Skip to content

Commit 98730b9

Browse files
authored
Merge pull request #246572 from v-jbasden/v-jbasden-logs-content-inventory-line-74
Adding permissions required, prerequisites, and streamlining of content to Azure AD authentication
2 parents fa3e62e + 218adac commit 98730b9

File tree

2 files changed

+19
-10
lines changed

2 files changed

+19
-10
lines changed

articles/azure-monitor/logs/azure-ad-authentication-logs.md

Lines changed: 17 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,20 @@ These options might be cumbersome and pose a risk because it's difficult to mana
1515

1616
To enable Azure AD integration for Azure Monitor Logs and remove reliance on these shared secrets:
1717

18-
1. [Migrate to Azure Monitor Agent](../agents/azure-monitor-agent-migration.md) from the Log Analytics agents. Azure Monitor Agent doesn't require any keys but instead [requires a system-managed identity](../agents/azure-monitor-agent-overview.md#security).
19-
1. [Disable local authentication for Log Analytics workspaces](#disable-local-authentication-for-log-analytics).
18+
1. [Disable local authentication for Log Analytics workspaces](#disable-local-authentication-for-log-analytics-workspaces).
2019
1. Ensure that only authenticated telemetry is ingested in your Application Insights resources with [Azure AD authentication for Application Insights (preview)](../app/azure-ad-authentication.md).
2120

22-
## Disable local authentication for Log Analytics
21+
## Prerequisites
22+
23+
- [Migrate to Azure Monitor Agent](../agents/azure-monitor-agent-migration.md) from the Log Analytics agents. Azure Monitor Agent doesn't require any keys but instead [requires a system-managed identity](../agents/azure-monitor-agent-overview.md#security).
24+
- [Migrate to the Log Ingestion API](./custom-logs-migrate.md) from the HTTP Data Collector API to send data to Azure Monitor Logs.
25+
26+
## Permissions required
27+
28+
To disable local authentication for a Log Analytics workspace, you need `microsoft.operationalinsights/workspaces/write` permissions on the workspace, as provided by the [Log Analytics Contributor built-in role](./manage-access.md#log-analytics-contributor), for example.
29+
30+
## Disable local authentication for Log Analytics workspaces
2331

24-
After you've removed your reliance on the Log Analytics agent, you can disable local authentication for Log Analytics workspaces. Then you can ingest and query telemetry authenticated exclusively by Azure AD.
2532

2633
Disabling local authentication might limit the availability of some functionality, specifically:
2734

@@ -31,7 +38,7 @@ Disabling local authentication might limit the availability of some functionalit
3138

3239
You can disable local authentication by using Azure Policy. Or you can disable it programmatically through an Azure Resource Manager template, PowerShell, or the Azure CLI.
3340

34-
### Azure Policy
41+
### [Azure Policy](#tab/azure-policy)
3542

3643
Azure Policy for `DisableLocalAuth` won't allow you to create a new Log Analytics workspace unless this property is set to `true`. The policy name is `Log Analytics Workspaces should block non-Azure Active Directory based ingestion`. To apply this policy definition to your subscription, [create a new policy assignment and assign the policy](../../governance/policy/assign-policy-portal.md).
3744

@@ -87,7 +94,7 @@ The policy template definition:
8794
}
8895
```
8996

90-
### Azure Resource Manager
97+
### [Azure Resource Manager](#tab/azure-resource-manager)
9198

9299
The `DisableLocalAuth` property is used to disable any local authentication on your Log Analytics workspace. When set to `true`, this property enforces that Azure AD authentication must be used for all access.
93100

@@ -130,7 +137,7 @@ Use the following Azure Resource Manager template to disable local authenticatio
130137

131138
```
132139

133-
### Azure CLI
140+
### [Azure CLI](#tab/azure-cli)
134141

135142
The `DisableLocalAuth` property is used to disable any local authentication on your Log Analytics workspace. When set to `true`, this property enforces that Azure AD authentication must be used for all access.
136143

@@ -140,7 +147,7 @@ Use the following Azure CLI commands to disable local authentication:
140147
az resource update --ids "/subscriptions/[Your subscription ID]/resourcegroups/[Your resource group]/providers/microsoft.operationalinsights/workspaces/[Your workspace name]--api-version "2021-06-01" --set properties.features.disableLocalAuth=True
141148
```
142149

143-
### PowerShell
150+
### [PowerShell](#tab/powershell)
144151

145152
The `DisableLocalAuth` property is used to disable any local authentication on your Log Analytics workspace. When set to `true`, this property enforces that Azure AD authentication must be used for all access.
146153

@@ -166,5 +173,7 @@ Use the following PowerShell commands to disable local authentication:
166173
$workspace | Set-AzResource -Force
167174
```
168175

176+
---
177+
169178
## Next steps
170179
See [Azure AD authentication for Application Insights (preview)](../app/azure-ad-authentication.md).

articles/azure-monitor/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -908,6 +908,8 @@ items:
908908
href: logs/private-link-configure.md
909909
- name: Collect logs from Event Hubs
910910
href: logs/ingest-logs-event-hub.md
911+
- name: Use Azure AD authentication
912+
href: logs/azure-ad-authentication-logs.md
911913
- name: Troubleshoot data collection
912914
href: logs/data-collection-troubleshoot.md
913915
- name: Data platform
@@ -995,8 +997,6 @@ items:
995997
href: logs/change-pricing-tier.md
996998
- name: Set a daily cap
997999
href: logs/daily-cap.md
998-
- name: Use Azure AD authentication
999-
href: logs/azure-ad-authentication-logs.md
10001000
- name: Manage tables
10011001
displayName: Azure Monitor Logs tables
10021002
items:

0 commit comments

Comments
 (0)