You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-studio/how-to/secure-data-playground.md
+20-14Lines changed: 20 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ Ensure that the AI Studio hub is deployed with the __Identity-based access__ set
35
35
36
36
- In the Azure portal, select the hub and then select __Settings__, __Properties__, and __Options__. At the bottom of the page, verify that __Storage account access type__ is set to __Identity-based access__.
37
37
- If deploying using Azure Resource Manager or Bicep templates, include the `systemDatastoresAuthMode: 'identity'` property in your deployment template.
38
-
38
+
- You must be familiar with using Microsoft Entra ID role-based access control to assign roles to resources and users. For more information, visit the [Role-based access control](/azure/role-based-access-control/overview) article.
39
39
40
40
## Configure Network Isolated AI Studio Hub
41
41
@@ -179,6 +179,8 @@ Repeat these steps for each resource that you want to connect to using Microsoft
179
179
180
180
The services need to authorize each other to access the connected resources. The admin performing the configuration needs to have the __Owner__ role on these resources to add role assignments. The following table lists the required role assignments for each resource. The __Assignee__ column refers to the system-assigned managed identity of the listed resource. The __Resource__ column refers to the resource that the assignee needs to access. For example, the Azure AI Search has a system-assigned managed identity that needs to be assigned the __Storage Blob Data Contributor__ role for the Azure Storage Account.
181
181
182
+
For more information on assigning roles, see [Tutorial: Grant a user access to resources](/azure/role-based-access-control/quickstart-assign-role-user-portal).
183
+
182
184
| Resource | Role | Assignee | Description |
183
185
|----------|------|----------|-------------|
184
186
| Azure AI Search | Search Index Data Contributor | Azure AI services/OpenAI | Read-write access to content in indexes. Import, refresh, or query the documents collection of an index. Only used for ingestion and inference scenarios. |
@@ -192,19 +194,23 @@ The services need to authorize each other to access the connected resources. The
192
194
> [!NOTE]
193
195
> The Cognitive Services OpenAI User role is only required if you are using two Azure OpenAI resources: one for your chat model and one for your embedding model. If this applies, enable Trusted Services AND ensure the Connection for your embedding model Azure OpenAI resource has EntraID enabled.
194
196
195
-
To enable your developers to use these resources to build applications, add the developers' identity with the following role assignments to the listed resources.
196
-
197
-
| Resource | Role | Description |
198
-
|----------|------|-------------|
199
-
| Azure AI Search | Contributor | List API-Keys to list indexes from Azure OpenAI Studio. |
200
-
| Azure AI Search | Search Index Data Contributor | Required for the indexing scenario. |
201
-
| Azure AI services/OpenAI | Cognitive Services OpenAI Contributor | Call public ingestion API from Azure OpenAI Studio. |
202
-
| Azure AI services/OpenAI | Cognitive Services User | List API-Keys from Azure OpenAI Studio. |
203
-
| Azure AI services/OpenAI | Contributor | Allows for calls to the control plane. |
204
-
| Azure Storage Account | Contributor | List Account SAS to upload files from Azure OpenAI Studio. |
205
-
| Azure Storage Account | Storage Blob Data Contributor | Needed for developers to read and write to blob storage. |
206
-
| Azure Storage Account | Storage File Data Privileged Contributor | Needed to Access File Share in Storage for Promptflow data. |
207
-
| The resource group or Azure subscription where the developer need to deploy the web app to | Contributor | Deploy web app to the developer's Azure subscription. |
197
+
### Assign roles to developers
198
+
199
+
To enable your developers to use these resources to build applications, assign the following roles to your developer's identity in Microsoft Entra ID. For example, assign the __Search Services Contributor__ role to the developer's Microsoft Entra ID for the Azure AI Search resource.
200
+
201
+
For more information on assigning roles, see [Tutorial: Grant a user access to resources](/azure/role-based-access-control/quickstart-assign-role-user-portal).
202
+
203
+
| Resource | Role | Assignee | Description |
204
+
|----------|------|----------|-------------|
205
+
| Azure AI Search | Search Services Contributor | Developer's Microsoft Entra ID | List API-Keys to list indexes from Azure OpenAI Studio. |
206
+
| Azure AI Search | Search Index Data Contributor | Developer's Microsoft Entra ID | Required for the indexing scenario. |
207
+
| Azure AI services/OpenAI | Cognitive Services OpenAI Contributor | Developer's Microsoft Entra ID | Call public ingestion API from Azure OpenAI Studio. |
208
+
| Azure AI services/OpenAI | Cognitive Services User | Developer's Microsoft Entra ID | List API-Keys from Azure OpenAI Studio. |
209
+
| Azure AI services/OpenAI | Contributor | Developer's Microsoft Entra ID | Allows for calls to the control plane. |
210
+
| Azure Storage Account | Contributor | Developer's Microsoft Entra ID | List Account SAS to upload files from Azure OpenAI Studio. |
211
+
| Azure Storage Account | Storage Blob Data Contributor | Developer's Microsoft Entra ID | Needed for developers to read and write to blob storage. |
212
+
| Azure Storage Account | Storage File Data Privileged Contributor | Developer's Microsoft Entra ID | Needed to Access File Share in Storage for Promptflow data. |
213
+
| The resource group or Azure subscription where the developer need to deploy the web app to | Contributor | Developer's Microsoft Entra ID | Deploy web app to the developer's Azure subscription. |
0 commit comments