Skip to content

Commit 67f2fc4

Browse files
committed
acrox lint
1 parent 43577f9 commit 67f2fc4

File tree

1 file changed

+17
-17
lines changed

1 file changed

+17
-17
lines changed

articles/machine-learning/concept-endpoints-online-auth.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,17 @@
11
---
22
title: Authentication and authorization for online endpoints
33
titleSuffix: Azure Machine Learning
4-
description: Learn how authentication and authorization work for Azure Machine Learning online endpoints.
4+
description: Learn how authentication, authorization, and Azure role-based access control (RBAC) work for Azure Machine Learning online endpoints.
55
services: machine-learning
66
ms.service: azure-machine-learning
77
ms.subservice: inferencing
8-
ms.topic: conceptual
8+
ms.topic: concept-article
99
author: msakande
1010
ms.author: mopeakande
1111
ms.reviewer: sehan
12-
ms.custom: devplatv2
12+
ms.custom: devplatv2, FY25Q1-Linter
1313
ms.date: 09/30/2024
14+
#Customer intent: As a data scientist, I want to learn how authentication and authorization work for Azure Machine Learning online endpoints so I can create and deploy online endpoints.
1415
---
1516

1617
# Authentication and authorization for online endpoints
@@ -30,11 +31,11 @@ The user identity and endpoint identity have separate permission requirements. F
3031
3132
## Permissions and scope for authorization
3233

33-
[Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/overview) allows you to define and assign **roles** with a set of allowed and/or denied **actions** on specific **scopes**. You can customize these roles and scopes according to your business needs. The following examples serve as a starting point that you can extend as necessary.
34+
[Azure role-based access control (RBAC)](/azure/role-based-access-control/overview) allows you to define and assign **roles** with a set of allowed and/or denied **actions** on specific **scopes**. You can customize these roles and scopes according to your business needs. The following examples serve as a starting point that you can extend as necessary.
3435

3536
For user identity:
3637

37-
- To control control plane and data plane operations, you can use the built-in role **AzureML Data Scientist** that includes the permission action `Microsoft.MachineLearningServices/workspaces/onlineEndpoints/*/actions`.
38+
- To manage control plane and data plane operations, you can use the built-in role **AzureML Data Scientist** that includes the permission action `Microsoft.MachineLearningServices/workspaces/onlineEndpoints/*/actions`.
3839
- To control the operations for a specific endpoint, use the scope `/subscriptions/<subscriptionId>/resourcegroups/<resourceGroupName>/providers/Microsoft.MachineLearningServices/workspaces/<workspaceName>/onlineEndpoints/<endpointName>`.
3940
- To control the operations for all endpoints in a workspace, use the scope `/subscriptions/<subscriptionId>/resourcegroups/<resourceGroupName>/providers/Microsoft.MachineLearningServices/workspaces/<workspaceName>`.
4041

@@ -73,15 +74,15 @@ For control plane operations, your user identity needs to have the proper Azure
7374

7475
#### Permissions for user identity to enforce access to default secret stores
7576

76-
If you use the [secret injection](concept-secret-injection.md) feature and you set the flag to enforce access to the default secret stores while creating your endpoints, your user identity must have permission to read secrets from workspace connections.
77+
If you use the [secret injection](concept-secret-injection.md) feature, and you set the flag to enforce access to the default secret stores while creating endpoints, your user identity must have permission to read secrets from workspace connections.
7778

78-
An endpoint identity can be either a system-assigned identity (SAI) or a user-assigned identity (UAI). When the endpoint is created with a SAI and the flag to enforce access to the default secret stores is set, a user identity must have permissions to read secrets from workspace connections when creating an endpoint and creating deployments under the endpoint. This restriction ensures that only a user identity with the permission to read secrets can grant the endpoint identity the permission to read secrets.
79+
An endpoint identity can be either a system-assigned identity (SAI) or a user-assigned identity (UAI). When the endpoint is created with a SAI and the flag to enforce access to the default secret stores is set, a user identity must have permissions to read secrets from workspace connections when creating an endpoint and deployments. This restriction ensures that only a user identity with the permission to read secrets can grant the endpoint identity the permission to read secrets.
7980

80-
If a user identity that doesn't have permission to read secrets from workspace connections tries to create an endpoint or a deployment with a SAI, and the endpoint's flag is set to enforce access to the default secret stores, the endpoint or deployment creation is rejected.
81+
If a user identity that doesn't have permission to read secrets from workspace connections tries to create an endpoint or a deployment with a SAI, and the endpoint's flag is set to enforce access to the default secret stores, the endpoint, or deployment creation is rejected.
8182

82-
If the endpoint is created with a UAI, or the endpoint uses a SAI but the the flag to enforce access to the default secret stores isn't set, the user identity doesn't need to be able to read secrets from workspace connections to create an endpoint or deployment. In this case, the endpoint identity isn't automatically granted the permission to read secrets, but can be manually granted this permission by assigning the proper role.
83+
If the endpoint is created with a UAI, or the endpoint uses a SAI but the flag to enforce access to the default secret stores isn't set, the user identity doesn't need to be able to read secrets from workspace connections to create an endpoint or deployment. In this case, the endpoint identity isn't automatically granted the permission to read secrets, but can be manually granted this permission by assigning the proper role.
8384

84-
Regardless of whether the role assignment is automatic or manual, the secret retrieval and injection is triggered if you mapped the environment variables with secret references in the endpoint or deployment definition. The secret injection feature uses the endpoint identity to do the secret retrieval and injection. For more information on secret injection, see [Secret injection in online endpoints](concept-secret-injection.md).
85+
Regardless of whether the role assignment is automatic or manual, the secret retrieval, and injection is triggered if you mapped the environment variables with secret references in the endpoint or deployment definition. The secret injection feature uses the endpoint identity to do the secret retrieval and injection. For more information on secret injection, see [Secret injection in online endpoints](concept-secret-injection.md).
8586

8687
### Data plane operations
8788

@@ -118,20 +119,19 @@ An online deployment runs your user container with the endpoint identity, that i
118119

119120
If the endpoint identity is a SAI, the following roles are assigned to the endpoint identity for convenience.
120121

121-
Role | Description | Condition for automatic role assignment
122-
-- | -- | --
123-
**AcrPull** | Allows the endpoint identity to pull images from the Azure container registry associated with the workspace | The endpoint identity is a SAI.
124-
**Storage Blob Data Reader** | Allows the endpoint identity to read blobs from the default datastore of the workspace | The endpoint identity is a SAI.
125-
**AzureML Metrics Writer (preview)** | Allows the endpoint identity to write metrics to the workspace | The endpoint identity is a SAI.
126-
**Azure Machine Learning Workspace Connection Secrets Reader** | Allows the endpoint identity to read secrets from workspace connections | The endpoint identity is a SAI and the endpoint creation has a flag to enforce access to the default secret stores. The user identity that creates the endpoint also has permission to read secrets from workspace connections.
122+
| Role | Description | Condition for automatic role assignment |
123+
| -- | -- | -- |
124+
| **AcrPull** | Allows the endpoint identity to pull images from the Azure container registry associated with the workspace | The endpoint identity is a SAI.
125+
| **Storage Blob Data Reader** | Allows the endpoint identity to read blobs from the default datastore of the workspace | The endpoint identity is a SAI.
126+
| **AzureML Metrics Writer (preview)** | Allows the endpoint identity to write metrics to the workspace | The endpoint identity is a SAI.
127+
| **Azure Machine Learning Workspace Connection Secrets Reader** | Allows the endpoint identity to read secrets from workspace connections | The endpoint identity is a SAI and the endpoint creation has a flag to enforce access to the default secret stores. The user identity that creates the endpoint also has permission to read secrets from workspace connections.
127128

128129
- If the endpoint identity is a SAI, and the enforce flag isn't set or the user identity doesn't have permission to read secrets, there's no automatic role assignment for the **Azure Machine Learning Workspace Connection Secrets Reader** role. For more information, see [How to deploy online endpoint with secret injection](how-to-deploy-online-endpoint-with-secret-injection.md#create-an-endpoint).
129130
- If the endpoint identity is a UAI, there's no automatic role assignment for the **Azure Machine Learning Workspace Connection Secrets Reader** role. In this case, you need to manually assign roles to the endpoint identity as needed.
130131

131132
For more information on the **Azure Machine Learning Workspace Connection Secrets Reader** role, see [Assign permissions to the identity]
132133
(how-to-authenticate-online-endpoint.md#assign-permissions-to-the-identity).
133134

134-
135135
## Related content
136136

137137
- [Set up authentication](how-to-setup-authentication.md)

0 commit comments

Comments
 (0)