Skip to content

Commit 654de83

Browse files
authored
Merge pull request #226935 from laujan/63159-revisit-managed-identity
update managed identity articles
2 parents 66b78a6 + 48121de commit 654de83

File tree

4 files changed

+22
-15
lines changed

4 files changed

+22
-15
lines changed

articles/applied-ai-services/form-recognizer/managed-identities.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,16 @@ manager: nitinme
77
ms.service: applied-ai-services
88
ms.subservice: forms-recognizer
99
ms.topic: how-to
10-
ms.date: 10/20/2022
10+
ms.date: 02/09/2023
1111
ms.author: lajanuar
1212
monikerRange: '>=form-recog-2.1.0'
1313
recommendations: false
1414
---
1515

1616
# Managed identities for Form Recognizer
1717

18+
:::image type="content" source="media/managed-identities/rbac-flow.png" alt-text="Screenshot of managed identity flow (RBAC).":::
19+
1820
[!INCLUDE [applies to v3.0 and v2.1](includes/applies-to-v3-0-and-v2-1.md)]
1921

2022
Managed identities for Azure resources are service principals that create an Azure Active Directory (Azure AD) identity and specific permissions for Azure managed resources:
@@ -28,6 +30,7 @@ Managed identities for Azure resources are service principals that create an Azu
2830
> [!TIP]
2931
> Managed identities eliminate the need for you to manage credentials, including Shared Access Signature (SAS) tokens. Managed identities are a safer way to grant access to data without having credentials in your code.
3032
33+
3134
## Private storage account access
3235

3336
Private Azure storage account access and authentication are supported by [managed identities for Azure resources](../../active-directory/managed-identities-azure-resources/overview.md). If you have an Azure storage account, protected by a Virtual Network (VNet) or firewall, Form Recognizer can't directly access your storage account data. However, once a managed identity is enabled, Form Recognizer can access your storage account using an assigned managed identity credential.
@@ -40,13 +43,13 @@ Managed identities for Azure resources are service principals that create an Azu
4043
4144
## Prerequisites
4245

43-
To get started, you'll need:
46+
To get started, you need:
4447

4548
* An active [**Azure account**](https://azure.microsoft.com/free/cognitive-services/)—if you don't have one, you can [**create a free account**](https://azure.microsoft.com/free/).
4649

4750
* A [**Form Recognizer**](https://portal.azure.com/#create/Microsoft.CognitiveServicesTextTranslation) or [**Cognitive Services**](https://portal.azure.com/#create/Microsoft.CognitiveServicesAllInOne) resource in the Azure portal. For detailed steps, _see_ [Create a Cognitive Services resource using the Azure portal](../../cognitive-services/cognitive-services-apis-create-account.md?tabs=multiservice%2cwindows).
4851

49-
* An [**Azure blob storage account**](https://portal.azure.com/#create/Microsoft.StorageAccount-ARM) in the same region as your Form Recognizer resource. You'll create containers to store and organize your blob data within your storage account.
52+
* An [**Azure blob storage account**](https://portal.azure.com/#create/Microsoft.StorageAccount-ARM) in the same region as your Form Recognizer resource. You also need to create containers to store and organize your blob data within your storage account.
5053

5154
* If your storage account is behind a firewall, **you must enable the following configuration**: </br></br>
5255

@@ -67,9 +70,9 @@ There are two types of managed identity: **system-assigned** and **user-assigned
6770

6871
* A system-assigned managed identity is **enabled** directly on a service instance. It isn't enabled by default; you must go to your resource and update the identity setting.
6972

70-
* The system-assigned managed identity is tied to your resource throughout its lifecycle. If you delete your resource, the managed identity will be deleted as well.
73+
* The system-assigned managed identity is tied to your resource throughout its lifecycle. If you delete your resource, the managed identity is deleted as well.
7174

72-
In the following steps, we'll enable a system-assigned managed identity and grant Form Recognizer limited access to your Azure blob storage account.
75+
In the following steps, we enable a system-assigned managed identity and grant Form Recognizer limited access to your Azure blob storage account.
7376

7477
## Enable a system-assigned managed identity
7578

@@ -95,7 +98,7 @@ You need to grant Form Recognizer access to your storage account before it can c
9598

9699
:::image type="content" source="media/managed-identities/enable-system-assigned-managed-identity-portal.png" alt-text="Screenshot: enable system-assigned managed identity in Azure portal.":::
97100

98-
1. An Azure role assignments page will open. Choose your subscription from the drop-down menu then select **&plus; Add role assignment**.
101+
1. On the Azure role assignments page that opens, choose your subscription from the drop-down menu then select **&plus; Add role assignment**.
99102

100103
:::image type="content" source="media/managed-identities/azure-role-assignments-page-portal.png" alt-text="Screenshot: Azure role assignments page in the Azure portal.":::
101104

46.4 KB
Loading

articles/cognitive-services/Translator/document-translation/how-to-guides/create-use-managed-identities.md

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,14 @@ manager: nitinme
77
ms.service: cognitive-services
88
ms.subservice: translator-text
99
ms.topic: how-to
10-
ms.date: 12/17/2022
10+
ms.date: 02/09/2023
1111
ms.author: lajanuar
1212
---
1313

1414
# Managed identities for Document Translation
1515

16+
:::image type="content" source="../media/managed-identity-rbac-flow.png" alt-text="Screenshot of managed identity flow (RBAC).":::
17+
1618
> [!IMPORTANT]
1719
>
1820
> * Currently, Document Translation doesn't support managed identity in the global region. If you intend to use managed identities for Document Translation operations, [create your Translator resource](https://portal.azure.com/#create/Microsoft.CognitiveServicesTextTranslation) in a non-global Azure region.
@@ -24,7 +26,7 @@ Managed identities for Azure resources are service principals that create an Azu
2426

2527
* You can use managed identities to grant access to any resource that supports Azure AD authentication, including your own applications. Managed identities eliminate the need for you to include shared access signature tokens (SAS) with your HTTP requests.
2628

27-
* To grant access to an Azure resource, you'll assign an Azure role to a managed identity using [Azure role-based access control (`Azure RBAC`)](../../../../role-based-access-control/overview.md).
29+
* To grant access to an Azure resource, assign an Azure role to a managed identity using [Azure role-based access control (`Azure RBAC`)](../../../../role-based-access-control/overview.md).
2830

2931
* There's no added cost to use managed identities in Azure.
3032

@@ -34,16 +36,18 @@ Managed identities for Azure resources are service principals that create an Azu
3436
>
3537
> * Managed identities are a safer way to grant access to data without having SAS tokens included with your HTTP requests.
3638
39+
3740
## Prerequisites
38-
To get started, you'll need:
41+
42+
To get started, you need:
3943

4044
* An active [**Azure account**](https://azure.microsoft.com/free/cognitive-services/)—if you don't have one, you can [**create a free account**](https://azure.microsoft.com/free/).
4145

4246
* A [**single-service Translator**](https://portal.azure.com/#create/Microsoft.CognitiveServicesTextTranslation) (not a multi-service Cognitive Services) resource assigned to a **non-global** region. For detailed steps, _see_ [Create a Cognitive Services resource using the Azure portal](../../../cognitive-services-apis-create-account.md?tabs=multiservice%2cwindows).
4347

4448
* A brief understanding of [**Azure role-based access control (`Azure RBAC`)**](../../../../role-based-access-control/role-assignments-portal.md) using the Azure portal.
4549

46-
* An [**Azure blob storage account**](https://portal.azure.com/#create/Microsoft.StorageAccount-ARM) in the same region as your Translator resource. You'll create containers to store and organize your blob data within your storage account.
50+
* An [**Azure blob storage account**](https://portal.azure.com/#create/Microsoft.StorageAccount-ARM) in the same region as your Translator resource. You also need to create containers to store and organize your blob data within your storage account.
4751

4852
* **If your storage account is behind a firewall, you must enable the following configuration**: </br>
4953

@@ -63,9 +67,9 @@ There are two types of managed identities: **system-assigned** and **user-assign
6367

6468
* A system-assigned managed identity is **enabled** directly on a service instance. It isn't enabled by default; you must go to your resource and update the identity setting.
6569

66-
* The system-assigned managed identity is tied to your resource throughout its lifecycle. If you delete your resource, the managed identity will be deleted as well.
70+
* The system-assigned managed identity is tied to your resource throughout its lifecycle. If you delete your resource, the managed identity is deleted as well.
6771

68-
In the following steps, we'll enable a system-assigned managed identity and grant your Translator resource limited access to your Azure blob storage account.
72+
In the following steps, we enable a system-assigned managed identity and grant your Translator resource limited access to your Azure blob storage account.
6973

7074
## Enable a system-assigned managed identity
7175

@@ -93,7 +97,7 @@ The **Storage Blob Data Contributor** role gives Translator (represented by the
9397

9498
:::image type="content" source="../../media/managed-identities/enable-system-assigned-managed-identity-portal.png" alt-text="Screenshot: enable system-assigned managed identity in Azure portal.":::
9599

96-
1. An Azure role assignments page will open. Choose your subscription from the drop-down menu then select **&plus; Add role assignment**.
100+
1. On the Azure role assignments page that opened, choose your subscription from the drop-down menu then select **&plus; Add role assignment**.
97101

98102
:::image type="content" source="../../media/managed-identities/azure-role-assignments-page-portal.png" alt-text="Screenshot: Azure role assignments page in the Azure portal.":::
99103

@@ -124,11 +128,11 @@ The **Storage Blob Data Contributor** role gives Translator (represented by the
124128

125129
* A batch Document Translation request is submitted to your Translator service endpoint via a POST request.
126130

127-
* With managed identity and `Azure RBAC`, you'll no longer need to include SAS URLs.
131+
* With managed identity and `Azure RBAC`, you no longer need to include SAS URLs.
128132

129133
* If successful, the POST method returns a `202 Accepted` response code and the batch request is created by the service.
130134

131-
* The translated documents will appear in your target container.
135+
* The translated documents appear in your target container.
132136

133137
### Headers
134138

51 KB
Loading

0 commit comments

Comments
 (0)