You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Follow these steps to configure Microsoft Entra ID for inference:
16
16
17
-
1. Go to the [Azure portal](https://portal.azure.com) and locate the Azure AI Services resource you're using. If you're using Azure AI Foundry with projects or hubs, you can navigate to it by:
17
+
1. Go to the [Azure portal](https://portal.azure.com) and locate the **Azure AI Services** resource you're using. If you're using Azure AI Foundry with projects or hubs, you can navigate to it by:
18
18
19
19
1. Go to [Azure AI Foundry portal](https://ai.azure.com).
20
20
21
21
2. On the landing page, select **Open management center**.
22
22
23
23
3. Go to the section **Connected resources** and select the connection to the Azure AI Services resource that you want to configure. If it isn't listed, select **View all** to see the full list.
24
24
25
+
:::image type="content" source="../../media/configure-entra-id/resource-behind-select.png" alt-text="Screenshot showing how to navigate to the details of the connection in Azure AI Foundry in the management center." lightbox="../../media/configure-entra-id/resource-behind-select.png":::
26
+
25
27
4. On the **Connection details** section, under **Resource**, select the name of the Azure resource. A new page opens.
26
28
27
29
5. You're now in [Azure portal](https://portal.azure.com) where you can manage all the aspects of the resource itself.
28
30
29
-
2. On the left navigation bar, select **Access control (IAM)**.
31
+
:::image type="content" source="../../media/configure-entra-id/locate-resource-ai-services.png" alt-text="Screenshot showing the resource to which we configure Microsoft Entra ID." lightbox="../../media/configure-entra-id/locate-resource-ai-services.png":::
32
+
33
+
2. On the left navigation bar, select **Access control (IAM)** and then select **Add** > **Add role assignment**.
34
+
35
+
:::image type="content" source="../../media/configure-entra-id/resource-aim.png" alt-text="Screenshot showing how to add a role assignment in the Access control section of the resource in the Azure portal." lightbox="../../media/configure-entra-id/resource-aim.png":::
30
36
31
37
> [!TIP]
32
38
> Use the **View my access** option to verify which roles are already assigned to you.
33
39
34
-
3.Select**Role assignments** and then select **Add** > **Add role assignment**.
40
+
3.On**Job function roles**, type **Cognitive Services User**. The list of roles is filtered out.
35
41
36
-
4. On **Job function roles**, type**Cognitive Services User**. The list of roles is filtered out.
42
+
:::image type="content" source="../../media/configure-entra-id/cognitive-services-user.png" alt-text="Screenshot showing how to select the Cognitive Services User role assignment." lightbox="../../media/configure-entra-id/cognitive-services-user.png":::
37
43
38
-
5. Select the role and select **Next**.
44
+
4. Select the role and select **Next**.
39
45
40
-
6. On **Members**, select the user or group you want to grant access to. We recommend using security groups whenever possible as they are easier to manage and maintain.
46
+
5. On **Members**, select the user or group you want to grant access to. We recommend using security groups whenever possible as they are easier to manage and maintain.
41
47
42
-
7. Select **Next** and finish the wizard.
48
+
:::image type="content" source="../../media/configure-entra-id/select-user.png" alt-text="Screenshot showing how to select the user to whom assign the role." lightbox="../../media/configure-entra-id/select-user.png":::
43
49
44
-
8. The selected user can now use Microsoft Entra ID for inference.
50
+
6. Select **Next** and finish the wizard.
51
+
52
+
7. The selected user can now use Microsoft Entra ID for inference.
45
53
46
54
> [!TIP]
47
55
> Keep in mind that Azure role assignments may take up to five minutes to propagate. When working with security groups, adding or removing users from the security group propagates immediately.
@@ -84,6 +92,4 @@ To change this behavior, you have to update the connections from your projects t
84
92
85
93
## Disable key-based authentication in the resource
86
94
87
-
Disabling key-based authentication is advisable when you implemented Microsoft Entra ID and fully addressed compatibility or fallback concerns in all the applications that consume the service.
88
-
89
-
95
+
Disabling key-based authentication is advisable when you implemented Microsoft Entra ID and fully addressed compatibility or fallback concerns in all the applications that consume the service. Disabling key-based authentication is only available when deploying using Bicep/ARM.
Copy file name to clipboardExpand all lines: articles/ai-foundry/model-inference/includes/configure-entra-id/troubleshooting.md
+15Lines changed: 15 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,21 @@ ms.date: 01/23/2025
7
7
ms.topic: include
8
8
---
9
9
10
+
Before troubleshooting, verify that you have the right permissions assigned:
11
+
12
+
1. Go to the [Azure portal](https://portal.azure.com) and locate the **Azure AI Services** resource you're using.
13
+
14
+
2. On the left navigation bar, select **Access control (IAM)** and then select **Check access**.
15
+
16
+
3. Type the name of the user or identity you are using to connect to the service.
17
+
18
+
4. Verify that the role **Cognitive Services User** is listed (or a role that contains the required permissions as explained in [Prerequisites](#prerequisites)).
19
+
20
+
> [!IMPORTANT]
21
+
> Roles like **Owner** or **Contributor** don't provide access via Microsoft Entra ID.
22
+
23
+
5. If not listed, follow the steps in this guide before continuing.
24
+
10
25
The following table contains multiple scenarios that can help troubleshooting Microsoft Entra ID:
0 commit comments