You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/connect-to-cloud/howto-configure-fabric-endpoint.md
+34-22Lines changed: 34 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,14 +28,20 @@ To send data to Microsoft Fabric OneLake in Azure IoT Operations, you can config
28
28
- If shown, ensure *Lakehouse schemas (Public Preview)* is **unchecked**.
29
29
- Make note of the workspace and lakehouse names.
30
30
31
-
## Create a Microsoft Fabric OneLake dataflow endpoint
31
+
## Assign permission to managed identity
32
32
33
-
To configure a dataflow endpoint for Microsoft Fabric OneLake, we suggest using the managed identity of the Azure Arc-enabled Kubernetes cluster. This approach is secure and eliminates the need for secret management.
33
+
To configure a dataflow endpoint for Azure Data Lake Storage Gen2, we recommend using either a user-assigned or system-assigned managed identity. This approach is secure and eliminates the need for managing credentials manually.
34
34
35
-
1. In Azure portal, go to your Azure IoT Operations instance and select **Overview**.
36
-
1. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*.
37
-
1. In the Microsoft Fabric workspace you created, select **Manage access** > **+ Add people or groups**. Search for the Azure IoT Operations Arc extension by its name and select it. Select **Contributor** as the role, then select **Add**.
38
-
1. Create the *DataflowEndpoint* resource and specify the managed identity authentication method.
35
+
After the Microsoft Fabric OneLake is created, you need to assign a role to the Azure IoT Operations managed identity that grants permission to write to the Fabric lakehouse.
36
+
37
+
If using system-assigned managed identity, in Azure portal, go to your Azure IoT Operations instance and select **Overview**. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*. Your system-assigned managed identity can be found using the same name of the Azure IoT Operations Arc extension.
38
+
39
+
Go to Microsoft Fabric workspace you created, select **Manage access** > **+ Add people or groups**.
40
+
41
+
1. Search for the name of your [user-assigned managed identity set up for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections) or the system-assigned managed identity. For example, *azure-iot-operations-xxxx7* .
42
+
1. Select **Contributor** as the role, then select **Add**. This gives the managed identity the necessary permissions to write to the Fabric lakehouse. To learn more, see [Roles in workspaces in Microsoft Fabric](/fabric/get-started/roles-workspaces).
43
+
44
+
## Create dataflow endpoint for Microsoft Fabric OneLake
39
45
40
46
# [Portal](#tab/portal)
41
47
@@ -52,7 +58,7 @@ To configure a dataflow endpoint for Microsoft Fabric OneLake, we suggest using
52
58
| Lakehouse name | The name of the lakehouse where the data should be stored. |
53
59
| Workspace name | The name of the workspace associated with the lakehouse. |
54
60
| OneLake path type | The type of path used in OneLake. Select *Files* or *Tables*. |
55
-
| Authentication method | The method used for authentication. Choose *System assigned managed identity* or *User assigned managed identity*|
61
+
| Authentication method | The method used for authentication. Choose [*System assigned managed identity*](#system-assigned-managed-identity) or [*User assigned managed identity*](#user-assigned-managed-identity).|
56
62
| Client ID | The client ID of the user-assigned managed identity. Required if using *User assigned managed identity*. |
57
63
| Tenant ID | The tenant ID of the user-assigned managed identity. Required if using *User assigned managed identity*. |
// The default Fabric OneLake host URL in most cases
89
95
host: 'https://onelake.dfs.fabric.microsoft.com'
90
96
authentication: {
91
-
method: 'SystemAssignedManagedIdentity'
92
-
systemAssignedManagedIdentitySettings: {}
97
+
// See available authentication methods section for method types
98
+
// method: <METHOD_TYPE>
93
99
}
94
100
oneLakePathType: 'Tables'
95
101
names: {
@@ -123,8 +129,8 @@ spec:
123
129
# The default Fabric OneLake host URL in most cases
124
130
host: https://onelake.dfs.fabric.microsoft.com
125
131
authentication:
126
-
method: SystemAssignedManagedIdentity
127
-
systemAssignedManagedIdentitySettings: {}
132
+
# See available authentication methods section for method types
133
+
# method: <METHOD_TYPE>
128
134
oneLakePathType: Tables
129
135
names:
130
136
workspaceName: <WORKSPACE_NAME>
@@ -166,19 +172,19 @@ fabricOneLakeSettings:
166
172
167
173
## Available authentication methods
168
174
169
-
The following authentication methods are available for Microsoft Fabric OneLake dataflow endpoints. For more information about enabling secure settings by configuring an Azure Key Vault and enabling workload identities, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
170
-
171
-
Before you create the dataflow endpoint, assign workspace *Contributor* role to the IoT Operations extension that grants permission to write to the Fabric lakehouse.
172
-
173
-

174
-
175
-
To learn more, see [Give access to a workspace](/fabric/get-started/give-access-workspaces).
175
+
The following authentication methods are available for Microsoft Fabric OneLake dataflow endpoints.
176
176
177
177
### System-assigned managed identity
178
178
179
-
Using the system-assigned managed identity is the recommended authentication method for Azure IoT Operations. Azure IoT Operations creates the managed identity automatically and assigns it to the Azure Arc-enabled Kubernetes cluster. It eliminates the need for secret management and allows for seamless authentication.
179
+
Before you configure the dataflow endpoint, assign a role to the Azure IoT Operations managed identity that grants permission to write to the Fabric lakehouse.:
180
180
181
-
In the *DataflowEndpoint* resource, specify the managed identity authentication method. In most cases, you don't need to specify other settings. This configuration creates a managed identity with the default audience.
181
+
1. In Azure portal, go to your Azure IoT Operations instance and select **Overview**.
182
+
1. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*.
183
+
1. Go to Microsoft Fabric workspace, select **Manage access** > **+ Add people or groups**.
184
+
1. Search for the name of your system-assigned managed identity. For example, *azure-iot-operations-xxxx7* .
185
+
1. Select an appropriate role, then select **Add**.
186
+
187
+
Then, configure the dataflow endpoint with system-assigned managed identity settings.
182
188
183
189
# [Portal](#tab/portal)
184
190
@@ -240,9 +246,15 @@ fabricOneLakeSettings:
240
246
241
247
### User-assigned managed identity
242
248
243
-
To use user-managed identity for authentication, you must first deploy Azure IoT Operations with secure settings enabled. To learn more, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
249
+
To use user-assigned managed identity for authentication, you must first deploy Azure IoT Operations with secure settings enabled. Then you need to [set up a user-assigned managed identity for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections). To learn more, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
250
+
251
+
Before you configure the dataflow endpoint, assign a role to the user-assigned managed identity that grants permission to write to the Fabric lakehouse.:
252
+
253
+
1. Go to Microsoft Fabric workspace, select **Manage access** > **+ Add people or groups**.
254
+
1. Search for the name of your user-assigned managed identity.
255
+
1. Select an appropriate role, then select **Add**.
244
256
245
-
Then, specify the user-assigned managed identity authentication method along with the client ID, tenant ID, and scope of the managed identity.
257
+
Then, configure the dataflow endpoint with user-assigned managed identity settings.
0 commit comments