Skip to content

Commit 5a00661

Browse files
Merge pull request #221087 from deeikele/deeike/uai
Specify user-assigned identity required role assignments for the workspace
2 parents a6b4675 + 388eced commit 5a00661

File tree

1 file changed

+13
-1
lines changed

1 file changed

+13
-1
lines changed

articles/machine-learning/how-to-identity-based-service-authentication.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,12 +40,24 @@ Azure Machine Learning is composed of multiple Azure services. There are multipl
4040

4141
## User-assigned managed identity
4242

43+
### Workspace
44+
4345
You can add a user-assigned managed identity when creating an Azure Machine Learning workspace from the [Azure portal](https://portal.azure.com). Use the following steps while creating the workspace:
4446

4547
1. From the __Basics__ page, select the Azure Storage Account, Azure Container Registry, and Azure Key Vault you want to use with the workspace.
4648
1. From the __Advanced__ page, select __User-assigned identity__ and then select the managed identity to use.
4749

48-
You can also use [an ARM template](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.machinelearningservices/machine-learning-workspace-vnet) to create a workspace with user-assigned managed identity.
50+
The following [Azure RBAC role assignments](../role-based-access-control/role-assignments.md) are required on your user-assigned managed identity for your Azure Machine Learning workspace to access data on the workspace-associated resources.
51+
52+
|Resource|Permission|
53+
|---|---|
54+
|Azure Storage|Contributor (control plane) + Storage Blob Data Contributor (data plane, optional, to enable data preview in the Azure Machine Learning studio)|
55+
|Azure Key Vault (when using [RBAC permission model](../key-vault/general/rbac-guide.md))|Contributor (control plane) + Key Vault Administrator (data plane)|
56+
|Azure Key Vault (when using [access policies permission model](../key-vault/general/assign-access-policy.md))|Contributor + any access policy permissions besides **purge** operations|
57+
|Azure Container Registry|Contributor|
58+
|Azure Application Insights|Contributor|
59+
60+
For automated creation of role assignments on your user-assigned managed identity, you may use [this ARM template](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.machinelearningservices/machine-learning-dependencies-role-assignment).
4961

5062
> [!TIP]
5163
> For a workspace with [customer-managed keys for encryption](concept-data-encryption.md), you can pass in a user-assigned managed identity to authenticate from storage to Key Vault. Use the `user-assigned-identity-for-cmk-encryption` (CLI) or `user_assigned_identity_for_cmk_encryption` (SDK) parameters to pass in the managed identity. This managed identity can be the same or different as the workspace primary user assigned managed identity.

0 commit comments

Comments
 (0)