You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When you create the first user subscription mode Batch account in an Azure subscription, you must register your subscription with Batch. You need to do this registration only once per subscription.
101
+
When you create the first user subscription mode Batch account in an Azure subscription, you must register your subscription with Batch resource provider, and assign **Azure Batch Service Orchestration Role** to Microsoft Azure Batch service principal. You need to do this configuration only once per subscription.
102
102
103
103
> [!IMPORTANT]
104
104
> You need **Owner** permissions in the subscription to take this action.
@@ -112,9 +112,9 @@ When you create the first user subscription mode Batch account in an Azure subsc
112
112
113
113
1. Return to the **Subscription** page and select **Access control (IAM)** from the left navigation.
114
114
1. At the top of the **Access control (IAM)** page, select **Add** > **Add role assignment**.
115
-
1. On the **Add role assignment** screen, under **Assignment type**, select **Privileged administrator role**, and then select **Next**.
116
-
1. On the **Role** tab, select either the **Contributor** or **Owner** role for the Batch account, and then select **Next**.
115
+
1. On the **Role** tab, search for and select **Azure Batch Service Orchestration Role**, and then select **Next**.
117
116
1. On the **Members** tab, select **Select members**. On the **Select members** screen, search for and select **Microsoft Azure Batch**, and then select **Select**.
117
+
1. Select **Review + assign** to go to **Review + assign** tab, and select **Review + create** again to apply role assignment changes.
118
118
119
119
For detailed steps, see [Assign Azure roles by using the Azure portal](../role-based-access-control/role-assignments-portal.yml).
120
120
@@ -147,6 +147,7 @@ To create a Batch account with authentication mode settings:
147
147
1. You can select either of the 3 **"Microsoft Entra ID**, **Shared Key**, **Task Authentication Token** authentication mode for the Batch account to support or leave the settings at default values.
148
148
149
149
:::image type="content" source="media/batch-account-create-portal/authentication-mode-property.png" alt-text="Screenshot of the Authentication Mode options when creating a Batch account.":::
150
+
150
151
1. Leave the remaining settings at default values, select **Review + create**, and then select **Create**.
151
152
152
153
> [!TIP]
@@ -157,38 +158,31 @@ To create a Batch account with authentication mode settings:
157
158
158
159
### Grant access to the key vault manually
159
160
160
-
You can also grant access to the key vault manually in [Azure portal](https://portal.azure.com).
161
+
To grant access to the key vault manually in [Azure portal](https://portal.azure.com), you need to assign **Key Vault Secrets Officer** role for Batch:
161
162
162
-
#### If the Key Vault permission model is **Azure role-based access control**:
163
163
1. Select **Access control (IAM)** from the left navigation of the key vault page.
164
164
1. At the top of the **Access control (IAM)** page, select **Add** > **Add role assignment**.
165
-
1. On the **Add role assignment** screen, under **Role** tab, under **Job function roles** sub tab, select either **Key Vault Secrets Officer** or **Key Vault Administrator** role for the Batch account, and then select **Next**.
165
+
1. On the **Add role assignment** screen, under **Role** tab, under **Job function roles** sub tab, search and select **Key Vault Secrets Officer** role for the Batch account, and then select **Next**.
166
166
1. On the **Members** tab, select **Select members**. On the **Select members** screen, search for and select **Microsoft Azure Batch**, and then select **Select**.
167
-
1.Click the **Review + create** button on the bottom to go to **Review + assign** tab, and click the **Review + create** button on the bottom again.
167
+
1.Select the **Review + create** button on the bottom to go to **Review + assign** tab, and select the **Review + create** button on the bottom again.
168
168
169
169
For detailed steps, see [Assign Azure roles by using the Azure portal](../role-based-access-control/role-assignments-portal.yml).
170
170
171
-
#### If the Key Vault permission model is **Vault access policy**:
171
+
> [!NOTE]
172
+
> **KeyVaultNotFound** error returns for Batch account creation if the RBAC role isn't assigned for Batch in the referenced key vault.
173
+
174
+
If the Key Vault permission model is **Vault access policy**, you also need to configure the **Access policies**:
175
+
172
176
1. Select **Access policies** from the left navigation of the key vault page.
173
177
1. On the **Access policies** page, select **Create**.
174
-
1. On the **Create an access policy** screen, select a minimum of **Get**, **List**, **Set**, and **Delete** permissions under **Secret permissions**. For [key vaults with soft-delete enabled](/azure/key-vault/general/soft-delete-overview), also select **Recover**.
178
+
1. On the **Create an access policy** screen, select a minimum of **Get**, **List**, **Set**, **Delete**, and **Recover** permissions under **Secret permissions**.
175
179
176
180
:::image type="content" source="media/batch-account-create-portal/secret-permissions.png" alt-text="Screenshot of the Secret permissions selections for Azure Batch":::
177
181
178
182
1. Select **Next**.
179
183
1. On the **Principal** tab, search for and select **Microsoft Azure Batch**.
180
184
1. Select the **Review + create** tab, and then select **Create**.
181
185
182
-
<!--can't find this link or screen
183
-
184
-
Select **Add**, then ensure that the **Azure Virtual Machines for deployment** and **Azure Resource Manager for template deployment** check boxes are selected for the linked **Key Vault** resource. Select **Save** to commit your changes.
185
-
186
-
:::image type="content" source="media/batch-account-create-portal/key-vault-access-policy.png" alt-text="Screenshot of the Access policy screen.":::
187
-
188
-
-->
189
-
> [!NOTE]
190
-
> Currently, the Batch account name supports only access policies. When creating a Batch account, ensure that the key vault uses the associated access policy instead of the EntraID RBAC permissions. For more information on how to add an access policy to your Azure key vault instance, see [Configure your Azure Key Vault instance](batch-customer-managed-key.md).
191
-
192
186
### Configure subscription quotas
193
187
194
188
For user subscription Batch accounts, [core quotas](batch-quota-limit.md) must be set manually. Standard Batch core quotas don't apply to accounts in user subscription mode. The [quotas in your subscription](/azure/azure-resource-manager/management/azure-subscription-service-limits) for regional compute cores, per-series compute cores, and other resources are used and enforced.
0 commit comments