Before setting up the environment, gather the following details to ensure proper configuration:
10.1.0.0/19
) that do not overlap with existing networks.Before proceeding, you must add our account to your Entra tenant. Azure RBAC roles can only be assigned to users who exist in your Entra ID. Quick Link: Invite new Entra tenant member as Guest Steps:
Microsoft Entra Id
+ Add
(top bar, left), User
> Invite External User
[email protected]
Subscriptions
+ Add
(top bar, left)Subscriptions
Access Control (IAM)
(left menu)+ Add
(top bar, left), Add role assignment
Privileged administrator roles
Owner
+ select Members
[email protected]
, SelectAllow user to assign all roles except privileged administrator roles Owner, UAA, RBAC (Recommended)
optionQ: Can I assign the Contributor role instead of Owner? A: No, Contributor does not grant permission to assign roles for Azure Managed Identities, which is required for our setup.
Q: Do I need to invite a separate user for each engineer at Quix?
A: No, you only need to invite [email protected]
. Our internal team will manage access on our side.
Q: Can I remove your access after setup is complete? A: You can downgrade our access after deployment. However, without Contributor access, we can only provide guidance—you’ll need to apply fixes manually. This may impact SLA commitments if an issue requires intervention. We recommend keeping at least Reader access for monitoring and Break-Glass access to temporarily restore full permissions when needed.
Q: How do I audit what permissions Quix has in my environment? A: You can check our assigned roles in the Azure Portal under Access Control (IAM) for the subscription or resource group or via cli:
az role assignment list --assignee [[email protected]](<mailto:[email protected]>) --output table
Please see our private networking guide.