You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/digital-twins/concepts-security.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,7 +85,7 @@ The following list describes the levels at which you can scope access to Azure D
85
85
86
86
If a user attempts to perform an action not allowed by their role, they may receive an error from the service request reading `403 (Forbidden)`. For more information and troubleshooting steps, see [Troubleshooting: Azure Digital Twins request failed with Status: 403 (Forbidden)](troubleshoot-error-403.md).
87
87
88
-
## Managed identity for accessing other resources (preview)
88
+
## Managed identity for accessing other resources
89
89
90
90
Setting up an [Azure Active Directory (Azure AD)](../active-directory/fundamentals/active-directory-whatis.md)**managed identity** for an Azure Digital Twins instance can allow the instance to easily access other Azure AD-protected resources, such as [Azure Key Vault](../key-vault/general/overview.md). The identity is managed by the Azure platform, and does not require you to provision or rotate any secrets. For more about managed identities in Azure AD, see [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md).
Copy file name to clipboardExpand all lines: articles/digital-twins/how-to-manage-routes.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ To create a new endpoint, go to your instance's page in the [Azure portal](https
78
78
1. Enter a **Name** for your endpoint and choose the **Endpoint type**.
79
79
80
80
1. Complete the other details that are required for your endpoint type, including your subscription and the endpoint resources described [above](#prerequisite-create-endpoint-resources).
81
-
1. For Event Hub and Service Bus endpoints only, you must select an **Authentication type**. You can use key-based authentication with a pre-created authorization rule, or identity-based authentication if you'll be using the endpoint with a [managed identity](concepts-security.md#managed-identity-for-accessing-other-resources-preview) for your Azure Digital Twins instance.
81
+
1. For Event Hub and Service Bus endpoints only, you must select an **Authentication type**. You can use key-based authentication with a pre-created authorization rule, or identity-based authentication if you'll be using the endpoint with a [managed identity](concepts-security.md#managed-identity-for-accessing-other-resources) for your Azure Digital Twins instance.
82
82
83
83
:::row:::
84
84
:::column:::
@@ -133,7 +133,7 @@ After successfully running these commands, the event grid, event hub, or Service
133
133
134
134
#### Create an endpoint with identity-based authentication
135
135
136
-
You can also create an endpoint that has identity-based authentication, to use the endpoint with a [managed identity](concepts-security.md#managed-identity-for-accessing-other-resources-preview). This option is only available for Event Hub and Service Bus-type endpoints (it's not supported for Event Grid).
136
+
You can also create an endpoint that has identity-based authentication, to use the endpoint with a [managed identity](concepts-security.md#managed-identity-for-accessing-other-resources). This option is only available for Event Hub and Service Bus-type endpoints (it's not supported for Event Grid).
137
137
138
138
The CLI command to create this type of endpoint is below. You'll need the following values to plug into the placeholders in the command:
139
139
* the Azure resource ID of your Azure Digital Twins instance
@@ -236,7 +236,7 @@ Alternatively, you can create dead letter endpoints using the [Azure Digital Twi
236
236
237
237
#### Create a dead-letter endpoint with identity-based authentication
238
238
239
-
You can also create a dead-lettering endpoint that has identity-based authentication, to use the endpoint with a [managed identity](concepts-security.md#managed-identity-for-accessing-other-resources-preview). This option is only available for Event Hub and Service Bus-type endpoints (it's not supported for Event Grid).
239
+
You can also create a dead-lettering endpoint that has identity-based authentication, to use the endpoint with a [managed identity](concepts-security.md#managed-identity-for-accessing-other-resources). This option is only available for Event Hub and Service Bus-type endpoints (it's not supported for Event Grid).
240
240
241
241
To create this type of endpoint, use the same CLI command from earlier to [create an endpoint with identity-based authentication](#create-an-endpoint-with-identity-based-authentication), with an extra field in the JSON payload for a `deadLetterUri`.
# Enable a managed identity for routing Azure Digital Twins events (preview)
19
+
# Enable a managed identity for routing Azure Digital Twins events
20
20
21
-
This article describes how to enable a [system-assigned identity for an Azure Digital Twins instance](concepts-security.md#managed-identity-for-accessing-other-resources-preview) (currently in preview), and use the identity when forwarding events to supported routing destinations. Setting up a managed identity isn't required for routing, but it can help the instance to easily access other Azure AD-protected resources, such as [Event Hub](../event-hubs/event-hubs-about.md), [Service Bus](../service-bus-messaging/service-bus-messaging-overview.md) destinations, and [Azure Storage Container](../storage/blobs/storage-blobs-introduction.md).
21
+
This article describes how to enable a [system-assigned identity for an Azure Digital Twins instance](concepts-security.md#managed-identity-for-accessing-other-resources), and use the identity when forwarding events to supported routing destinations. Setting up a managed identity isn't required for routing, but it can help the instance to easily access other Azure AD-protected resources, such as [Event Hub](../event-hubs/event-hubs-about.md), [Service Bus](../service-bus-messaging/service-bus-messaging-overview.md) destinations, and [Azure Storage Container](../storage/blobs/storage-blobs-introduction.md).
22
22
23
23
Here are the steps that are covered in this article:
24
24
@@ -46,7 +46,7 @@ The system-managed identity option is located in the **Advanced** tab of instanc
46
46
47
47
In this tab, select the **On** option for **System managed identity** to turn on this feature.
48
48
49
-
:::image type="content" source="media/how-to-enable-managed-identities/create-instance-advanced.png" alt-text="Screenshot of the Azure portal showing the Advanced tab of the Create Resource dialog for Azure Digital Twins. System managed identity is turned on.":::
49
+
:::image type="content" source="media/how-to-route-with-managed-identity/create-instance-advanced.png" alt-text="Screenshot of the Azure portal showing the Advanced tab of the Create Resource dialog for Azure Digital Twins. System managed identity is turned on.":::
50
50
51
51
You can then use the bottom navigation buttons to continue with the rest of instance setup.
52
52
@@ -72,13 +72,13 @@ Start by opening the [Azure portal](https://portal.azure.com) in a browser.
72
72
73
73
1. Search for the name of your instance in the portal search bar, and select it to view its details.
74
74
75
-
1. Select **Identity (preview)** in the left-hand menu.
75
+
1. Select **Identity** in the left-hand menu.
76
76
77
77
1. On this page, select the **On** option to turn on this feature.
78
78
79
79
1. Select the **Save** button, and **Yes** to confirm.
80
80
81
-
:::image type="content" source="media/how-to-enable-managed-identities/identity-digital-twins.png" alt-text="Screenshot of the Azure portal showing the Identity (preview) page for an Azure Digital Twins instance.":::
81
+
:::image type="content" source="media/how-to-route-with-managed-identity/identity-digital-twins.png" alt-text="Screenshot of the Azure portal showing the Identity page for an Azure Digital Twins instance.":::
82
82
83
83
After the change is saved, more fields will appear on this page for the new identity's **Object ID** and **Permissions**.
Copy file name to clipboardExpand all lines: articles/digital-twins/how-to-set-up-instance-portal.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ This version of this article goes through these steps manually, one by one, usin
51
51
Here are the additional options you can configure during setup, using the other tabs in the **Create Resource** process.
52
52
53
53
***Networking**: In this tab, you can enable private endpoints with [Azure Private Link](../private-link/private-link-overview.md) to eliminate public network exposure to your instance. For instructions, see [Enable private access with Private Link (preview)](./how-to-enable-private-link.md?tabs=portal#add-a-private-endpoint-during-instance-creation).
54
-
***Advanced**: In this tab, you can enable a system-managed identity for your instance that can be used when forwarding events to [endpoints](concepts-route-events.md). For more information about using system-managed identities with Azure Digital Twins, see [Security for Azure Digital Twins solutions](concepts-security.md#managed-identity-for-accessing-other-resources-preview).
54
+
***Advanced**: In this tab, you can enable a system-managed identity for your instance that can be used when forwarding events to [endpoints](concepts-route-events.md). For more information about using system-managed identities with Azure Digital Twins, see [Security for Azure Digital Twins solutions](concepts-security.md#managed-identity-for-accessing-other-resources).
55
55
***Tags**: In this tab, you can add tags to your instance to help you organize it among your Azure resources. For more about Azure resource tags, see [Tag resources, resource groups, and subscriptions for logical organization](../azure-resource-manager/management/tag-resources.md).
0 commit comments