Skip to content

Commit 2c55066

Browse files
committed
Update how to use managed identity info
1 parent 8607b3d commit 2c55066

File tree

4 files changed

+15
-14
lines changed

4 files changed

+15
-14
lines changed

articles/data-factory/connector-azure-blob-storage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: data-factory
99
ms.workload: data-services
1010
ms.topic: conceptual
1111
ms.custom: seo-lt-2019
12-
ms.date: 12/12/2019
12+
ms.date: 01/16/2020
1313
---
1414

1515
# Copy and transform data in Azure Blob storage by using Azure Data Factory
@@ -265,7 +265,7 @@ A data factory can be associated with a [managed identity for Azure resources](d
265265

266266
Refer to [Authenticate access to Azure Storage using Azure Active Directory](../storage/common/storage-auth-aad.md) for Azure Storage authentication in general. To use managed identities for Azure resources authentication, follow these steps:
267267

268-
1. [Retrieve data factory managed identity information](data-factory-service-identity.md#retrieve-managed-identity) by copying the value of "SERVICE IDENTITY APPLICATION ID" generated along with your factory.
268+
1. [Retrieve data factory managed identity information](data-factory-service-identity.md#retrieve-managed-identity) by copying the value of **managed identity object ID** generated along with your factory.
269269

270270
2. Grant the managed identity proper permission in Azure Blob storage. Refer to [Manage access rights to Azure Storage data with RBAC](../storage/common/storage-auth-aad-rbac.md) with more details on the roles.
271271

articles/data-factory/connector-azure-data-lake-storage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: data-factory
1010
ms.workload: data-services
1111
ms.topic: conceptual
1212
ms.custom: seo-lt-2019
13-
ms.date: 01/08/2020
13+
ms.date: 01/16/2020
1414
---
1515

1616
# Copy and transform data in Azure Data Lake Storage Gen2 using Azure Data Factory
@@ -157,7 +157,7 @@ A data factory can be associated with a [managed identity for Azure resources](d
157157

158158
To use managed identities for Azure resource authentication, follow these steps.
159159

160-
1. [Retrieve the Data Factory managed identity information](data-factory-service-identity.md#retrieve-managed-identity) by copying the value of the **service identity application ID** generated along with your factory.
160+
1. [Retrieve the Data Factory managed identity information](data-factory-service-identity.md#retrieve-managed-identity) by copying the value of the **managed identity object ID** generated along with your factory.
161161

162162
2. Grant the managed identity proper permission. See examples on how permission works in Data Lake Storage Gen2 from [Access control lists on files and directories](../storage/blobs/data-lake-storage-access-control.md#access-control-lists-on-files-and-directories).
163163

articles/data-factory/data-factory-service-identity.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,8 @@ editor: ''
99
ms.service: data-factory
1010
ms.workload: data-services
1111

12-
1312
ms.topic: conceptual
14-
ms.date: 04/08/2019
13+
ms.date: 01/16/2020
1514
ms.author: jingwang
1615
---
1716

@@ -153,17 +152,19 @@ You can retrieve the managed identity from Azure portal or programmatically. The
153152
154153
### Retrieve managed identity using Azure portal
155154

156-
You can find the managed identity information from Azure portal -> your data factory -> Properties:
155+
You can find the managed identity information from Azure portal -> your data factory -> Properties.
157156

158157
- Managed Identity Object ID
159158
- Managed Identity Tenant
160-
- **Managed Identity Application ID** > copy this value
159+
- Managed Identity Application ID
160+
161+
The managed identity information will also show up when you create linked service which supports managed identity authentication, like Azure Blob, Azure Data Lake Storage, Azure Key Vault, etc.
161162

162-
![Retrieve managed identity](media/data-factory-service-identity/retrieve-service-identity-portal.png)
163+
When granting permission, use object ID or data factory name (as managed identity name) to find this identity.
163164

164165
### Retrieve managed identity using PowerShell
165166

166-
The managed identity principal ID and tenant ID will be returned when you get a specific data factory as follows:
167+
The managed identity principal ID and tenant ID will be returned when you get a specific data factory as follows. Use the **PrincipalId** to grant access:
167168

168169
```powershell
169170
PS C:\WINDOWS\system32> (Get-AzDataFactoryV2 -ResourceGroupName <resourceGroupName> -Name <dataFactoryName>).Identity
@@ -173,7 +174,7 @@ PrincipalId TenantId
173174
765ad4ab-XXXX-XXXX-XXXX-51ed985819dc 72f988bf-XXXX-XXXX-XXXX-2d7cd011db47
174175
```
175176

176-
Copy the principal ID, then run below Azure Active Directory command with principal ID as parameter to get the **ApplicationId**, which you use to grant access:
177+
You can get the application ID by copying above principal ID, then running below Azure Active Directory command with principal ID as parameter.
177178

178179
```powershell
179180
PS C:\WINDOWS\system32> Get-AzADServicePrincipal -ObjectId 765ad4ab-XXXX-XXXX-XXXX-51ed985819dc

articles/data-factory/store-credentials-in-key-vault.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: data-services
1111

1212

1313
ms.topic: conceptual
14-
ms.date: 03/13/2019
14+
ms.date: 01/16/2020
1515
ms.author: jingwang
1616
---
1717

@@ -29,8 +29,8 @@ This feature relies on the data factory managed identity. Learn how it works fro
2929

3030
To reference a credential stored in Azure Key Vault, you need to:
3131

32-
1. **Retrieve data factory managed identity** by copying the value of "Managed Identity Application ID" generated along with your factory. If you use ADF authoring UI, the managed identity application ID will be shown on the Azure Key Vault linked service creation window; you can also retrieve it from Azure portal, refer to [Retrieve data factory managed identity](data-factory-service-identity.md#retrieve-managed-identity).
33-
2. **Grant the managed identity access to your Azure Key Vault.** In your key vault -> Access policies -> Add new -> search this managed identity application ID to grant **Get** permission in Secret permissions dropdown. It allows this designated factory to access secret in key vault.
32+
1. **Retrieve data factory managed identity** by copying the value of "Managed Identity Object ID" generated along with your factory. If you use ADF authoring UI, the managed identity object ID will be shown on the Azure Key Vault linked service creation window; you can also retrieve it from Azure portal, refer to [Retrieve data factory managed identity](data-factory-service-identity.md#retrieve-managed-identity).
33+
2. **Grant the managed identity access to your Azure Key Vault.** In your key vault -> Access policies -> Add new -> search this managed identity to grant **Get** permission in Secret permissions dropdown. It allows this designated factory to access secret in key vault.
3434
3. **Create a linked service pointing to your Azure Key Vault.** Refer to [Azure Key Vault linked service](#azure-key-vault-linked-service).
3535
4. **Create data store linked service, inside which reference the corresponding secret stored in key vault.** Refer to [reference secret stored in key vault](#reference-secret-stored-in-key-vault).
3636

0 commit comments

Comments
 (0)