Skip to content

Commit 9abb6a4

Browse files
Merge pull request #272127 from SturgeonMi/patch-30
Update how-to-administrate-data-authentication.md
2 parents 2fe880d + edf0967 commit 9abb6a4

File tree

1 file changed

+24
-12
lines changed

1 file changed

+24
-12
lines changed

articles/machine-learning/how-to-administrate-data-authentication.md

Lines changed: 24 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -23,22 +23,34 @@ Learn how to manage data access and how to authenticate in Azure Machine Learnin
2323
> [!IMPORTANT]
2424
> This article is intended for Azure administrators who want to create the required infrastructure for an Azure Machine Learning solution.
2525
26-
In general, data access from studio involves these checks:
26+
## Credential-based data authentication
27+
In general, credential-based data authentication from studio involves these checks:
28+
* Does the user who is accessing data from the credential-based datastore have been assigned a RBAC role containing `Microsoft.MachineLearningServices/workspaces/datastores/listsecrets/action`?
29+
- This permission is required to retrieve credentials from the datastore on behalf of the user.
30+
* Does the stored credential (service principal, account key, or sas token) have access to the data resource?
31+
32+
## Identity-based data authentication
33+
In general, identity-based data authentication from studio involves these checks:
2734

2835
* Which user wants to access the resources?
29-
- Depending on the storage type, different types of authentication are available, for example
30-
- account key
31-
- token
32-
- service principal
33-
- managed identity
36+
- Depending on the conext the data is being accessed, different types of authentication are available, for example
3437
- user identity
38+
- compute managed identity
39+
- workspace managed identity
40+
- Jobs, including the dataset "Generate Profile" option, run on a compute resource in __your subscription__, and access the data from that location. The compute managed identity needs permission to the storage resource, instead of the identity of the user that submitted the job.
3541
- For authentication based on a user identity, you must know *which* specific user tried to access the storage resource. For more information about _user_ authentication, see [authentication for Azure Machine Learning](how-to-setup-authentication.md). For more information about service-level authentication, see [authentication between Azure Machine Learning and other services](how-to-identity-based-service-authentication.md).
36-
* Does this user have permission?
37-
- Does the user have the correct credentials? If yes, does the service principal, managed identity, etc., have the necessary permissions for that storage resource? Permissions are granted using Azure role-based access controls (Azure RBAC).
42+
* Does this user have permission for reading?
43+
- Does the user identity or the compute managed identity, etc., have the necessary permissions for that storage resource? Permissions are granted using Azure role-based access controls (Azure RBAC).
44+
- The storage account [Reader](../role-based-access-control/built-in-roles.md#reader) reads the storage metadata.
45+
- The [Storage Blob Data Reader](../role-based-access-control/built-in-roles.md#storage-blob-data-reader) reads and lists Blob storage containers and blobs.
46+
- Please find more [Azure built-in roles for storage here](../role-based-access-control/built-in-roles/storage.md).
47+
* Does this user have permission for writing?
48+
- Does the user identity or the compute managed identity, etc., have the necessary permissions for that storage resource? Permissions are granted using Azure role-based access controls (Azure RBAC).
3849
- The storage account [Reader](../role-based-access-control/built-in-roles.md#reader) reads the storage metadata.
39-
- The [Storage Blob Data Reader](../role-based-access-control/built-in-roles.md#storage-blob-data-reader) reads data within a blob container.
40-
- The [Contributor](../role-based-access-control/built-in-roles.md#contributor) allows write access to a storage account.
41-
- More roles may be required, depending on the type of storage.
50+
- The [Storage Blob Data Contributor](../role-based-access-control/built-in-roles.md#storage-blob-data-contributor) reads, writes, and deletes Azure Storage containers and blobs.
51+
- Please find more [Azure built-in roles for storage here](../role-based-access-control/built-in-roles/storage.md).
52+
53+
## Other general checks for authetication
4254
* Where does the access come from?
4355
- User: Is the client IP address in the VNet/subnet range?
4456
- Workspace: Is the workspace public, or does it have a private endpoint in a VNet/subnet?
@@ -111,4 +123,4 @@ __To use ACLs__, the managed identity of the workspace can be assigned access ju
111123

112124
## Next steps
113125

114-
For information about enabling studio in a network, see [Use Azure Machine Learning studio in an Azure Virtual Network](how-to-enable-studio-virtual-network.md).
126+
For information about enabling studio in a network, see [Use Azure Machine Learning studio in an Azure Virtual Network](how-to-enable-studio-virtual-network.md).

0 commit comments

Comments
 (0)