Skip to content

Commit 6bd5044

Browse files
authored
Merge pull request #272260 from Padmalathas/BatchFixes-Patch1
Invalid JSON Fix and Authentication Mode Fix
2 parents f779642 + 171014d commit 6bd5044

File tree

3 files changed

+21
-4
lines changed

3 files changed

+21
-4
lines changed

articles/batch/automatic-certificate-rotation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Enable automatic certificate rotation in a Batch pool
33
description: You can create a Batch pool with a managed identity and a certificate that can automatically be renewed.
44
ms.topic: conceptual
55
ms.custom:
6-
ms.date: 12/05/2023
6+
ms.date: 04/16/2024
77
---
88

99
# Enable automatic certificate rotation in a Batch pool
@@ -143,7 +143,7 @@ Request Body for Windows node
143143
"requireInitialSync": true,
144144
"observedCertificates": [
145145
{
146-
"https://testkvwestus2s.vault.azure.net/secrets/authcertforumatesting/8f5f3f491afd48cb99286ba2aacd39af",
146+
"url": "https://testkvwestus2s.vault.azure.net/secrets/authcertforumatesting/8f5f3f491afd48cb99286ba2aacd39af",
147147
"certificateStoreLocation": "LocalMachine",
148148
"keyExportable": true
149149
}
@@ -186,7 +186,7 @@ root@74773db5fe1b42ab9a4b6cf679d929da000000:/var/lib/waagent/Microsoft.Azure.Key
186186

187187
## Troubleshooting Key Vault Extension
188188

189-
If Key Vault extension is configured incorrectly, the compute node might be in usuable state. To troubleshoot Key Vault extension failure, you can temporarily set requireInitialSync to false and redeploy your pool, then the compute node is in idle state, you can log in to the compute node to check KeyVault extension logs for errors and fix the configuration issues. Visit following Key Vault extension doc link for more information.
189+
If Key Vault extension is configured incorrectly, the compute node might be in usable state. To troubleshoot Key Vault extension failure, you can temporarily set requireInitialSync to false and redeploy your pool, then the compute node is in idle state, you can log in to the compute node to check KeyVault extension logs for errors and fix the configuration issues. Visit following Key Vault extension doc link for more information.
190190

191191
- [Azure Key Vault extension for Linux](../virtual-machines/extensions/key-vault-linux.md)
192192
- [Azure Key Vault extension for Windows](../virtual-machines/extensions/key-vault-windows.md)

articles/batch/batch-account-create-portal.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Create a Batch account in the Azure portal
33
description: Learn how to use the Azure portal to create and manage an Azure Batch account for running large-scale parallel workloads in the cloud.
44
ms.topic: how-to
5-
ms.date: 04/04/2024
5+
ms.date: 04/16/2024
66
ms.custom: subject-rbac-steps, linux-related-content
77
---
88

@@ -138,6 +138,23 @@ To create a Batch account in user subscription mode:
138138
1. After you select the key vault, select the checkbox next to **I agree to grant Azure Batch access to this key vault**.
139139
1. Select **Review + create**, and then select **Create** to create the Batch account.
140140

141+
### Create a Batch account with designated authentication mode
142+
143+
To create a Batch account with authentication mode settings:
144+
145+
1. Follow the preceding instructions to [create a Batch account](#create-a-batch-account), but select **Batch Service** for **Authentication mode** on the **Advanced** tab of the **New Batch account** page.
146+
1. You must then select **Authentication mode** to define which authentication mode that a Batch account can use by authentication mode property key.
147+
1. You can select either of the 3 **"Microsoft Entra ID**, **Shared Key**, **Task Authentication Token** authentication mode for the Batch account to support or leave the settings at default values.
148+
149+
:::image type="content" source="media/batch-account-create-portal/authentication-mode-property.png" alt-text="Screenshot of the Authentication Mode options when creating a Batch account.":::
150+
1. Leave the remaining settings at default values, select **Review + create**, and then select **Create**.
151+
152+
> [!TIP]
153+
> For enhanced security, it is advised to confine the authentication mode of the Batch account solely to **Microsoft Entra ID**. This measure mitigates the risk of shared key exposure and introduces additional RBAC controls. For more details, see [Batch security best practices](./security-best-practices.md#batch-account-authentication).
154+
155+
> [!WARNING]
156+
> The **Task Authentication Token** will retire on September 30, 2024. Should you require this feature, it is recommended to use [User assigned managed identity](./managed-identity-pools.md) in the Batch pool as an alternative.
157+
141158
### Grant access to the key vault manually
142159

143160
You can also grant access to the key vault manually.
25.9 KB
Loading

0 commit comments

Comments
 (0)