Skip to content

Commit 96af48e

Browse files
committed
Refocus article on managed identity on Operator Insights use
1 parent 73728eb commit 96af48e

File tree

4 files changed

+21
-23
lines changed

4 files changed

+21
-23
lines changed

articles/operator-insights/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,6 @@
1515
- name: Concepts
1616
expanded: false
1717
items:
18-
- name: Managed identity
19-
href: managed-identity.md
2018
- name: Business continuity disaster recovery
2119
href: business-continuity-disaster-recovery.md
2220
- name: Data quality and data monitoring
@@ -29,6 +27,8 @@
2927
href: concept-mcc-data-product.md
3028
- name: Monitoring - Affirmed MCC Data Product
3129
href: concept-monitoring-mcc-data-product.md
30+
- name: Managed identity
31+
href: managed-identity.md
3232
- name: How-to guides
3333
expanded: false
3434
items:

articles/operator-insights/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,6 @@ landingContent:
2929
url: operator-insights-faq.yml
3030
- linkListType: concept
3131
links:
32-
- text: Managed identity
33-
url: managed-identity.md
3432
- text: Business continuity and disaster recovery
3533
url: business-continuity-disaster-recovery.md
3634
- text: Data quality and data monitoring
@@ -43,6 +41,8 @@ landingContent:
4341
url: concept-mcc-data-product.md
4442
- text: Monitoring - Affirmed MCC Data Product
4543
url: concept-monitoring-mcc-data-product.md
44+
- text: Managed identity
45+
url: managed-identity.md
4646

4747
# Card
4848
- title: Get started with Azure Operator Insights

articles/operator-insights/managed-identity.md

Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -6,44 +6,42 @@ ms.author: rdunstan
66
ms.reviewer: rathishr
77
ms.service: operator-insights
88
ms.topic: concept-article
9-
ms.date: 10/18/2023
9+
ms.date: 01/23/2024
1010
---
1111

1212
# Managed identity for Azure Operator Insights
1313

1414
This article helps you understand managed identity (formerly known as Managed Service Identity/MSI) and how it works in Azure Operator Insights.
1515

16-
## Overview
16+
## Overview of managed identities
1717

18-
Managed identities eliminate the need to manage credentials. Managed identities provide an identity for the service instance when connecting to resources that support Microsoft Entra ID (formerly Azure Active Directory) authentication. For example, the service can use a managed identity to access resources like [Azure Key Vault](../key-vault/general/overview.md), where data admins can securely store credentials or access storage accounts. The service uses the managed identity to obtain Microsoft Entra ID (formerly Azure Active Directory) tokens.
18+
Managed identities eliminate the need to manage credentials. Managed identities provide an identity for service instances to use when connecting to resources that support Microsoft Entra ID (formerly Azure Active Directory) authentication. For example, the service can use a managed identity to access resources like [Azure Key Vault](../key-vault/general/overview.md), where data admins can securely store credentials or access storage accounts. The service uses the managed identity to obtain Microsoft Entra ID tokens.
1919

20-
There are two types of supported managed identities:
20+
Microsoft Entra ID offers two types of managed identities:
2121

22-
- **System-assigned:** You can enable a managed identity directly on a service instance. When you allow a system-assigned managed identity during the creation of the service, an identity is created in Microsoft Entra ID (formerly Azure Active Directory) tied to that service instance's lifecycle. By design, only that Azure resource can use this identity to request tokens from Azure AD. So when the resource is deleted, Azure automatically deletes the identity for you.
22+
- **System-assigned:** You can enable a managed identity directly on a resource. When you enable a system-assigned managed identity during the creation of the resource, an identity is created in Microsoft Entra ID tied to that resource's lifecycle. By design, only that Azure resource can use this identity to request tokens from Microsoft Entra ID. When the resource is deleted, Azure automatically deletes the identity for you.
2323

24-
- **User-assigned:** You can also create a managed identity as a standalone Azure resource. You can [create a user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-portal.md). In user-assigned managed identities, the identity is managed separately from the resources that use it.
24+
- **User-assigned:** You can also create a managed identity as a standalone resource and associate it with other resources. The identity is managed separately from the resources that use it.
2525

26-
Managed identity provides the below benefits:
26+
For more general information about managed identities, see [What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview).
2727

28-
- [Store credential in Azure Key Vault](../data-factory/store-credentials-in-key-vault.md), in which case-managed identity is used for Azure Key Vault authentication.
28+
## User-assigned managed identities in Azure Operator Insights
2929

30-
- Access data stores or computes using managed identity authentication, including Azure Blob storage, Azure Data Explorer, Azure Data Lake Storage Gen1, Azure Data Lake Storage Gen2, Azure SQL Database, Azure SQL Managed Instance, Azure Synapse Analytics, REST, Databricks activity, Web activity, and more.
30+
Azure Operator Insights Data Products use a user-assigned managed identity for:
3131

32-
- Managed identity is also used to encrypt/decrypt data and metadata using the customer-managed key stored in Azure Key Vault, providing double encryption.
32+
- Encryption with customer-managed keys, also called CMK-based encryption.
33+
- Integration with Microsoft Purview. The managed identity allows the Data Product to manage the collection and the data catalog within the collection.
3334

34-
## System-assigned managed identity
35+
When you [create a Data Product](data-product-create.md), you set up the managed identity and associate it with the Data Product. To use the managed identity with Microsoft Purview, you must also [grant the managed identity the appropriate permissions in Microsoft Purview](purview-setup.md#access-and-set-up-your-microsoft-purview-account).
3536

36-
>[!NOTE]
37-
> System-assigned managed identity is not currently supported with Azure Operator Insights Data Product Resource.
37+
You use Microsoft Entra ID to manage user-assigned managed identities. For more information, see [Create, list, delete, or assign a role to a user-assigned managed identity using the Azure portal](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities).
3838

39-
## User-assigned managed identity
39+
## System-assigned managed identities in Azure Operator Insights
4040

41-
You can create, delete, manage user-assigned managed identities in Microsoft Entra ID (formerly Azure Active Directory). For more details refer to [Create, list, delete, or assign a role to a user-assigned managed identity using the Azure portal](../active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-portal.md).
42-
43-
Once you have created a user-assigned managed identity, you must supply the credentials during or after [Azure Operator Insights Data Product Resource creation](../data-factory/credentials.md).
41+
Azure Operator Insights doesn't support system-assigned managed identities.
4442

4543
## Related content
4644

4745
See [Store credential in Azure Key Vault](../data-factory/store-credentials-in-key-vault.md) for information about when and how to use managed identity.
4846

49-
See [Managed Identities for Azure Resources Overview](../active-directory/managed-identities-azure-resources/overview.md) for more background on managed identities for Azure resources, on which managed identity in Azure Operator Insights is based.
47+
See [What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview) for more background on managed identities for Azure resources, on which managed identity in Azure Operator Insights is based.

articles/operator-insights/purview-setup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ You can access your Purview account through the Azure portal by going to `https:
3131

3232
To begin to catalog a data product in this account, [create a collection](../purview/how-to-create-and-manage-collections.md) to hold the Data Product.
3333

34-
Provide your User-Assigned-Managed-Identity (UAMI) with necessary roles in the Microsoft Purview compliance portal. The UAMI you enter is the one that was set up when creating an AOI Data Product. For information on how to set up this UAMI, refer to [Set up user-assigned managed identity](data-product-create.md#set-up-user-assigned-managed-identity). At the desired collection, assign this UAMI to the **Collection admin**, **Data source admin**, and **Data curator** roles. Alternately, you can apply the UAMI at the root collection/account level. All collections would inherit these role assignments by default.
34+
Provide the user-assigned managed identity (UAMI) for your Azure Operator Insights Data Product with necessary roles in the Microsoft Purview compliance portal. This UAMI was set up when the Data Product was created. For information on how to set up this UAMI, see [Set up user-assigned managed identity](data-product-create.md#set-up-user-assigned-managed-identity). At the desired collection, assign this UAMI to the **Collection admin**, **Data source admin**, and **Data curator** roles. Alternately, you can apply the UAMI at the root collection/account level. All collections would inherit these role assignments by default.
3535

3636
:::image type="content" source="media/purview-setup/data-product-role-assignments.png" alt-text="Screenshot of collections with Role assignment tab open and icon to add the UAMI to the collection admins role highlighted.":::
3737

0 commit comments

Comments
 (0)