Skip to content

Commit 6edae26

Browse files
authored
Merge pull request #179649 from MGoedtel/UpdateArcMIb1111
updated Arc for servers MI prereqs again
2 parents 01affc8 + 94dc69b commit 6edae26

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

articles/azure-arc/servers/managed-identity-authentication.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Authenticate against Azure resources with Azure Arc-enabled servers
33
description: This article describes Azure Instance Metadata Service support for Azure Arc-enabled servers and how you can authenticate against Azure resources and local using a secret.
44
ms.topic: conceptual
5-
ms.date: 11/11/2021
5+
ms.date: 11/08/2021
66
---
77

88
# Authenticate against Azure resources with Azure Arc-enabled servers
99

10-
Applications or processes running directly on an Azure Arc-enabled servers can leverage managed identities to access other Azure resources that support Azure Active Directory-based authentication. An application can obtain an [access token](../../active-directory/develop/developer-glossary.md#access-token) representing its identity, which is system-assigned for Azure Arc-enabled servers, and use it as a 'bearer' token to authenticate itself to another service.
10+
Applications or processes running directly on an Azure Arc-enabled servers can use managed identities to access other Azure resources that support Azure Active Directory-based authentication. An application can obtain an [access token](../../active-directory/develop/developer-glossary.md#access-token) representing its identity, which is system-assigned for Azure Arc-enabled servers, and use it as a 'bearer' token to authenticate itself to another service.
1111

12-
Refer to the [managed identity overview](../../active-directory/managed-identities-azure-resources/overview.md) documentation for a detailed description of managed identities, as well as the distinction between system-assigned and user-assigned identities.
12+
Refer to the [managed identity overview](../../active-directory/managed-identities-azure-resources/overview.md) documentation for a detailed description of managed identities, and understand the distinction between system-assigned and user-assigned identities.
1313

1414
In this article, we show you how a server can use a system-assigned managed identity to access Azure [Key Vault](../../key-vault/general/overview.md). Serving as a bootstrap, Key Vault makes it possible for your client application to then use a secret to access resources not secured by Azure Active Directory (AD). For example, TLS/SSL certificates used by your IIS web servers can be stored in Azure Key Vault, and securely deploy the certificates to Windows or Linux servers outside of Azure.
1515

@@ -36,9 +36,11 @@ The system environment variable **IDENTITY_ENDPOINT** is used to discover the id
3636
## Prerequisites
3737

3838
- An understanding of Managed identities.
39+
- On Windows, you must be a member of the local **Administrators** group or the **Hybrid Agent Extension Applications** group.
40+
- On Linux, you must be a member of the **himds** group.
3941
- A server connected and registered with Azure Arc-enabled servers.
4042
- You are a member of the [Owner group](../../role-based-access-control/built-in-roles.md#owner) in the subscription or resource group, in order to perform required resource creation and role management steps.
41-
- An Azure Key Vault to store and retrieve your credential. and assign the Azure Arc identity access to the KeyVault.
43+
- An Azure Key Vault to store and retrieve your credential, and assign the Azure Arc identity access to the KeyVault.
4244

4345
- If you don't have a Key Vault created, see [Create Key Vault](../../active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-nonaad.md#create-a-key-vault-).
4446
- To configure access by the managed identity used by the server, see [Grant access for Linux](../../active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-nonaad.md#grant-access) or [Grant access for Windows](../../active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-nonaad.md#grant-access). For step number 5, you are going to enter the name of the Azure Arc-enabled server. To complete this using PowerShell, see [Assign an access policy using PowerShell](../../key-vault/general/assign-access-policy-powershell.md).

0 commit comments

Comments
 (0)