You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Azure HDInsight on AKS offers is secure by default, and there are several methods to address your enterprise security needs. Most of these solutions are activated by default.
13
+
Azure HDInsight on AKS offers security by default, and there are several methods to address your enterprise security needs.
14
14
15
15
This article covers overall security architecture, and security solutions by dividing them into four traditional security pillars: perimeter security, authentication, authorization, and encryption.
16
16
17
17
## Security architecture
18
18
19
-
Enterprise readiness for any software requires stringent security checks to prevent and address threats that may arise. HDInsight on AKS provides a multi-layered security model to protect you on multiple layers. The security architecture uses modern authorization methods using MSI. All the storage access is through MSI, and the database access is through username/password. The password is stored in Azure [Key Vault](../key-vault/general/basic-concepts.md), defined by the customer. This makes the setup robust and secure by default.
19
+
Enterprise readiness for any software requires stringent security checks to prevent and address threats that may arise. HDInsight on AKS provides a multi-layered security model to protect you on multiple layers. The security architecture uses modern authorization methods using MSI. All the storage access is through MSI, and the database access is through username/password. The password is stored in Azure [Key Vault](../key-vault/general/basic-concepts.md), defined by the customer. This feature makes the setup robust and secure by default.
20
20
21
21
The below diagram illustrates a high-level technical architecture of security in HDInsight on AKS.
22
22
@@ -64,13 +64,12 @@ The above roles are from the ARM operations perspective. For more information, s
64
64
65
65
You can allow users, service principals, managed identity to access the cluster through portal or using ARM.
66
66
67
-
This access enables you to
68
-
69
-
* View clusters and manage jobs.
67
+
This access enables
68
+
* View clusters, and manage jobs.
70
69
* Perform all the monitoring and management operations.
71
70
* Perform auto scale operations and update the node count.
72
71
73
-
The access won't be provided for
72
+
The access not provided for
74
73
* Cluster deletion
75
74
76
75
:::image type="content" source="./media/concept-security/cluster-access.png" alt-text="Screenshot showing the cluster data access." border="true" lightbox="./media/concept-security/cluster-access.png":::
0 commit comments