Skip to content

Commit 2aecfe9

Browse files
author
Larry Franks
committed
removing & redirecting file
1 parent d262c78 commit 2aecfe9

7 files changed

+10
-245
lines changed

articles/machine-learning/.openpublishing.redirection.machine-learning.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,10 @@
2020
"redirect_url": "/azure/machine-learning/how-to-identity-based-service-authentication",
2121
"redirect_document_id": true
2222
},
23+
{
24+
"source_path_from_root": "/articles/machine-learning/how-to-identity-based-data-access.md",
25+
"redirect_url": "/azure/machine-learning/how-to-datastore"
26+
},
2327
{
2428
"source_path_from_root": "/articles/machine-learning/tutorial-convert-ml-experiment-to-production.md",
2529
"redirect_url": "/azure/machine-learning/v1/how-to-convert-ml-experiment-to-production",

articles/machine-learning/concept-enterprise-security.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -58,9 +58,7 @@ We don't recommend that admins revoke the access of the managed identity to the
5858
>
5959
> If your workspace has attached AKS clusters, _and they were created before May 14th, 2021_, __do not delete this Azure AD account__. In this scenario, you must first delete and recreate the AKS cluster before you can delete the Azure AD account.
6060
61-
You can provision the workspace to use user-assigned managed identity, and grant the managed identity additional roles, for example to access your own Azure Container Registry for base Docker images. For more information, see [Use managed identities for access control](how-to-identity-based-service-authentication.md).
62-
63-
You can also configure managed identities for use with Azure Machine Learning compute cluster. This managed identity is independent of workspace managed identity. With a compute cluster, the managed identity is used to access resources such as secured datastores that the user running the training job may not have access to. For more information, see [Identity-based data access to storage services on Azure](how-to-identity-based-data-access.md).
61+
You can provision the workspace to use user-assigned managed identity, and grant the managed identity additional roles, for example to access your own Azure Container Registry for base Docker images. You can also configure managed identities for use with Azure Machine Learning compute cluster. This managed identity is independent of workspace managed identity. With a compute cluster, the managed identity is used to access resources such as secured datastores that the user running the training job may not have access to. For more information, see [Use managed identities for access control](how-to-identity-based-service-authentication.md).
6462

6563
> [!TIP]
6664
> There are some exceptions to the use of Azure AD and Azure RBAC within Azure Machine Learning:

articles/machine-learning/how-to-administrate-data-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ The following table lists what identities should be used for specific scenarios:
6868
Data access is complex and it's important to recognize that there are many pieces to it. For example, accessing data from Azure Machine Learning studio is different than using the SDK. When using the SDK on your local development environment, you're directly accessing data in the cloud. When using studio, you aren't always directly accessing the data store from your client. Studio relies on the workspace to access data on your behalf.
6969

7070
> [!TIP]
71-
> If you need to access data from outside Azure Machine Learning, such as using Azure Storage Explorer, *user* identity is probably what is used. Consult the documentation for the tool or service you are using for specific information. For more information on how Azure Machine Learning works with data, see [Identity-based data access to storage services on Azure](how-to-identity-based-data-access.md).
71+
> If you need to access data from outside Azure Machine Learning, such as using Azure Storage Explorer, *user* identity is probably what is used. Consult the documentation for the tool or service you are using for specific information. For more information on how Azure Machine Learning works with data, see [Setup authentication between AzureML and other services](how-to-identity-based-service-authentication.md).
7272
7373
## Azure Storage Account
7474

articles/machine-learning/how-to-create-manage-compute-instance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -464,7 +464,7 @@ identity:
464464
- resource_id: identity_resource_id
465465
```
466466
467-
Once the managed identity is created, enable [identity-based data access enabled](how-to-identity-based-data-access.md) to your storage accounts for that identity. Then, when you worki on the compute instance, the managed identity is used automatically to authenticate against data stores.
467+
Once the managed identity is created, enable [identity-based data access enabled](how-to-datastore.md) to your storage accounts for that identity. Then, when you work on the compute instance, the managed identity is used automatically to authenticate against data stores.
468468
469469
You can also use the managed identity manually to authenticate against other Azure resources. For example, to use it to get ARM access token, use following.
470470

0 commit comments

Comments
 (0)