
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
"_generator": {
66
"name": "bicep",
77
"version": "0.33.93.31351",
8-
"templateHash": "5003960196162257854"
8+
"templateHash": "4667874415365759690"
99
},
1010
"name": "AVD Accelerator - Baseline Deployment",
1111
"description": "AVD Accelerator - Deployment Baseline",
@@ -99,18 +99,11 @@
9999
"description": "Required, Eronll session hosts on Intune. (Default: false)"
100100
}
101101
},
102-
"securityPrincipalId": {
103-
"type": "string",
104-
"defaultValue": "",
105-
"metadata": {
106-
"description": "Optional, Identity ID to grant RBAC role to access AVD application group and NTFS permissions. (Default: \"\")"
107-
}
108-
},
109-
"securityPrincipalName": {
110-
"type": "string",
111-
"defaultValue": "",
102+
"avdSecurityGroups": {
103+
"type": "array",
104+
"defaultValue": [],
112105
"metadata": {
113-
"description": "Optional, Identity name to grant RBAC role to access AVD application group and NTFS permissions. (Default: \"\")"
106+
"description": "Optional. Identity ID(s) to grant RBAC role to access AVD application group and NTFS permissions. (Default: [])"
114107
}
115108
},
116109
"identityDomainName": {
@@ -1738,7 +1731,9 @@
17381731
"enableDefaultTelemetry": false,
17391732
"tags": "[if(parameters('createResourceTags'), union(variables('varAllComputeStorageTags'), variables('varAvdDefaultTags')), union(variables('varAvdDefaultTags'), variables('varAllComputeStorageTags')))]"
17401733
}
1741-
]
1734+
],
1735+
"varSecurityPrincipalId": "[if(not(empty(parameters('avdSecurityGroups'))), parameters('avdSecurityGroups')[0].objectId, '')]",
1736+
"varSecurityPrincipalName": "[if(not(empty(parameters('avdSecurityGroups'))), parameters('avdSecurityGroups')[0].displayName, '')]"
17421737
},
17431738
"resources": [
17441739
{
@@ -8649,7 +8644,9 @@
86498644
"identityServiceProvider": {
86508645
"value": "[parameters('avdIdentityServiceProvider')]"
86518646
},
8652-
"securityPrincipalId": "[if(not(empty(parameters('securityPrincipalId'))), createObject('value', parameters('securityPrincipalId')), createObject('value', ''))]",
8647+
"securityPrincipalId": {
8648+
"value": "[variables('varSecurityPrincipalId')]"
8649+
},
86538650
"tags": "[if(parameters('createResourceTags'), createObject('value', union(variables('varCustomResourceTags'), variables('varAvdDefaultTags'))), createObject('value', variables('varAvdDefaultTags')))]",
86548651
"alaWorkspaceResourceId": "[if(parameters('avdDeployMonitoring'), if(parameters('deployAlaWorkspace'), createObject('value', reference(subscriptionResourceId('Microsoft.Resources/deployments', format('Monitoring-{0}', parameters('time'))), '2022-09-01').outputs.avdAlaWorkspaceResourceId.value), createObject('value', parameters('alaExistingWorkspaceResourceId'))), createObject('value', ''))]",
86558652
"hostPoolAgentUpdateSchedule": {
@@ -12738,7 +12735,9 @@
1273812735
"createStorageDeployment": {
1273912736
"value": "[variables('varCreateStorageDeployment')]"
1274012737
},
12741-
"securityPrincipalId": "[if(not(empty(parameters('securityPrincipalId'))), createObject('value', parameters('securityPrincipalId')), createObject('value', ''))]",
12738+
"securityPrincipalId": {
12739+
"value": "[variables('varSecurityPrincipalId')]"
12740+
},
1274212741
"tags": "[if(parameters('createResourceTags'), createObject('value', union(variables('varCustomResourceTags'), variables('varAvdDefaultTags'))), createObject('value', variables('varAvdDefaultTags')))]"
1274312742
},
1274412743
"template": {
@@ -26638,7 +26637,9 @@
2663826637
"value": "[variables('varOuStgPath')]"
2663926638
},
2664026639
"managedIdentityClientId": "[if(variables('varCreateStorageDeployment'), createObject('value', reference(subscriptionResourceId('Microsoft.Resources/deployments', format('Identities-And-RoleAssign-{0}', parameters('time'))), '2022-09-01').outputs.managedIdentityStorageClientId.value), createObject('value', ''))]",
26641-
"securityPrincipalName": "[if(not(empty(parameters('securityPrincipalName'))), createObject('value', parameters('securityPrincipalName')), createObject('value', ''))]",
26640+
"securityPrincipalName": {
26641+
"value": "[variables('varSecurityPrincipalName')]"
26642+
},
2664226643
"domainJoinUserName": {
2664326644
"value": "[parameters('avdDomainJoinUserName')]"
2664426645
},
@@ -29594,7 +29595,9 @@
2959429595
"value": "[variables('varOuStgPath')]"
2959529596
},
2959629597
"managedIdentityClientId": "[if(variables('varCreateStorageDeployment'), createObject('value', reference(subscriptionResourceId('Microsoft.Resources/deployments', format('Identities-And-RoleAssign-{0}', parameters('time'))), '2022-09-01').outputs.managedIdentityStorageClientId.value), createObject('value', ''))]",
29597-
"securityPrincipalName": "[if(not(empty(parameters('securityPrincipalName'))), createObject('value', parameters('securityPrincipalName')), createObject('value', ''))]",
29598+
"securityPrincipalName": {
29599+
"value": "[variables('varSecurityPrincipalName')]"
29600+
},
2959829601
"domainJoinUserName": {
2959929602
"value": "[parameters('avdDomainJoinUserName')]"
2960029603
},

workload/bicep/deploy-baseline.bicep

+11-10
Original file line numberDiff line numberDiff line change
@@ -56,11 +56,8 @@ param avdIdentityServiceProvider string = 'ADDS'
5656
@sys.description('Required, Eronll session hosts on Intune. (Default: false)')
5757
param createIntuneEnrollment bool = false
5858

59-
@sys.description('Optional, Identity ID to grant RBAC role to access AVD application group and NTFS permissions. (Default: "")')
60-
param securityPrincipalId string = ''
61-
62-
@sys.description('Optional, Identity name to grant RBAC role to access AVD application group and NTFS permissions. (Default: "")')
63-
param securityPrincipalName string = ''
59+
@sys.description('Optional. Identity ID(s) to grant RBAC role to access AVD application group and NTFS permissions. (Default: [])')
60+
param avdSecurityGroups array = []
6461

6562
@sys.description('FQDN of on-premises AD domain, used for FSLogix storage configuration and NTFS setup. (Default: "")')
6663
param identityDomainName string = 'none'
@@ -943,6 +940,10 @@ var varResourceGroups = [
943940
}
944941
]
945942

943+
// security Principals (you can add support for more than one because it is an array. Future)
944+
var varSecurityPrincipalId = !empty(avdSecurityGroups) ? avdSecurityGroups[0].objectId : ''
945+
var varSecurityPrincipalName = !empty(avdSecurityGroups) ? avdSecurityGroups[0].displayName : ''
946+
946947
// =========== //
947948
// Deployments //
948949
// =========== //
@@ -1108,7 +1109,7 @@ module managementPLane './modules/avdManagementPlane/deploy.bicep' = {
11081109
startVmOnConnect: avdStartVmOnConnect
11091110
subscriptionId: avdWorkloadSubsId
11101111
identityServiceProvider: avdIdentityServiceProvider
1111-
securityPrincipalId: !empty(securityPrincipalId) ? securityPrincipalId : ''
1112+
securityPrincipalId: varSecurityPrincipalId
11121113
tags: createResourceTags ? union(varCustomResourceTags, varAvdDefaultTags) : varAvdDefaultTags
11131114
alaWorkspaceResourceId: avdDeployMonitoring
11141115
? (deployAlaWorkspace
@@ -1157,7 +1158,7 @@ module identity './modules/identity/deploy.bicep' = {
11571158
enableStartVmOnConnect: avdStartVmOnConnect
11581159
identityServiceProvider: avdIdentityServiceProvider
11591160
createStorageDeployment: varCreateStorageDeployment
1160-
securityPrincipalId: !empty(securityPrincipalId) ? securityPrincipalId : ''
1161+
securityPrincipalId: varSecurityPrincipalId
11611162
tags: createResourceTags ? union(varCustomResourceTags, varAvdDefaultTags) : varAvdDefaultTags
11621163
}
11631164
dependsOn: [
@@ -1177,7 +1178,7 @@ module zeroTrust './modules/zeroTrust/deploy.bicep' = if (diskZeroTrust && avdDe
11771178
diskZeroTrust: diskZeroTrust
11781179
serviceObjectsRgName: varServiceObjectsRgName
11791180
computeObjectsRgName: varComputeObjectsRgName
1180-
vaultSku: varWrklKeyVaultSku
1181+
vaultSku: any(varWrklKeyVaultSku)
11811182
diskEncryptionKeyExpirationInDays: diskEncryptionKeyExpirationInDays
11821183
diskEncryptionSetName: varDiskEncryptionSetName
11831184
ztKvName: varZtKvName
@@ -1353,7 +1354,7 @@ module fslogixAzureFilesStorage './modules/storageAzureFiles/deploy.bicep' = if
13531354
deployPrivateEndpoint: deployPrivateEndpointKeyvaultStorage
13541355
ouStgPath: varOuStgPath
13551356
managedIdentityClientId: varCreateStorageDeployment ? identity.outputs.managedIdentityStorageClientId : ''
1356-
securityPrincipalName: !empty(securityPrincipalName) ? securityPrincipalName : ''
1357+
securityPrincipalName: varSecurityPrincipalName
13571358
domainJoinUserName: avdDomainJoinUserName
13581359
wrklKvName: varWrklKvName
13591360
serviceObjectsRgName: varServiceObjectsRgName
@@ -1404,7 +1405,7 @@ module appAttachAzureFilesStorage './modules/storageAzureFiles/deploy.bicep' = i
14041405
deployPrivateEndpoint: deployPrivateEndpointKeyvaultStorage
14051406
ouStgPath: varOuStgPath
14061407
managedIdentityClientId: varCreateStorageDeployment ? identity.outputs.managedIdentityStorageClientId : ''
1407-
securityPrincipalName: !empty(securityPrincipalName) ? securityPrincipalName : ''
1408+
securityPrincipalName: varSecurityPrincipalName
14081409
domainJoinUserName: avdDomainJoinUserName
14091410
wrklKvName: varWrklKvName
14101411
serviceObjectsRgName: varServiceObjectsRgName

0 commit comments

Comments
 (0)