You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/machine-learning/data-science-virtual-machine/dsvm-common-identity.md
+35-29Lines changed: 35 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,68 +8,74 @@ ms.service: data-science-vm
8
8
author: vijetajo
9
9
ms.author: vijetaj
10
10
ms.topic: conceptual
11
-
ms.date: 05/08/2018
11
+
ms.reviewer: franksolomon
12
+
ms.date: 04/10/2024
12
13
---
13
14
14
15
# Set up a common identity on a Data Science Virtual Machine
15
16
16
-
On a Microsoft Azure virtual machine (VM), including a Data Science Virtual Machine (DSVM), you create local user accounts while provisioning the VM. Users then authenticate to the VM by using these credentials. If you have multiple VMs that your users need to access, managing credentials can get very cumbersome. An excellent solution is to deploy common user accounts and management through a standards-based identity provider. Through this approach, you can use a single set of credentials to access multiple resources on Azure, including multiple DSVMs.
17
+
On a Microsoft Azure Virtual Machine (VM), or a Data Science Virtual Machine (DSVM), you create local user accounts while provisioning the VM. Users then authenticate to the VM with credentials for those user accounts. If you have multiple VMs that your users need to access, credential management can become difficult. To solve the problem, you can deploy common user accounts, and manage those accounts, through a standards-based identity provider. You can then use a single set of credentials to access multiple resources on Azure, including multiple DSVMs.
17
18
18
-
Active Directory is a popular identity provider and is supported on Azure both as a cloud service and as an on-premises directory. You can use Microsoft Entra ID or on-premises Active Directory to authenticate users on a standalone DSVM or a cluster of DSVMs in an Azure virtual machine scale set. You do this by joining the DSVM instances to an Active Directory domain.
19
+
Active Directory is a popular identity provider. Azure supports it both as a cloud service and as an on-premises directory. You can use Microsoft Entra ID or on-premises Active Directory to authenticate users on a standalone DSVM, or a cluster of DSVMs, in an Azure virtual machine scale set. To do this, you join the DSVM instances to an Active Directory domain.
19
20
20
21
If you already have Active Directory, you can use it as your common identity provider. If you don't have Active Directory, you can run a managed Active Directory instance on Azure through [Microsoft Entra Domain Services](../../active-directory-domain-services/index.yml).
21
22
22
-
The documentation for [Microsoft Entra ID](../../active-directory/index.yml) provides detailed [management instructions](../../active-directory/hybrid/whatis-hybrid-identity.md), including guidance about connecting Microsoft Entra ID to your on-premises directory if you have one.
23
+
The documentation for [Microsoft Entra ID](../../active-directory/index.yml) provides detailed [management instructions](../../active-directory/hybrid/whatis-hybrid-identity.md), including guidance about how to connect Microsoft Entra ID to your on-premises directory, if you have one.
23
24
24
-
This article describes how to set up a fully managed Active Directory domain service on Azure by using Microsoft Entra Domain Services. You can then join your DSVMs to the managed Active Directory domain. This approach enables users to access a pool of DSVMs (and other Azure resources) through a common user account and credentials.
25
+
This article describes how to set up a fully managed Active Directory domain service on Azure, using Microsoft Entra Domain Services. You can then join your DSVMs to the managed Active Directory domain. This approach allows users to access a pool of DSVMs (and other Azure resources) through a common user account and credentials.
25
26
26
27
## Set up a fully managed Active Directory domain on Azure
27
28
28
-
Microsoft Entra Domain Services makes it simple to manage your identities by providing a fully managed service on Azure. On this Active Directory domain, you manage users and groups. To set up an Azure-hosted Active Directory domain and user accounts in your directory, follow these steps:
29
+
Microsoft Entra Domain Services makes it simple to manage your identities. It provides a fully managed service on Azure. On this Active Directory domain, you manage users and groups. To set up an Azure-hosted Active Directory domain and user accounts in your directory, follow these steps:
29
30
30
-
1. In the Azure portal, add the user to Active Directory:
31
+
1. In the Azure portal, add the user to Active Directory:
31
32
32
-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
33
+
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator
The **User** pane opens, as shown in this screenshot:
40
+
41
+
:::image type="content" source="./media/add-user.png" alt-text="Screenshot showing the add user pane." lightbox="./media/add-user.png":::
41
42
42
-
1. Enter details for the user, such as **Name** and **User name**. The domain name portion of the user name must be either the initial default domain name "[domain name].onmicrosoft.com" or a verified, non-federated [custom domain name](../../active-directory/fundamentals/add-custom-domain.md) such as "contoso.com."
43
+
1. Enter information about the user, such as **Name** and **User name**. The domain name portion of the user name must be either the initial default domain name "[domain name].onmicrosoft.com" or a verified, non-federated [custom domain name](../../active-directory/fundamentals/add-custom-domain.md) such as "contoso.com."
43
44
44
-
1. Copy or otherwise note the generated user password so that you can provide it to the user after this process is complete.
45
+
1. Copy or otherwise note the generated user password. You must provide this password to the user after this process is complete
45
46
46
-
1. Optionally, you can open and fill out the information in **Profile**, **Groups**, or **Directory role** for the user.
47
+
1. Optionally, you can open and fill out the information in **Profile**, **Groups**, or **Directory role** for the user
47
48
48
-
1. Under **User**, select **Create**.
49
+
1. Under **User**, select **Create**
49
50
50
-
1. Securely distribute the generated password to the new user so that they can sign in.
51
+
1. Securely distribute the generated password to the new user so that the user can sign in
51
52
52
-
1. Create a Microsoft Entra Domain Services instance. Follow the instructions in [Enable Microsoft Entra Domain Services using the Azure portal](../../active-directory-domain-services/tutorial-create-instance.md) (the "Create an instance and configure basic settings" section). It's important to update the existing user passwords in Active Directory so that the password in Microsoft Entra Domain Services is synced. It's also important to add DNS to Microsoft Entra Domain Services, as described under "Complete the fields in the Basics window of the Azure portal to create a Microsoft Entra Domain Services instance" in that section.
53
+
1. Create a Microsoft Entra Domain Services instance. Visit [Enable Microsoft Entra Domain Services using the Azure portal](../../active-directory-domain-services/tutorial-create-instance.md) (the "Create an instance and configure basic settings" section) for more information. You need to update the existing user passwords in Active Directory to sync the password in Microsoft Entra Domain Services. You also need to add DNS to Microsoft Entra Domain Services, as described under "Complete the fields in the Basics window of the Azure portal to create a Microsoft Entra Domain Services instance" in that section.
53
54
54
-
1.Create a separate DSVM subnet in the virtual network created in the "Create and configure the virtual network" section of the preceding step.
55
-
1. Create one or more DSVM instances in the DSVM subnet.
56
-
1. Follow the [instructions](../../active-directory-domain-services/join-ubuntu-linux-vm.md) to add the DSVM to Active Directory.
57
-
1. Mount an Azure Files share to host your home or notebook directory so that your workspace can be mounted on any machine. (If you need tight file-level permissions, you'll need Network File System [NFS] running on one or more VMs.)
55
+
1.In the **Create and configure the virtual network** section of the preceding step, create a separate DSVM subnet in the virtual network you created
56
+
1. Create one or more DSVM instances in the DSVM subnet
57
+
1. Follow the [instructions](../../active-directory-domain-services/join-ubuntu-linux-vm.md) to add the DSVM to Active Directory
58
+
1. Mount an Azure Files share to host your home or notebook directory, so that your workspace can be mounted on any machine. If you need tight file-level permissions, you'll need Network File System [NFS] running on one or more VMs
58
59
59
60
1.[Create an Azure Files share](../../storage/files/storage-how-to-create-file-share.md).
60
61
61
-
2. Mount this share on the Linux DSVM. When you select **Connect** for the Azure Files share in your storage account in the Azure portal, the command to run in the bash shell on the Linux DSVM appears. The command looks like this:
62
+
2. Mount this share on the Linux DSVM. When you select **Connect** for the Azure Files share in your storage account in the Azure portal, the command to run in the bash shell on the Linux DSVM appears. The command looks like this:
62
63
63
64
```
64
65
sudo mount -t cifs //[STORAGEACCT].file.core.windows.net/workspace [Your mount point] -o vers=3.0,username=[STORAGEACCT],password=[Access Key or SAS],dir_mode=0777,file_mode=0777,sec=ntlmssp
65
66
```
66
-
1. For example, assume that you mounted your Azure Files share in /data/workspace. Now, create directories for each of your users in the share: /data/workspace/user1, /data/workspace/user2, and so on. Create a `notebooks` directory in each user's workspace.
67
-
1. Create symbolic links for `notebooks` in `$HOME/userx/notebooks/remote`.
67
+
1. For example, assume that you mounted your Azure Files share in the **/data/workspace** directory. Now, create directories for each of your users in the share:
68
+
- /data/workspace/user1
69
+
- /data/workspace/user2
70
+
- etc.
71
+
72
+
Create a `notebooks` directory in the workspace of each user
73
+
1. Create symbolic links for `notebooks` in `$HOME/userx/notebooks/remote`
68
74
69
-
You now have the users in your Active Directory instancehosted in Azure. By using Active Directory credentials, users can sign in to any DSVM (SSH or JupyterHub) that's joined to Microsoft Entra Domain Services. Because the user workspace is on an Azure Files share, users have access to their notebooks and other work from any DSVM when they're using JupyterHub.
75
+
You now have the users in your Active Directory instance, which is hosted in Azure. With Active Directory credentials, users can sign in to any DSVM (SSH or JupyterHub) that's joined to Microsoft Entra Domain Services. Because an Azure Files share hosts the user workspace, users can access their notebooks and other work from any DSVM, when they use JupyterHub.
70
76
71
-
For autoscaling, you can use a virtual machine scale set to create a pool of VMs that are all joined to the domain in this fashion and with the shared disk mounted. Users can sign in to any available machine in the virtual machine scale set and have access to the shared disk where their notebooks are saved.
77
+
For autoscaling, you can use a virtual machine scale set to create a pool of VMs that are all joined to the domain in this fashion, and with the shared disk mounted. Users can sign in to any available machine in the virtual machine scale set, and can access the shared disk where their notebooks are saved.
72
78
73
79
## Next steps
74
80
75
-
*[Securely store credentials to access cloud resources](dsvm-secure-access-keys.md)
81
+
*[Securely store credentials to access cloud resources](dsvm-secure-access-keys.md)
0 commit comments