Skip to content

Commit d5b2c05

Browse files
Merge pull request #284196 from sdgilley/patch-25
Update how-to-use-secrets-in-runs.md
2 parents 6b22970 + f20dd8d commit d5b2c05

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/machine-learning/how-to-use-secrets-in-runs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,9 +40,9 @@ Before following the steps in this article, make sure you have the following pre
4040
> [!TIP]
4141
> You do not have to use same key vault as the workspace.
4242
43-
* An Azure Machine Learning compute cluster configured to use a [managed identity](how-to-create-attach-compute-cluster.md?tabs=azure-studio#set-up-managed-identity). The cluster can be configured for either a system-assigned or user-assigned managed identity.
43+
* (Optional) An Azure Machine Learning compute cluster configured to use a [managed identity](how-to-create-attach-compute-cluster.md?tabs=azure-studio#set-up-managed-identity). The cluster can be configured for either a system-assigned or user-assigned managed identity.
4444

45-
* Grant the managed identity for the compute cluster access to the secrets stored in key vault. The method used to grant access depends on how your key vault is configured:
45+
* If your job will run on a compute cluster, grant the managed identity for the compute cluster access to the secrets stored in key vault. Or, if the job will run on serverless compute, grant the managed identity specified for the job access to the secrets. The method used to grant access depends on how your key vault is configured:
4646

4747
* [Azure role-based access control (Azure RBAC)](/azure/key-vault/general/rbac-guide): When configured for Azure RBAC, add the managed identity to the __Key Vault Secrets User__ role on your key vault.
4848
* [Azure Key Vault access policy](/azure/key-vault/general/assign-access-policy): When configured to use access policies, add a new policy that grants the __get__ operation for secrets and assign it to the managed identity.

articles/machine-learning/how-to-use-serverless-compute.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ When you [view your usage and quota in the Azure portal](how-to-manage-quotas.md
8181

8282
## Identity support and credential pass through
8383

84-
* **User credential pass through** : Serverless compute fully supports user credential pass through. The user token of the user who is submitting the job is used for storage access. These credentials are from your Microsoft Entra ID.
84+
* **User credential pass through** : Serverless compute fully supports user credential pass through. The user token of the user who is submitting the job is used for storage access. These credentials are from your Microsoft Entra ID.
8585

8686
# [Python SDK](#tab/python)
8787

@@ -122,7 +122,7 @@ When you [view your usage and quota in the Azure portal](how-to-manage-quotas.md
122122

123123
---
124124

125-
* **User-assigned managed identity** : When you have a workspace configured with [user-assigned managed identity](how-to-identity-based-service-authentication.md#workspace), you can use that identity with the serverless job for storage access.
125+
* **User-assigned managed identity** : When you have a workspace configured with [user-assigned managed identity](how-to-identity-based-service-authentication.md#workspace), you can use that identity with the serverless job for storage access. To access secrets, see [Use authentication credential secrets in Azure Machine Learning jobs](how-to-use-secrets-in-runs.md).
126126

127127
# [Python SDK](#tab/python)
128128

0 commit comments

Comments
 (0)