You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-apps/sessions-code-interpreter.md
+1-113Lines changed: 1 addition & 113 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: container-apps
5
5
author: craigshoemaker
6
6
ms.service: azure-container-apps
7
7
ms.topic: how-to
8
-
ms.date: 04/07/2025
8
+
ms.date: 05/19/2025
9
9
ms.author: cshoe
10
10
ms.custom: references_regions
11
11
ms.collection: ce-skilling-ai-copilot
@@ -157,118 +157,6 @@ The following listing shows a sample of the type of response you can expect from
157
157
158
158
Code interpreter sessions are designed to run untrusted code in isolated environments, ensuring that your applications and data remain protected.
159
159
160
-
### Use managed identity
161
-
162
-
A managed identity from Microsoft Entra ID allows your container session pools and their sessions to access other Microsoft Entra protected resources. Both system-assigned and user-assigned managed identities are supported in a session pool.
163
-
164
-
For more about managed identities in Microsoft Entra ID, see [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md).
165
-
166
-
There are two ways to use managed identities with custom container session pools:
167
-
168
-
-**Image pull authentication**: Use the managed identity to authenticate with the container registry to pull the container image.
169
-
170
-
-**Resource access**: Use the session pool's managed identity in a session to access other Microsoft Entra protected resources. Due to its security implications, this capability is disabled by default.
171
-
172
-
> [!IMPORTANT]
173
-
> If you enable access to managed identity in a session, any code or programs running in the session can create Microsoft Entra tokens for the pool's managed identity. Since sessions typically run untrusted code, use this feature with extreme caution.
174
-
175
-
# [Azure CLI](#tab/azure-cli)
176
-
177
-
To enable managed identity for a custom container session pool, use Azure Resource Manager.
178
-
179
-
# [Azure Resource Manager](#tab/arm)
180
-
181
-
To enable managed identity for a custom container session pool, you add an `identity` property to the session pool resource.
182
-
183
-
The `identity` property must have a `type` property with the value `SystemAssigned` or `UserAssigned`. For more information on how to configure this property, see [Configure managed identities](managed-identity.md?tabs=arm%2Cdotnet#configure-managed-identities).
184
-
185
-
The following example shows an ARM template snippet that enables a user-assigned identity for a custom container session pool and use it for image pull authentication.
186
-
187
-
Before you send the request, replace the placeholders between the `<>` brackets with the appropriate values for your session pool and session identifier.
This template contains the following settings for managed identity:
263
-
264
-
| Parameter | Value | Description |
265
-
|---------|-------|-------------|
266
-
|`customContainerTemplate.registryCredentials.identity`|`<IDENTITY_RESOURCE_ID>`| The resource ID of the managed identity to use for image pull authentication. |
267
-
|`managedIdentitySettings.identity`|`<IDENTITY_RESOURCE_ID>`| The resource ID of the managed identity to use in the session. |
268
-
|`managedIdentitySettings.lifecycle`|`None`| The session lifecycle where the managed identity is available.<br><br>- `None` (default): The session can't access the identity. This setting is only used for image pull.<br><br>- `Main`: In addition to image pull, the main session can also access the identity. **Use with caution.**|
269
-
270
-
---
271
-
272
160
## LLM framework integrations
273
161
274
162
Instead of using the session pool management API directly, the following LLM frameworks provide integrations with code interpreter sessions:
Copy file name to clipboardExpand all lines: articles/container-apps/sessions-usage.md
+113-1Lines changed: 113 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: container-apps
5
5
author: craigshoemaker
6
6
ms.service: azure-container-apps
7
7
ms.topic: conceptual
8
-
ms.date: 04/07/2025
8
+
ms.date: 05/19/2025
9
9
ms.author: cshoe
10
10
ms.custom: references_regions, ignite-2024
11
11
---
@@ -203,6 +203,118 @@ Example strategies include:
203
203
> [!IMPORTANT]
204
204
> Failure to secure access to sessions could result in misuse or unauthorized access to data stored in your users' sessions.
205
205
206
+
### Use managed identity
207
+
208
+
A managed identity from Microsoft Entra ID allows your container session pools and their sessions to access other Microsoft Entra protected resources. Both system-assigned and user-assigned managed identities are supported in a session pool.
209
+
210
+
For more about managed identities in Microsoft Entra ID, see [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md).
211
+
212
+
There are two ways to use managed identities with custom container session pools:
213
+
214
+
-**Image pull authentication**: Use the managed identity to authenticate with the container registry to pull the container image.
215
+
216
+
-**Resource access**: Use the session pool's managed identity in a session to access other Microsoft Entra protected resources. Due to its security implications, this capability is disabled by default.
217
+
218
+
> [!IMPORTANT]
219
+
> If you enable access to managed identity in a session, any code or programs running in the session can create Microsoft Entra tokens for the pool's managed identity. Since sessions typically run untrusted code, use this feature with extreme caution.
220
+
221
+
# [Azure CLI](#tab/azure-cli)
222
+
223
+
To enable managed identity for a custom container session pool, use Azure Resource Manager.
224
+
225
+
# [Azure Resource Manager](#tab/arm)
226
+
227
+
To enable managed identity for a custom container session pool, you add an `identity` property to the session pool resource.
228
+
229
+
The `identity` property must have a `type` property with the value `SystemAssigned` or `UserAssigned`. For more information on how to configure this property, see [Configure managed identities](managed-identity.md?tabs=arm%2Cdotnet#configure-managed-identities).
230
+
231
+
The following example shows an ARM template snippet that enables a user-assigned identity for a custom container session pool and use it for image pull authentication.
232
+
233
+
Before you send the request, replace the placeholders between the `<>` brackets with the appropriate values for your session pool and session identifier.
This template contains the following settings for managed identity:
309
+
310
+
| Parameter | Value | Description |
311
+
|---------|-------|-------------|
312
+
|`customContainerTemplate.registryCredentials.identity`|`<IDENTITY_RESOURCE_ID>`| The resource ID of the managed identity to use for image pull authentication. |
313
+
|`managedIdentitySettings.identity`|`<IDENTITY_RESOURCE_ID>`| The resource ID of the managed identity to use in the session. |
314
+
|`managedIdentitySettings.lifecycle`|`None`| The session lifecycle where the managed identity is available.<br><br>- `None` (default): The session can't access the identity. This setting is only used for image pull.<br><br>- `Main`: In addition to image pull, the main session can also access the identity. **Use with caution.**|
315
+
316
+
---
317
+
206
318
## Logging
207
319
208
320
Console logs from containers running in a session are available in the Azure Log Analytics workspace associated with the Azure Container Apps environment in a table named `AppEnvSessionConsoleLogs_CL`.
0 commit comments