Skip to content

Commit 45fba22

Browse files
Merge pull request #293249 from CompassHXM/BatchAccountCreation
Update Azure Batch account creation steps
2 parents b435824 + 447f1b5 commit 45fba22

File tree

3 files changed

+14
-20
lines changed

3 files changed

+14
-20
lines changed

articles/batch/batch-account-create-portal.md

Lines changed: 14 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Create a Batch account in the Azure portal
33
description: Learn how to use the Azure portal to create and manage an Azure Batch account for running large-scale parallel workloads in the cloud.
44
ms.topic: how-to
5-
ms.date: 04/16/2024
5+
ms.date: 01/22/2025
66
ms.custom: subject-rbac-steps, linux-related-content
77
---
88

@@ -98,7 +98,7 @@ Get-AzMarketplaceTerms -Publisher 'microsoft-azure-batch' -Product 'ubuntu-serve
9898
<a name="allow-azure-batch-to-access-the-subscription-one-time-operation"></a>
9999
### Allow Batch to access the subscription
100100

101-
When you create the first user subscription mode Batch account in an Azure subscription, you must register your subscription with Batch. You need to do this registration only once per subscription.
101+
When you create the first user subscription mode Batch account in an Azure subscription, you must register your subscription with Batch resource provider, and assign **Azure Batch Service Orchestration Role** to Microsoft Azure Batch service principal. You need to do this configuration only once per subscription.
102102

103103
> [!IMPORTANT]
104104
> You need **Owner** permissions in the subscription to take this action.
@@ -112,9 +112,9 @@ When you create the first user subscription mode Batch account in an Azure subsc
112112

113113
1. Return to the **Subscription** page and select **Access control (IAM)** from the left navigation.
114114
1. At the top of the **Access control (IAM)** page, select **Add** > **Add role assignment**.
115-
1. On the **Add role assignment** screen, under **Assignment type**, select **Privileged administrator role**, and then select **Next**.
116-
1. On the **Role** tab, select either the **Contributor** or **Owner** role for the Batch account, and then select **Next**.
115+
1. On the **Role** tab, search for and select **Azure Batch Service Orchestration Role**, and then select **Next**.
117116
1. On the **Members** tab, select **Select members**. On the **Select members** screen, search for and select **Microsoft Azure Batch**, and then select **Select**.
117+
1. Select **Review + assign** to go to **Review + assign** tab, and select **Review + create** again to apply role assignment changes.
118118

119119
For detailed steps, see [Assign Azure roles by using the Azure portal](../role-based-access-control/role-assignments-portal.yml).
120120

@@ -147,6 +147,7 @@ To create a Batch account with authentication mode settings:
147147
1. You can select either of the 3 **"Microsoft Entra ID**, **Shared Key**, **Task Authentication Token** authentication mode for the Batch account to support or leave the settings at default values.
148148

149149
:::image type="content" source="media/batch-account-create-portal/authentication-mode-property.png" alt-text="Screenshot of the Authentication Mode options when creating a Batch account.":::
150+
150151
1. Leave the remaining settings at default values, select **Review + create**, and then select **Create**.
151152

152153
> [!TIP]
@@ -157,38 +158,31 @@ To create a Batch account with authentication mode settings:
157158
158159
### Grant access to the key vault manually
159160

160-
You can also grant access to the key vault manually in [Azure portal](https://portal.azure.com).
161+
To grant access to the key vault manually in [Azure portal](https://portal.azure.com), you need to assign **Key Vault Secrets Officer** role for Batch:
161162

162-
#### If the Key Vault permission model is **Azure role-based access control**:
163163
1. Select **Access control (IAM)** from the left navigation of the key vault page.
164164
1. At the top of the **Access control (IAM)** page, select **Add** > **Add role assignment**.
165-
1. On the **Add role assignment** screen, under **Role** tab, under **Job function roles** sub tab, select either **Key Vault Secrets Officer** or **Key Vault Administrator** role for the Batch account, and then select **Next**.
165+
1. On the **Add role assignment** screen, under **Role** tab, under **Job function roles** sub tab, search and select **Key Vault Secrets Officer** role for the Batch account, and then select **Next**.
166166
1. On the **Members** tab, select **Select members**. On the **Select members** screen, search for and select **Microsoft Azure Batch**, and then select **Select**.
167-
1. Click the **Review + create** button on the bottom to go to **Review + assign** tab, and click the **Review + create** button on the bottom again.
167+
1. Select the **Review + create** button on the bottom to go to **Review + assign** tab, and select the **Review + create** button on the bottom again.
168168

169169
For detailed steps, see [Assign Azure roles by using the Azure portal](../role-based-access-control/role-assignments-portal.yml).
170170

171-
#### If the Key Vault permission model is **Vault access policy**:
171+
> [!NOTE]
172+
> **KeyVaultNotFound** error returns for Batch account creation if the RBAC role isn't assigned for Batch in the referenced key vault.
173+
174+
If the Key Vault permission model is **Vault access policy**, you also need to configure the **Access policies**:
175+
172176
1. Select **Access policies** from the left navigation of the key vault page.
173177
1. On the **Access policies** page, select **Create**.
174-
1. On the **Create an access policy** screen, select a minimum of **Get**, **List**, **Set**, and **Delete** permissions under **Secret permissions**. For [key vaults with soft-delete enabled](/azure/key-vault/general/soft-delete-overview), also select **Recover**.
178+
1. On the **Create an access policy** screen, select a minimum of **Get**, **List**, **Set**, **Delete**, and **Recover** permissions under **Secret permissions**.
175179

176180
:::image type="content" source="media/batch-account-create-portal/secret-permissions.png" alt-text="Screenshot of the Secret permissions selections for Azure Batch":::
177181

178182
1. Select **Next**.
179183
1. On the **Principal** tab, search for and select **Microsoft Azure Batch**.
180184
1. Select the **Review + create** tab, and then select **Create**.
181185

182-
<!--can't find this link or screen
183-
184-
Select **Add**, then ensure that the **Azure Virtual Machines for deployment** and **Azure Resource Manager for template deployment** check boxes are selected for the linked **Key Vault** resource. Select **Save** to commit your changes.
185-
186-
:::image type="content" source="media/batch-account-create-portal/key-vault-access-policy.png" alt-text="Screenshot of the Access policy screen.":::
187-
188-
-->
189-
> [!NOTE]
190-
> Currently, the Batch account name supports only access policies. When creating a Batch account, ensure that the key vault uses the associated access policy instead of the EntraID RBAC permissions. For more information on how to add an access policy to your Azure key vault instance, see [Configure your Azure Key Vault instance](batch-customer-managed-key.md).
191-
192186
### Configure subscription quotas
193187

194188
For user subscription Batch accounts, [core quotas](batch-quota-limit.md) must be set manually. Standard Batch core quotas don't apply to accounts in user subscription mode. The [quotas in your subscription](/azure/azure-resource-manager/management/azure-subscription-service-limits) for regional compute cores, per-series compute cores, and other resources are used and enforced.
Binary file not shown.
64.2 KB
Loading

0 commit comments

Comments
 (0)