You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/machine-learning/how-to-create-manage-compute-instance.md
+28-2Lines changed: 28 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -348,13 +348,39 @@ Following is a sample policy to default a shutdown schedule at 10 PM PST.
348
348
349
349
You can assign a system- or user-assigned [managed identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) to a compute instance, to autheticate against other Azure resources such as storage. Using managed identities for authentication helps improve workspace security and management. For example you can allow users to access training data only when logged in to compute instance, or use a common user-assigned managed identity to permit access to a specific storage account.
350
350
351
+
You can create compute instance with managed identity from Azure ML Studio:
352
+
351
353
1. Fill out the form to [create a new compute instance](?tabs=azure-studio#create).
352
354
1. Select **Next: Advanced Settings**.
353
355
1. Enable **Assign a managed identity**.
354
356
1. Select **System-assigned** or **User-assigned** under **Identity type**.
355
357
1. If you selected **User-assigned**, select subscription and name of the identity.
356
-
357
-
When working on the compute instance, the managed identity is used automatically to authenticate against data stores with [identity-based data access enabled](how-to-identity-based-data-access.md).
358
+
359
+
You can use V2 CLI to create compute instance with assign system-assigned managed identity:
360
+
361
+
```azurecli
362
+
az ml compute create --name myinstance --identity-type SystemAssigned --type ComputeInstance --resource-group my-resource-group --workspace-name my-workspace
363
+
```
364
+
365
+
You can also use V2 CLI with yaml file, for example to create a compute instance with user-assigned managed identity:
366
+
367
+
```azurecli
368
+
azure ml compute create --file compute.yaml --resource-group my-resource-group --workspace-name my-workspace
369
+
```
370
+
371
+
The identity definition is contained in compute.yaml file:
Once the managed identity is created, enable [identity-based data access enabled](how-to-identity-based-data-access.md) to your storage accounts for that identity. Then, when you worki on the compute instance, the managed identity is used automatically to authenticate against data stores.
358
384
359
385
You can also use the managed identity manually to authenticate against other Azure resources. For example, to use it to get ARM access token, use following.
0 commit comments