You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/machine-learning/how-to-administrate-data-authentication.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ In general, identity-based data authentication involves these checks:
47
47
* Does this user have permission for reading?
48
48
- Does the user identity or the compute managed identity have the necessary permissions for that storage resource? Permissions are granted by using Azure RBAC.
49
49
- The storage account [Reader](../role-based-access-control/built-in-roles.md#reader) reads the storage metadata.
50
-
- The [Storage Blob Data Reader](../role-based-access-control/built-in-roles.md#storage-blob-data-reader) reads and lists Blob storage containers and blobs.
50
+
- The [Storage Blob Data Reader](../role-based-access-control/built-in-roles.md#storage-blob-data-reader) reads and lists storage containers and blobs.
51
51
- For more information, see [Azure built-in roles for storage](../role-based-access-control/built-in-roles/storage.md).
52
52
* Does this user have permission for writing?
53
53
- Does the user identity or the compute managed identity have the necessary permissions for that storage resource? Permissions are granted by using Azure RBAC.
@@ -93,24 +93,24 @@ For SDK V1, data authentication in a job always uses compute MSI. For SDK V2, da
93
93
94
94
The following information helps you set up data authentication to access data behind a virtual network from a Machine Learning workspace.
95
95
96
-
### Add permissions of a Storage account to a Machine Learning workspace managed identity
96
+
### Add permissions of a storage account to a Machine Learning workspace managed identity
97
97
98
-
When you use a Storage account from the studio, if you want to see Dataset Preview, you must enable **Use workspace managed identity for data preview and profiling in Azure Machine Learning studio** in the datastore setting. Then add the following Azure RBAC roles of the storage account to the workspace managed identity:
98
+
When you use a storage account from the studio, if you want to see Dataset Preview, you must enable **Use workspace managed identity for data preview and profiling in Azure Machine Learning studio** in the datastore setting. Then add the following Azure RBAC roles of the storage account to the workspace managed identity:
99
99
100
100
*[Blob Data Reader](../role-based-access-control/built-in-roles.md#storage-blob-data-reader)
101
101
* If the storage account uses a private endpoint to connect to the virtual network, you must grant the [Reader](../role-based-access-control/built-in-roles.md#reader) role for the storage account private endpoint to the managed identity.
102
102
103
103
For more information, see [Use Azure Machine Learning studio in an Azure virtual network](how-to-enable-studio-virtual-network.md).
104
104
105
-
The following sections explain the limitations of using a Storage account, with your workspace, in a virtual network.
105
+
The following sections explain the limitations of using a storage account, with your workspace, in a virtual network.
106
106
107
-
### Secure communication with a Storage account
107
+
### Secure communication with a storage account
108
108
109
-
To secure communication between Machine Learning and Storage accounts, configure the storage to [grant access to trusted Azure services](../storage/common/storage-network-security.md#grant-access-to-trusted-azure-services).
109
+
To secure communication between Machine Learning and storage accounts, configure the storage to [grant access to trusted Azure services](../storage/common/storage-network-security.md#grant-access-to-trusted-azure-services).
110
110
111
111
### Azure Storage firewall
112
112
113
-
When a Storage account is located behind a virtual network, the storage firewall can normally be used to allow your client to directly connect over the internet. However, when you use the studio, your client doesn't connect to the storage account. The Machine Learning service that makes the request connects to the storage account. The IP address of the service isn't documented, and it changes frequently. Enabling the storage firewall won't allow the studio to access the storage account in a virtual network configuration.
113
+
When a storage account is located behind a virtual network, the storage firewall can normally be used to allow your client to directly connect over the internet. However, when you use the studio, your client doesn't connect to the storage account. The Machine Learning service that makes the request connects to the storage account. The IP address of the service isn't documented, and it changes frequently. Enabling the storage firewall won't allow the studio to access the storage account in a virtual network configuration.
114
114
115
115
### Azure Storage endpoint type
116
116
@@ -127,7 +127,7 @@ When you use Azure Data Lake Storage Gen1 as a datastore, you can only use POSIX
127
127
128
128
When you use Azure Data Lake Storage Gen2 as a datastore, you can use both Azure RBAC and POSIX-style access control lists (ACLs) to control data access inside a virtual network.
129
129
130
-
-**To use Azure RBAC**: Follow the steps described in this [Datastore: Azure Storage account](how-to-enable-studio-virtual-network.md#datastore-azure-storage-account) article section. Data Lake Storage Gen2 is based on Azure Storage, so the same steps apply when you use Azure RBAC.
130
+
-**To use Azure RBAC**: Follow the steps described in [Datastore: Azure Storage account](how-to-enable-studio-virtual-network.md#datastore-azure-storage-account). Data Lake Storage Gen2 is based on Azure Storage, so the same steps apply when you use Azure RBAC.
131
131
-**To use ACLs**: The managed identity of the workspace can be assigned access like any other security principal. For more information, see [Access control lists on files and directories](../storage/blobs/data-lake-storage-access-control.md#access-control-lists-on-files-and-directories).
0 commit comments