|
| 1 | +--- |
| 2 | +ms.assetid: |
| 3 | +title: Create a user-assigned identity for SCOM Managed Instance |
| 4 | +description: This article describes how to create a user-assigned identity, provide admin access to Azure SQL Managed Instance, and grant get and list access on a key vault. |
| 5 | +author: PriskeyJeronika-MS |
| 6 | +ms.author: v-gjeronika |
| 7 | +manager: jsuri |
| 8 | +ms.date: 05/22/2024 |
| 9 | +ms.service: azure-monitor |
| 10 | +ms.subservice: operations-manager-managed-instance |
| 11 | +ms.topic: how-to |
| 12 | +--- |
| 13 | + |
| 14 | +# Create a user-assigned identity for Azure Monitor SCOM Managed Instance |
| 15 | + |
| 16 | +This article describes how to create a user-assigned identity, provide admin access to Azure SQL Managed Instance, and grant **Get** and **List** access on a key vault. |
| 17 | + |
| 18 | +>[!NOTE] |
| 19 | +> To learn about the Azure Monitor SCOM Managed Instance architecture, see [Azure Monitor SCOM Managed Instance](overview.md). |
| 20 | +
|
| 21 | +## Create a managed service identity |
| 22 | + |
| 23 | +The managed service identity (MSI) provides an identity for applications to use when they're connecting to resources that support Microsoft Entra ID authentication. For SCOM Managed Instance, a managed identity replaces the traditional four System Center Operations Manager service accounts. It's used to access the Azure SQL Managed Instance database. It's also used to access the key vault. |
| 24 | + |
| 25 | +> [!NOTE] |
| 26 | +> - Ensure that you're a contributor in the subscription where you create the MSI. |
| 27 | +> - The MSI must have admin permission on SQL Managed Instance and read permission on the key vault that you use to store the domain account credentials. |
| 28 | +
|
| 29 | +1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Managed Identities**. |
| 30 | + |
| 31 | + :::image type="Managed Identity in Azure portal" source="media/create-user-assigned-identity/azure-portal-managed-identity.png" alt-text="Screenshot that shows the icon for managed identities in the Azure portal."::: |
| 32 | +1. On the **Managed Identities** page, select **Create**. |
| 33 | + |
| 34 | + :::image type="Managed Identity" source="media/create-user-assigned-identity/managed-identities.png" alt-text="Screenshot that shows Managed Identity."::: |
| 35 | + |
| 36 | + The **Create User Assigned Managed Identity** pane opens. |
| 37 | +1. Under **Basics**, do the following: |
| 38 | + - **Project details**: |
| 39 | + - **Subscription**: Select the Azure subscription in which you want to create the SCOM Managed Instance. |
| 40 | + - **Resource group**: Select the resource group in which you want to create the SCOM Managed Instance. |
| 41 | + - **Instance details**: |
| 42 | + - **Region**: Select the region in which you want to create the SCOM Managed Instance. |
| 43 | + - **Name**: Enter a name for the instance. |
| 44 | + |
| 45 | + :::image type="Create user assigned managed identity" source="media/create-user-assigned-identity/create-user-assigned-managed-identity.png" alt-text="Screenshot that shows project and instance details for a user-assigned managed identity."::: |
| 46 | +1. Select **Next: Tags**. |
| 47 | +1. On the **Tags** tab, enter the **Name** value and select the resource. |
| 48 | + |
| 49 | + Tags help you categorize resources and view consolidated billing by applying the same tags to multiple resources and resource groups. For more information, see [Use tags to organize your Azure resources and management hierarchy](/azure/azure-resource-manager/management/tag-resources?wt.mc_id=azuremachinelearning_inproduct_portal_utilities-tags-tab&tabs=json). |
| 50 | +1. Select **Next: Review + create**. |
| 51 | +1. On the **Review + create** tab, review all the information that you provided and select **Create**. |
| 52 | + |
| 53 | + :::image type="Managed identity review" source="media/create-user-assigned-identity/managed-identity-review.png" alt-text="Screenshot that shows the tab for reviewing a managed identity before creation."::: |
| 54 | + |
| 55 | +Your deployment is now created on Azure. You can access the resource and view its details. |
| 56 | + |
| 57 | +### Set the Microsoft Entra admin value in the SQL managed instance |
| 58 | + |
| 59 | +To set the Microsoft Entra admin value in the SQL managed instance that you created in [step 3](create-sql-managed-instance.md), follow these steps: |
| 60 | + |
| 61 | +>[!NOTE] |
| 62 | +>You must have Global Administrator or Privileged Role Administrator permissions for the subscription to perform the following operations. |
| 63 | +
|
| 64 | +>[!Important] |
| 65 | +>Using Groups as Microsoft Entra admin is currently not supported. |
| 66 | +
|
| 67 | +1. Open the SQL managed instance. Under **Settings**, select **Microsoft Entra admin**. |
| 68 | + |
| 69 | + :::image type="Microsoft Entra admin" source="media/create-user-assigned-identity/microsoft-entra-admin.png" alt-text="Screenshot of the pane for Microsoft Entra admin information."::: |
| 70 | + |
| 71 | +1. Select the error-box message to provide **Read** permissions to the SQL managed instance on Microsoft Entra ID. **Grant permissions** pane opens to grant the permissions. |
| 72 | + |
| 73 | + :::image type="Grant permissions" source="media/create-user-assigned-identity/grant-permissions.png" alt-text="Screenshot of grant permissions."::: |
| 74 | + |
| 75 | +1. Select **Grant Permissions** to initiate the operation and once it is completed, you can find a notification for successfully updating the Microsoft Entra read permissions. |
| 76 | + |
| 77 | + :::image type="read permissions" source="media/create-user-assigned-identity/read-permissions.png" alt-text="Screenshot of read permissions."::: |
| 78 | + |
| 79 | +1. Select **Set admin**, and search for your MSI. This MSI is the same one that you provided during the SCOM Managed Instance creation flow. You find the admin added to the SQL managed instance. |
| 80 | + |
| 81 | + :::image type="Microsoft Entra admin" source="media/create-user-assigned-identity/microsoft-entra-inline.png" alt-text="Screenshot of MSI information for Microsoft Entra." lightbox="media/create-user-assigned-identity/microsoft-entra-expanded.png"::: |
| 82 | + |
| 83 | +1. If you get an error after you add a managed identity account, it indicates that read permissions aren't yet provided to your identity. Be sure to provide the necessary permissions before you create your SCOM Managed Instance or else your SCOM Managed Instance creation fails. |
| 84 | + |
| 85 | + :::image type="SQL Microsoft Entra admin" source="media/create-user-assigned-identity/sql-microsoft-entra-inline.png" alt-text="Screenshot that shows successful Microsoft Entra authentication." lightbox="media/create-user-assigned-identity/sql-microsoft-entra-expanded.png"::: |
| 86 | + |
| 87 | +For more information about permissions, see [Directory Readers role in Microsoft Entra ID for Azure SQL](/azure/azure-sql/database/authentication-aad-directory-readers-role?view=azuresql&preserve-view=true). |
| 88 | + |
| 89 | +## Grant permission on the key vault |
| 90 | + |
| 91 | +To grant permission on the key vault that you created in [step 4](create-key-vault.md), follow these steps: |
| 92 | + |
| 93 | +1. Go to the key vault resource that you created in [step 4](create-key-vault.md) and select **Access policies**. |
| 94 | + |
| 95 | +1. On the **Access policies** page, select **Create**. |
| 96 | + |
| 97 | + :::image type="Access Policies" source="media/create-user-assigned-identity/access-policies.png" alt-text="Screenshot that shows the Access policies page."::: |
| 98 | + |
| 99 | +1. On the **Permissions** tab, select the **Get** and **List** options. |
| 100 | + |
| 101 | + :::image type="Create Access policy" source="media/create-user-assigned-identity/create-access-policy.png" alt-text="Screenshot that shows the Create access policy page."::: |
| 102 | + |
| 103 | +1. Select **Next**. |
| 104 | + |
| 105 | +1. On the **Principal** tab, enter the name of the MSI you created. |
| 106 | + |
| 107 | +1. Select **Next**. Select the same MSI that you used in the SQL Managed Instance admin configuration. |
| 108 | + |
| 109 | + :::image type="Principal tab" source="media/create-user-assigned-identity/principal.png" alt-text="Screenshot that shows the Principal tab."::: |
| 110 | + |
| 111 | +1. Select **Next** > **Create**. |
| 112 | + |
| 113 | +## Next steps |
| 114 | + |
| 115 | +- [Create a gMSA account](create-gmsa-account.md) |
0 commit comments