You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article helps you understand managed identity (formerly known as Managed Service Identity/MSI) and how it works in Azure Synapse.
17
17
@@ -21,10 +21,10 @@ This article helps you understand managed identity (formerly known as Managed Se
21
21
22
22
Managed identities eliminate the need to manage credentials. Managed identities provide an identity for the service instance when connecting to resources that support Microsoft Entra authentication. For example, the service can use a managed identity to access resources like [Azure Key Vault](/azure/key-vault/general/overview), where data admins can securely store credentials or access storage accounts. The service uses the managed identity to obtain Microsoft Entra tokens.
23
23
24
-
There are two types of supported managed identities:
24
+
There are two types of supported managed identities:
25
25
26
26
-**System-assigned:** You can enable a managed identity directly on a service instance. When you allow a system-assigned managed identity during the creation of the service, an identity is created in Microsoft Entra tied to that service instance's lifecycle. By design, only that Azure resource can use this identity to request tokens from Microsoft Entra ID. So when the resource is deleted, Azure automatically deletes the identity for you. Azure Synapse Analytics requires that a system-assigned managed identity must be created along with the Synapse workspace.
27
-
-**User-assigned:** You may also create a managed identity as a standalone Azure resource. You can [create a user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-portal.md) and assign it to one or more instances of a Synapse workspace. In user-assigned managed identities, the identity is managed separately from the resources that use it.
27
+
-**User-assigned:** You can also create a managed identity as a standalone Azure resource. You can [create a user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-portal.md) and assign it to one or more instances of a Synapse workspace. In user-assigned managed identities, the identity is managed separately from the resources that use it.
28
28
29
29
Managed identity provides the below benefits:
30
30
@@ -35,7 +35,127 @@ Managed identity provides the below benefits:
35
35
## System-assigned managed identity
36
36
37
37
>[!NOTE]
38
-
> System-assigned managed identity is also referred to as 'Managed identity' elsewhere in the documentation and in the Synapse Studio UI for backward compatibility purpose. We will explicitly mention 'User-assigned managed identity' when referring to it.
38
+
> System-assigned managed identity is also referred to as 'Managed identity' elsewhere in the documentation and in the Synapse Studio UI for backward compatibility purpose. We will explicitly mention 'User-assigned managed identity' when referring to it.
39
+
40
+
### Retrieve system-assigned managed identity using Azure portal
41
+
42
+
You can find the managed identity information from Azure portal -> your Synapse workspace -> Properties.
43
+
44
+
:::image type="content" source="../data-factory/media/data-factory-service-identity/system-managed-identity-in-portal-synapse.png" alt-text="Shows the Azure portal with the system-managed identity object ID for a Synapse workspace." lightbox="../data-factory/media/data-factory-service-identity/system-managed-identity-in-portal-synapse.png":::
45
+
46
+
- Managed Identity Object ID
47
+
48
+
The managed identity information will also show up when you create linked service, which supports managed identity authentication, like Azure Blob, Azure Data Lake Storage, Azure Key Vault, etc.
49
+
50
+
To grant permissions, follow these steps. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.yml).
51
+
52
+
1. Select **Access control (IAM)**.
53
+
54
+
1. Select **Add** > **Add role assignment**.
55
+
56
+
:::image type="content" source="~/reusable-content/ce-skilling/azure/media/role-based-access-control/add-role-assignment-menu-generic.png" alt-text="Screenshot that shows Access control (IAM) page with Add role assignment menu open.":::
57
+
58
+
1. On the **Members** tab, select **Managed identity**, and then select **Select members**.
59
+
60
+
1. Select your Azure subscription.
61
+
62
+
1. Under **System-assigned managed identity**, select **Synapse workspace**, and then select a workspace. You can also use the object ID or workspace name (as the managed-identity name) to find this identity. To get the managed identity's application ID, use PowerShell.
63
+
64
+
1. On the **Review + assign** tab, select **Review + assign** to assign the role.
65
+
66
+
### Retrieve system-assigned managed identity using PowerShell
67
+
68
+
The managed identity principal ID and tenant ID will be returned when you get a specific service instance as follows. Use the **PrincipalId** to grant access:
The managed identity principal ID and tenant ID will be returned when you get a specific service instance as follows.
93
+
94
+
Call below API in the request:
95
+
96
+
```
97
+
GET https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Synapse/workspaces/{workspaceName}?api-version=2018-06-01
98
+
```
99
+
100
+
**Response**: You'll get response like shown in below example. The "identity" section is populated accordingly.
@@ -182,127 +303,7 @@ You can retrieve the managed identity from Azure portal or programmatically. The
182
303
>[!TIP]
183
304
> If you don't see the managed identity, [generate managed identity](#generate-managed-identity) by updating your service instance.
184
305
185
-
#### Retrieve system-assigned managed identity using Azure portal
186
-
187
-
You can find the managed identity information from Azure portal -> your Synapse workspace -> Properties.
188
-
189
-
:::image type="content" source="../data-factory/media/data-factory-service-identity/system-managed-identity-in-portal-synapse.png" alt-text="Shows the Azure portal with the system-managed identity object ID for a Synapse workspace." lightbox="../data-factory/media/data-factory-service-identity/system-managed-identity-in-portal-synapse.png":::
190
-
191
-
- Managed Identity Object ID
192
-
193
-
The managed identity information will also show up when you create linked service, which supports managed identity authentication, like Azure Blob, Azure Data Lake Storage, Azure Key Vault, etc.
194
-
195
-
To grant permissions, follow these steps. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.yml).
196
-
197
-
1. Select **Access control (IAM)**.
198
-
199
-
1. Select **Add** > **Add role assignment**.
200
-
201
-
:::image type="content" source="~/reusable-content/ce-skilling/azure/media/role-based-access-control/add-role-assignment-menu-generic.png" alt-text="Screenshot that shows Access control (IAM) page with Add role assignment menu open.":::
202
-
203
-
1. On the **Members** tab, select **Managed identity**, and then select **Select members**.
204
-
205
-
1. Select your Azure subscription.
206
-
207
-
1. Under **System-assigned managed identity**, select **Synapse workspace**, and then select a workspace. You can also use the object ID or workspace name (as the managed-identity name) to find this identity. To get the managed identity's application ID, use PowerShell.
208
-
209
-
1. On the **Review + assign** tab, select **Review + assign** to assign the role.
210
-
211
-
#### Retrieve system-assigned managed identity using PowerShell
212
-
213
-
The managed identity principal ID and tenant ID will be returned when you get a specific service instance as follows. Use the **PrincipalId** to grant access:
The managed identity principal ID and tenant ID will be returned when you get a specific service instance as follows.
238
-
239
-
Call below API in the request:
240
-
241
-
```
242
-
GET https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Synapse/workspaces/{workspaceName}?api-version=2018-06-01
243
-
```
244
-
245
-
**Response**: You will get response like shown in below example. The "identity" section is populated accordingly.
### Execute Azure Synapse Spark Notebooks with system assigned managed identity
306
+
## Execute Azure Synapse Spark Notebooks with system assigned managed identity
306
307
307
308
You can easily execute Synapse Spark Notebooks with the system assigned managed identity (or workspace managed identity) by enabling *Run as managed identity* from the *Configure session* menu. To execute Spark Notebooks with workspace managed identity, users need to have following RBAC roles:
308
309
- Synapse Compute Operator on the workspace or selected Spark pool
@@ -319,7 +320,7 @@ You can easily execute Synapse Spark Notebooks with the system assigned managed
319
320
320
321
## User-assigned managed identity
321
322
322
-
You can create, delete, manage user-assigned managed identities in Microsoft Entra ID. For more details refer to[Create, list, delete, or assign a role to a user-assigned managed identity using the Azure portal](../active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-portal.md).
323
+
You can create, delete, manage user-assigned managed identities in Microsoft Entra ID. For more information, see[Create, list, delete, or assign a role to a user-assigned managed identity using the Azure portal](../active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-portal.md).
323
324
324
325
In order to use a user-assigned managed identity, you must first [create credentials](../data-factory/credentials.md) in your service instance for the UAMI.
325
326
@@ -329,7 +330,7 @@ In order to use a user-assigned managed identity, you must first [create credent
See the following topics that introduce when and how to use managed identity:
333
+
See the following articles that introduce when and how to use managed identity:
333
334
334
335
-[Store credential in Azure Key Vault](../data-factory/store-credentials-in-key-vault.md).
335
336
-[Copy data from/to Azure Data Lake Store using managed identities for Azure resources authentication](../data-factory/connector-azure-data-lake-store.md).
0 commit comments