Skip to content

Commit 0a27f25

Browse files
authored
Update how-to-administrate-data-authentication.md
1 parent fe1a205 commit 0a27f25

File tree

1 file changed

+17
-3
lines changed

1 file changed

+17
-3
lines changed

articles/machine-learning/how-to-administrate-data-authentication.md

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,13 +24,14 @@ Learn how to manage data access and how to authenticate in Azure Machine Learnin
2424
> This article is intended for Azure administrators who want to create the required infrastructure for an Azure Machine Learning solution.
2525
2626
## Credential-based data authentication
27-
In general, credential-based data authentication from studio involves these checks:
27+
In general, credential-based data authentication involves these checks:
2828
* Does the user who is accessing data from the credential-based datastore have been assigned a RBAC role containing `Microsoft.MachineLearningServices/workspaces/datastores/listsecrets/action`?
2929
- This permission is required to retrieve credentials from the datastore on behalf of the user.
3030
* Does the stored credential (service principal, account key, or sas token) have access to the data resource?
3131

32+
3233
## Identity-based data authentication
33-
In general, identity-based data authentication from studio involves these checks:
34+
In general, identity-based data authentication involves these checks:
3435

3536
* Which user wants to access the resources?
3637
- Depending on the conext the data is being accessed, different types of authentication are available, for example
@@ -49,7 +50,12 @@ In general, identity-based data authentication from studio involves these checks
4950
- The storage account [Reader](../role-based-access-control/built-in-roles.md#reader) reads the storage metadata.
5051
- The [Storage Blob Data Contributor](../role-based-access-control/built-in-roles.md#storage-blob-data-contributor) reads, writes, and deletes Azure Storage containers and blobs.
5152
- Please find more [Azure built-in roles for storage here](../role-based-access-control/built-in-roles/storage.md).
52-
53+
54+
55+
## VNET specific checks for authetication
56+
57+
58+
5359
## Other general checks for authetication
5460
* Where does the access come from?
5561
- User: Is the client IP address in the VNet/subnet range?
@@ -78,6 +84,14 @@ This table lists the identities to use for specific scenarios:
7884
| Access from Job | Yes/No | Compute MSI |
7985
| Access from Notebook | Yes/No | User's identity |
8086

87+
| Configuration | SDK Local | Job | Dataset Preview | Datastore browse | Notebook VM |
88+
| -- | -- | -- | -- | -- | -- |
89+
| Credential + Workspace MSI | Credential | Credential | Workspace MSI | Credential (Only Account key and SAS token) | Credential | Notebook VM |
90+
| No Credential + Workspace MSI | User Identity | Compute MSI/User identity | Workspace MSI | User identity | User identity |
91+
| Credential + No Workspace MSI | Credential | Credential | Credential | Credential (Only Account key and SAS token) | Credential |
92+
| No Credential + No Workspace MSI | User Identity | Compute MSI/User identity | User Identity | User Identity | User Identity |
93+
94+
8195
Data access is complex and it involves many pieces. For example, data access from Azure Machine Learning studio is different compared to use of the SDK for data access. When you use the SDK in your local development environment, you directly access data in the cloud. When you use studio, you don't always directly access the data store from your client. Studio relies on the workspace to access data on your behalf.
8296

8397
> [!TIP]

0 commit comments

Comments
 (0)