Skip to content

Commit 89b1ed9

Browse files
authored
Merge pull request #213247 from Blackmist/data-managed-identity.md
removing & redirecting file
2 parents 6e4ee84 + 932cb02 commit 89b1ed9

7 files changed

+14
-249
lines changed

articles/machine-learning/.openpublishing.redirection.machine-learning.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,10 @@
2020
"redirect_url": "/azure/machine-learning/how-to-identity-based-service-authentication",
2121
"redirect_document_id": true
2222
},
23+
{
24+
"source_path_from_root": "/articles/machine-learning/how-to-identity-based-data-access.md",
25+
"redirect_url": "/azure/machine-learning/how-to-datastore"
26+
},
2327
{
2428
"source_path_from_root": "/articles/machine-learning/tutorial-convert-ml-experiment-to-production.md",
2529
"redirect_url": "/azure/machine-learning/v1/how-to-convert-ml-experiment-to-production",

articles/machine-learning/concept-enterprise-security.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -58,9 +58,7 @@ We don't recommend that admins revoke the access of the managed identity to the
5858
>
5959
> If your workspace has attached AKS clusters, _and they were created before May 14th, 2021_, __do not delete this Azure AD account__. In this scenario, you must first delete and recreate the AKS cluster before you can delete the Azure AD account.
6060
61-
You can provision the workspace to use user-assigned managed identity, and grant the managed identity additional roles, for example to access your own Azure Container Registry for base Docker images. For more information, see [Use managed identities for access control](how-to-identity-based-service-authentication.md).
62-
63-
You can also configure managed identities for use with Azure Machine Learning compute cluster. This managed identity is independent of workspace managed identity. With a compute cluster, the managed identity is used to access resources such as secured datastores that the user running the training job may not have access to. For more information, see [Identity-based data access to storage services on Azure](how-to-identity-based-data-access.md).
61+
You can provision the workspace to use user-assigned managed identity, and grant the managed identity additional roles, for example to access your own Azure Container Registry for base Docker images. You can also configure managed identities for use with Azure Machine Learning compute cluster. This managed identity is independent of workspace managed identity. With a compute cluster, the managed identity is used to access resources such as secured datastores that the user running the training job may not have access to. For more information, see [Use managed identities for access control](how-to-identity-based-service-authentication.md).
6462

6563
> [!TIP]
6664
> There are some exceptions to the use of Azure AD and Azure RBAC within Azure Machine Learning:

articles/machine-learning/how-to-administrate-data-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ The following table lists what identities should be used for specific scenarios:
6868
Data access is complex and it's important to recognize that there are many pieces to it. For example, accessing data from Azure Machine Learning studio is different than using the SDK. When using the SDK on your local development environment, you're directly accessing data in the cloud. When using studio, you aren't always directly accessing the data store from your client. Studio relies on the workspace to access data on your behalf.
6969

7070
> [!TIP]
71-
> If you need to access data from outside Azure Machine Learning, such as using Azure Storage Explorer, *user* identity is probably what is used. Consult the documentation for the tool or service you are using for specific information. For more information on how Azure Machine Learning works with data, see [Identity-based data access to storage services on Azure](how-to-identity-based-data-access.md).
71+
> If you need to access data from outside Azure Machine Learning, such as using Azure Storage Explorer, *user* identity is probably what is used. Consult the documentation for the tool or service you are using for specific information. For more information on how Azure Machine Learning works with data, see [Setup authentication between AzureML and other services](how-to-identity-based-service-authentication.md).
7272
7373
## Azure Storage Account
7474

articles/machine-learning/how-to-create-manage-compute-instance.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ The data scientist can start, stop, and restart the compute instance. They can u
269269

270270
Define multiple schedules for auto-shutdown and auto-start. For instance, create a schedule to start at 9 AM and stop at 6 PM from Monday-Thursday, and a second schedule to start at 9 AM and stop at 4 PM for Friday. You can create a total of four schedules per compute instance.
271271

272-
Schedules can also be defined for [create on behalf of](#create-on-behalf-of-preview) compute instances. You can create a schedule that creates the compute instance in a stopped state. Stopped compute instances are particularly useful when you create a compute instance on behalf of another user.
272+
Schedules can also be defined for [create on behalf of](#create-on-behalf-of-preview) compute instances. You can create a schedule that creates the compute instance in a stopped state. Stopped compute instances are useful when you create a compute instance on behalf of another user.
273273

274274
### Create a schedule in studio
275275

@@ -430,7 +430,7 @@ Following is a sample policy to default a shutdown schedule at 10 PM PST.
430430

431431
## Assign managed identity (preview)
432432

433-
You can assign a system- or user-assigned [managed identity](https://learn.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) to a compute instance, to autheticate against other Azure resources such as storage. Using managed identities for authentication helps improve workspace security and management. For example you can allow users to access training data only when logged in to compute instance, or use a common user-assigned managed identity to permit access to a specific storage account.
433+
You can assign a system- or user-assigned [managed identity](/azure/active-directory/managed-identities-azure-resources/overview) to a compute instance, to authenticate against other Azure resources such as storage. Using managed identities for authentication helps improve workspace security and management. For example, you can allow users to access training data only when logged in to a compute instance. Or use a common user-assigned managed identity to permit access to a specific storage account.
434434

435435
You can create compute instance with managed identity from Azure ML Studio:
436436

@@ -464,9 +464,9 @@ identity:
464464
- resource_id: identity_resource_id
465465
```
466466
467-
Once the managed identity is created, enable [identity-based data access enabled](how-to-identity-based-data-access.md) to your storage accounts for that identity. Then, when you worki on the compute instance, the managed identity is used automatically to authenticate against data stores.
467+
Once the managed identity is created, enable [identity-based data access enabled](how-to-datastore.md) to your storage accounts for that identity. Then, when you work on the compute instance, the managed identity is used automatically to authenticate against data stores.
468468
469-
You can also use the managed identity manually to authenticate against other Azure resources. For example, to use it to get ARM access token, use following.
469+
You can also use the managed identity manually to authenticate against other Azure resources. The following example shows how to use it to get an Azure Resource Manager access token:
470470
471471
```python
472472
import requests

0 commit comments

Comments
 (0)