This process is for Ingram Micro Cloud Resellers as well as their end-customers.

 

In case you are missing Azure margins, the end-customer might have removed you as their Administrator On Behalf Of (AOBO).


To restore the AOBO connection, please ask the end-customer to follow the details and instructions described in the sections below:


Why can't resellers see Azure margins

When an end-customer removes a reseller as an AOBO, PEC is removed for the reseller which has no margin/revenue. This can be checked by going to Subscription → Access control (IAM) → Roles assigned and then, noticing that there is no Foreign Principal role available for the subscription.


Pre-requisites before making changes to AOBO settings

The end-customer will need the following details about the subscription before they can make changes to the AOBO settings.

  1. Subscription ID: It can be found in the Azure Portal: Subscriptions → Overview page

  2. End-customer's Tenant ID: It can be found in the Azure Portal: Azure Active Directory → Properties page. 

Process to re-enable the reseller as an AOBO

  1. Go to the Azure portal and then, click on Cloud Shell  Powershell.


  2. Get object id for Foreign principal role using the code below.
    • Connect-AzAccount -Tenant '{TenandId}'
      Get-AZRoleAssignment -Scope /subscriptions/{SubscriptionId} | where DisplayName -like 'Foreign Principal*' | fl DisplayName, ObjectID
      
      With the above mentioned code, you should be able to get the Object ID for that subscription, which corresponds to the Foreign principal role.
    • An example for code is mentioned below, together with its result.
      • Connect-AzAccount -Tenant '9f39314a-9438-4c64-8252-15c5286b9a70'
        Get-AZRoleAssignment -Scope /subscriptions/40105073-6328-44c8-91b3-d56d544ad454 | where DisplayName -like 'Foreign Principal*' | fl DisplayName, ObjectID
        
      • Using the above mentioned code will give you the following result. 

  3. Set the Foreign principal role again to the Subscription using the code below.
    • New-AZRoleAssignment -ObjectId '{ObjectId from previous step}' -RoleDefinitionName {Owner, Reader, Contributer or what ever role you like} -Scope /subscriptions/***
    • An example for code is mentioned below, together with its result.
      • New-AZRoleAssignment -ObjectId '47f71ca6-2362-4826-879a-537e79ffcc32' -RoleDefinitionName Owner -Scope /subscriptions/40105073-6328-44c8-91b3-d56d544ad45
        
      • Using the above mentioned code will give you the following result. 

  4. This will then enable the Foreign Principal role again. With this, the subscription will be eligible for PEC.