Skip to content

Commit 92feea5

Browse files
authored
Merge pull request #271803 from fbsolo-ms1/tutorial-update-branch
Freshness update for dsvm-common-identity.md . . .
2 parents a66b78f + a72851d commit 92feea5

File tree

1 file changed

+35
-29
lines changed

1 file changed

+35
-29
lines changed

articles/machine-learning/data-science-virtual-machine/dsvm-common-identity.md

Lines changed: 35 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -8,68 +8,74 @@ ms.service: data-science-vm
88
author: vijetajo
99
ms.author: vijetaj
1010
ms.topic: conceptual
11-
ms.date: 05/08/2018
11+
ms.reviewer: franksolomon
12+
ms.date: 04/10/2024
1213
---
1314

1415
# Set up a common identity on a Data Science Virtual Machine
1516

16-
On a Microsoft Azure virtual machine (VM), including a Data Science Virtual Machine (DSVM), you create local user accounts while provisioning the VM. Users then authenticate to the VM by using these credentials. If you have multiple VMs that your users need to access, managing credentials can get very cumbersome. An excellent solution is to deploy common user accounts and management through a standards-based identity provider. Through this approach, you can use a single set of credentials to access multiple resources on Azure, including multiple DSVMs.
17+
On a Microsoft Azure Virtual Machine (VM), or a Data Science Virtual Machine (DSVM), you create local user accounts while provisioning the VM. Users then authenticate to the VM with credentials for those user accounts. If you have multiple VMs that your users need to access, credential management can become difficult. To solve the problem, you can deploy common user accounts, and manage those accounts, through a standards-based identity provider. You can then use a single set of credentials to access multiple resources on Azure, including multiple DSVMs.
1718

18-
Active Directory is a popular identity provider and is supported on Azure both as a cloud service and as an on-premises directory. You can use Microsoft Entra ID or on-premises Active Directory to authenticate users on a standalone DSVM or a cluster of DSVMs in an Azure virtual machine scale set. You do this by joining the DSVM instances to an Active Directory domain.
19+
Active Directory is a popular identity provider. Azure supports it both as a cloud service and as an on-premises directory. You can use Microsoft Entra ID or on-premises Active Directory to authenticate users on a standalone DSVM, or a cluster of DSVMs, in an Azure virtual machine scale set. To do this, you join the DSVM instances to an Active Directory domain.
1920

2021
If you already have Active Directory, you can use it as your common identity provider. If you don't have Active Directory, you can run a managed Active Directory instance on Azure through [Microsoft Entra Domain Services](../../active-directory-domain-services/index.yml).
2122

22-
The documentation for [Microsoft Entra ID](../../active-directory/index.yml) provides detailed [management instructions](../../active-directory/hybrid/whatis-hybrid-identity.md), including guidance about connecting Microsoft Entra ID to your on-premises directory if you have one.
23+
The documentation for [Microsoft Entra ID](../../active-directory/index.yml) provides detailed [management instructions](../../active-directory/hybrid/whatis-hybrid-identity.md), including guidance about how to connect Microsoft Entra ID to your on-premises directory, if you have one.
2324

24-
This article describes how to set up a fully managed Active Directory domain service on Azure by using Microsoft Entra Domain Services. You can then join your DSVMs to the managed Active Directory domain. This approach enables users to access a pool of DSVMs (and other Azure resources) through a common user account and credentials.
25+
This article describes how to set up a fully managed Active Directory domain service on Azure, using Microsoft Entra Domain Services. You can then join your DSVMs to the managed Active Directory domain. This approach allows users to access a pool of DSVMs (and other Azure resources) through a common user account and credentials.
2526

2627
## Set up a fully managed Active Directory domain on Azure
2728

28-
Microsoft Entra Domain Services makes it simple to manage your identities by providing a fully managed service on Azure. On this Active Directory domain, you manage users and groups. To set up an Azure-hosted Active Directory domain and user accounts in your directory, follow these steps:
29+
Microsoft Entra Domain Services makes it simple to manage your identities. It provides a fully managed service on Azure. On this Active Directory domain, you manage users and groups. To set up an Azure-hosted Active Directory domain and user accounts in your directory, follow these steps:
2930

30-
1. In the Azure portal, add the user to Active Directory:
31+
1. In the Azure portal, add the user to Active Directory:
3132

32-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
33+
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator
3334

34-
1. Browse to **Microsoft Entra ID** > **Users** > **All users**.
35+
1. Browse to **Microsoft Entra ID** > **Users** > **All users**
3536

36-
1. Select **New user**.
37+
1. Select **New user**
3738

38-
The **User** pane opens:
39-
40-
![The "User" pane](./media/add-user.png)
39+
The **User** pane opens, as shown in this screenshot:
40+
41+
:::image type="content" source="./media/add-user.png" alt-text="Screenshot showing the add user pane." lightbox="./media/add-user.png":::
4142

42-
1. Enter details for the user, such as **Name** and **User name**. The domain name portion of the user name must be either the initial default domain name "[domain name].onmicrosoft.com" or a verified, non-federated [custom domain name](../../active-directory/fundamentals/add-custom-domain.md) such as "contoso.com."
43+
1. Enter information about the user, such as **Name** and **User name**. The domain name portion of the user name must be either the initial default domain name "[domain name].onmicrosoft.com" or a verified, non-federated [custom domain name](../../active-directory/fundamentals/add-custom-domain.md) such as "contoso.com."
4344

44-
1. Copy or otherwise note the generated user password so that you can provide it to the user after this process is complete.
45+
1. Copy or otherwise note the generated user password. You must provide this password to the user after this process is complete
4546

46-
1. Optionally, you can open and fill out the information in **Profile**, **Groups**, or **Directory role** for the user.
47+
1. Optionally, you can open and fill out the information in **Profile**, **Groups**, or **Directory role** for the user
4748

48-
1. Under **User**, select **Create**.
49+
1. Under **User**, select **Create**
4950

50-
1. Securely distribute the generated password to the new user so that they can sign in.
51+
1. Securely distribute the generated password to the new user so that the user can sign in
5152

52-
1. Create a Microsoft Entra Domain Services instance. Follow the instructions in [Enable Microsoft Entra Domain Services using the Azure portal](../../active-directory-domain-services/tutorial-create-instance.md) (the "Create an instance and configure basic settings" section). It's important to update the existing user passwords in Active Directory so that the password in Microsoft Entra Domain Services is synced. It's also important to add DNS to Microsoft Entra Domain Services, as described under "Complete the fields in the Basics window of the Azure portal to create a Microsoft Entra Domain Services instance" in that section.
53+
1. Create a Microsoft Entra Domain Services instance. Visit [Enable Microsoft Entra Domain Services using the Azure portal](../../active-directory-domain-services/tutorial-create-instance.md) (the "Create an instance and configure basic settings" section) for more information. You need to update the existing user passwords in Active Directory to sync the password in Microsoft Entra Domain Services. You also need to add DNS to Microsoft Entra Domain Services, as described under "Complete the fields in the Basics window of the Azure portal to create a Microsoft Entra Domain Services instance" in that section.
5354

54-
1. Create a separate DSVM subnet in the virtual network created in the "Create and configure the virtual network" section of the preceding step.
55-
1. Create one or more DSVM instances in the DSVM subnet.
56-
1. Follow the [instructions](../../active-directory-domain-services/join-ubuntu-linux-vm.md) to add the DSVM to Active Directory.
57-
1. Mount an Azure Files share to host your home or notebook directory so that your workspace can be mounted on any machine. (If you need tight file-level permissions, you'll need Network File System [NFS] running on one or more VMs.)
55+
1. In the **Create and configure the virtual network** section of the preceding step, create a separate DSVM subnet in the virtual network you created
56+
1. Create one or more DSVM instances in the DSVM subnet
57+
1. Follow the [instructions](../../active-directory-domain-services/join-ubuntu-linux-vm.md) to add the DSVM to Active Directory
58+
1. Mount an Azure Files share to host your home or notebook directory, so that your workspace can be mounted on any machine. If you need tight file-level permissions, you'll need Network File System [NFS] running on one or more VMs
5859

5960
1. [Create an Azure Files share](../../storage/files/storage-how-to-create-file-share.md).
6061

61-
2. Mount this share on the Linux DSVM. When you select **Connect** for the Azure Files share in your storage account in the Azure portal, the command to run in the bash shell on the Linux DSVM appears. The command looks like this:
62+
2. Mount this share on the Linux DSVM. When you select **Connect** for the Azure Files share in your storage account in the Azure portal, the command to run in the bash shell on the Linux DSVM appears. The command looks like this:
6263

6364
```
6465
sudo mount -t cifs //[STORAGEACCT].file.core.windows.net/workspace [Your mount point] -o vers=3.0,username=[STORAGEACCT],password=[Access Key or SAS],dir_mode=0777,file_mode=0777,sec=ntlmssp
6566
```
66-
1. For example, assume that you mounted your Azure Files share in /data/workspace. Now, create directories for each of your users in the share: /data/workspace/user1, /data/workspace/user2, and so on. Create a `notebooks` directory in each user's workspace.
67-
1. Create symbolic links for `notebooks` in `$HOME/userx/notebooks/remote`.
67+
1. For example, assume that you mounted your Azure Files share in the **/data/workspace** directory. Now, create directories for each of your users in the share:
68+
- /data/workspace/user1
69+
- /data/workspace/user2
70+
- etc.
71+
72+
Create a `notebooks` directory in the workspace of each user
73+
1. Create symbolic links for `notebooks` in `$HOME/userx/notebooks/remote`
6874

69-
You now have the users in your Active Directory instance hosted in Azure. By using Active Directory credentials, users can sign in to any DSVM (SSH or JupyterHub) that's joined to Microsoft Entra Domain Services. Because the user workspace is on an Azure Files share, users have access to their notebooks and other work from any DSVM when they're using JupyterHub.
75+
You now have the users in your Active Directory instance, which is hosted in Azure. With Active Directory credentials, users can sign in to any DSVM (SSH or JupyterHub) that's joined to Microsoft Entra Domain Services. Because an Azure Files share hosts the user workspace, users can access their notebooks and other work from any DSVM, when they use JupyterHub.
7076

71-
For autoscaling, you can use a virtual machine scale set to create a pool of VMs that are all joined to the domain in this fashion and with the shared disk mounted. Users can sign in to any available machine in the virtual machine scale set and have access to the shared disk where their notebooks are saved.
77+
For autoscaling, you can use a virtual machine scale set to create a pool of VMs that are all joined to the domain in this fashion, and with the shared disk mounted. Users can sign in to any available machine in the virtual machine scale set, and can access the shared disk where their notebooks are saved.
7278

7379
## Next steps
7480

75-
* [Securely store credentials to access cloud resources](dsvm-secure-access-keys.md)
81+
* [Securely store credentials to access cloud resources](dsvm-secure-access-keys.md)

0 commit comments

Comments
 (0)