You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/service-fabric/concepts-managed-identity.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,9 @@ ms.author: atsenthi
12
12
13
13
# Managed Identity for Service Fabric Application (Preview)
14
14
15
-
A common challenge when building cloud applications is how to manage the credentials in your code for authenticating to cloud services. Keeping the credentials secure is an important task, since they never appear on developer workstations and aren't checked into source control. The Managed Identity for Azure resources feature in Azure Active Directory (Azure AD) solves this problem. The feature provides Azure services with an automatically-managed identity in Azure AD. You can use the identity to authenticate to any service that supports Azure AD authentication, including Key Vault, without any credentials in your code.
15
+
A common challenge when building cloud applications is how to manage the credentials in your code for authenticating to cloud services. Keeping credentials secure is an important task, since they never appear on developer workstations and are not checked into source control. The Managed Identity feature for Azure resources in Azure Active Directory (Azure AD) solves this problem. The feature provides Azure services with an automatically-managed identity in Azure AD. You can use the identity to authenticate to any service that supports Azure AD authentication, including Key Vault, without any credentials in your code.
16
16
17
-
Managed Identity for Azure resources feature is free with Azure AD for Azure subscriptions. There's no additional cost.
17
+
The Managed Identity feature for Azure resources is free with Azure AD for Azure subscriptions. There is no additional cost.
18
18
19
19
> [!NOTE]
20
20
> Managed Identity for Azure resources is the new name for the service formerly known as Managed Service Identity (MSI).
@@ -41,13 +41,13 @@ The following terms are used throughout the Managed Identity for Azure resources
41
41
42
42
## Supported scenarios for Service Fabric applications
43
43
44
-
It is important to clarify that managed identities for Service Fabric applications are only supported in Azure Service Fabric clusters, and only for applications deployed as Azure resources; applications deployed directly to a cluster may not and cannot be assigned an identity. Conceptually speaking, support for managed identities in Azure Service Fabric cluster consists of two phases:
44
+
Managed identities for Service Fabric is only supported in Azure deployed Service Fabric clusters, and only for applications deployed as Azure resources; applications which are not deployed as an Azure resource cannot be assigned an identity. Conceptually speaking, support for managed identities in Azure Service Fabric cluster consists of two phases:
45
45
46
46
1. Assign one or more managed identities to the application resource; an application may be assigned a single system-assigned identity, and/or up to 32 user-assigned identities, respectively.
47
47
48
48
2. Within the application's definition, map one of the identities assigned to the application to any individual service comprising the application.
49
49
50
-
The system-assigned identity of an application is unique to that application; a user-assigned identity is a standalone resource, which may be assigned to multiple applications. Within an application, a single identity (whether system-assigned or user-assigned) can be assigned to multiple services of the application, but at most one identity can be assigned to an individual service. Lastly, a service must be assigned an identity explicitly in order to have access to this feature. In effect, the mapping of an application's identities to its constituent services allows for an in-application isolation - a service may only use the identity mapped to it (and none at all if it was not explicitly assigned one.)
50
+
The system-assigned identity of an application is unique to that application; a user-assigned identity is a standalone resource, which may be assigned to multiple applications. Within an application, a single identity (whether system-assigned or user-assigned) can be assigned to multiple services of the application, but each individual service can only be assigned one identity. Lastly, a service must be assigned an identity explicitly to have access to this feature. In effect, the mapping of an application's identities to its constituent services allows for an in-application isolation - a service may only use the identity mapped to it (and none at all if it was not explicitly assigned one.)
51
51
52
52
The list of supported scenarios for the preview release is as follows:
53
53
@@ -58,7 +58,7 @@ The list of supported scenarios for the preview release is as follows:
58
58
59
59
The following scenarios are not supported or not recommended; note these actions may not be blocked, but can lead to outages in your applications:
60
60
61
-
- Remove or change the identities assigned to an application;if you must make changes, submit separate deployments to first add a new identity assignment, and then to remove a previously assigned one. Removal of an identity from an existing application can have undesirable effects, including leaving your application in an unupgradeable state. It is safe to delete the application altogether if the removal of an identity is necessary; note this will delete the system-assigned identity (if so defined) associated with the application, and will remove any associations with the user-assigned identities assigned to the application.
61
+
- Remove or change the identities assigned to an application;if you must make changes, submit separate deployments to first add a new identity assignment, and then to remove a previously assigned one. Removal of an identity from an existing application can have undesirable effects, including leaving your application in a state which is not upgradeable. It is safe to delete the application altogether if the removal of an identity is necessary; note this will delete the system-assigned identity (if so defined) associated with the application, and will remove any associations with the user-assigned identities assigned to the application.
62
62
63
63
- It is not recommended to mix system-assigned and user-assigned identities in the same application.
Copy file name to clipboardExpand all lines: articles/service-fabric/configure-existing-cluster-enable-managed-identity-token-service.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.author: atsenthi
11
11
---
12
12
13
13
# Configure an existing Azure Service Fabric cluster to enable Managed Identity support
14
-
In order to access the managed identity feature for Azure Service Fabric applications, you must first configure the cluster enable the **Managed Identity Token Service**system service. This service is responsible for the authentication of Service Fabric applications using their managed identities, and also for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService** next to other system services.
14
+
In order to access the managed identity feature for Azure Service Fabric applications, you must first enable the **Managed Identity Token Service**on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService**.
15
15
16
16
> [!NOTE]
17
17
> Service Fabric runtime version 6.5.658.9590 or higher is required to enable the **Managed Identity Token Service**.
@@ -57,7 +57,7 @@ In order for the changes to take effect, you will also need to change the upgrad
57
57
58
58
## Errors and troubleshooting
59
59
60
-
If the deployment fails with the following message, it means the cluster is not on the required Service Fabric version:
60
+
If the deployment fails with the following message, it means the cluster is not running on a high enough Service Fabric version:
Copy file name to clipboardExpand all lines: articles/service-fabric/configure-new-azure-service-fabric-enable-managed-identity.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.author: atsenthi
12
12
13
13
# Create a new Azure Service Fabric cluster with Managed Identity support
14
14
15
-
In order to access the managed identity feature for Azure Service Fabric applications, you must first enable the Managed Identity Token Service system service on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and also for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService** next to other system services.
15
+
In order to access the managed identity feature for Azure Service Fabric applications, you must first enable the Managed Identity Token Service on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService** next to other system services.
16
16
17
17
> [!NOTE]
18
18
> Service Fabric runtime version 6.5.658.9590 or higher is required to enable the **Managed Identity Token Service**.
Copy file name to clipboardExpand all lines: articles/service-fabric/how-to-deploy-service-fabric-application-system-assigned-managed-identity.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.author: atsenthi
12
12
13
13
# Deploy Service Fabric application with system-assigned managed identity
14
14
15
-
Managed identities in Service Fabric are only supported for applications deployed as Azure resources, via Azure Resource Manager. This is typically done using an Azure Resource Manager template. Applications created or deployed directly to a Service Fabric cluster (for instance, by using the native Service Fabric API) cannot be assigned or use managed identities. For more information on how to deploy Service Fabric applications through Azure Resource Manager, see [Manage applications and services as Azure Resource Manager resources](service-fabric-application-arm-resource.md).
15
+
In order to access the managed identity feature for Azure Service Fabric applications, you must first enable the Managed Identity Token Service on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService** next to other system services.
16
16
17
17
> [!NOTE]
18
18
> Deployment of Service Fabric applications with managed identities are supported starting with API version `"2019-06-01-preview"`. You can also use the same API version for application type, application type version and service resources. The minimum supported Service Fabric runtime is 6.5 CU2.
Copy file name to clipboardExpand all lines: articles/service-fabric/how-to-deploy-service-fabric-application-user-assigned-managed-identity.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,14 +15,14 @@ To deploy a Service Fabric application with managed identity, the application ne
15
15
16
16
> [!NOTE]
17
17
>
18
-
> Applications created and deployed with native Service Fabric API**cannot** have Managed Identities.
18
+
> Applications which are not deployed as an Azure resource**cannot** have Managed Identities.
19
19
>
20
20
> Service Fabric application deployment with Managed Identity is supported with API version `"2019-06-01-preview"`. You can also use the same API version for application type, application type version and service resources.
21
21
>
22
22
23
23
## User-Assigned Identity
24
24
25
-
To enable application with User-Assigned identity, first add **identity** property to the application resource with type **userAssigned** and the referenced user-assigned identities, then add a **managedIdentities** section inside the **properties** section for the **application** resource which contains a list of friendly name to principalId mapping for each of the user-assigned identities.
25
+
To enable application with User-Assigned identity, first add the **identity** property to the application resource with type **userAssigned** and the referenced user-assigned identities. Then add a **managedIdentities** section inside the **properties** section for the **application** resource which contains a list of friendly name to principalId mapping for each of the user-assigned identities.
26
26
27
27
### Application template
28
28
@@ -61,7 +61,7 @@ In the example above the resource name of the user assigned identity is being us
61
61
62
62
### Application package
63
63
64
-
1. For each identity defined in the `managedIdentities` section in the Azure Resource Manager template, add a `<ManagedIdentity>` in the application manifest under **Principals** section. The `Name` attribute needs to match the `name` property defined in the `managedIdentities` section.
64
+
1. For each identity defined in the `managedIdentities` section in the Azure Resource Manager template, add a `<ManagedIdentity>`tag in the application manifest under **Principals** section. The `Name` attribute needs to match the `name` property defined in the `managedIdentities` section.
65
65
66
66
**ApplicationManifest.xml**
67
67
@@ -73,7 +73,7 @@ In the example above the resource name of the user assigned identity is being us
73
73
</Principals>
74
74
```
75
75
76
-
2. In the **ServiceManifestImport** section, for the service that uses the Managed Identity add a **IdentityBindingPolicy**, which maps the `AdminUser` identity to a service-specific identity name that needs to be added into the service manifest later on.
76
+
2. In the **ServiceManifestImport** section, add a **IdentityBindingPolicy** for the service that uses the Managed Identity. This policy maps the `AdminUser` identity to a service-specific identity name that needs to be added into the service manifest later on.
0 commit comments