You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/connect-to-cloud/howto-configure-fabric-real-time-intelligence.md
+252-8Lines changed: 252 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: patricka
6
6
ms.service: azure-iot-operations
7
7
ms.subservice: azure-data-flows
8
8
ms.topic: how-to
9
-
ms.date: 06/12/2025
9
+
ms.date: 06/17/2025
10
10
ai-usage: ai-assisted
11
11
12
12
#CustomerIntent: As an operator, I want to understand how to configure data flow endpoints for Microsoft Fabric Real-Time Intelligence in Azure IoT Operations so that I can send real-time data to Microsoft Fabric.
@@ -48,16 +48,12 @@ Retrieve the [Kafka-compatible connection details for the custom endpoint](/fabr
48
48
49
49
## Create a Microsoft Fabric Real-Time Intelligence data flow endpoint
50
50
51
-
To configure a data flow endpoint for Microsoft Fabric Real-Time Intelligence, you need to use Simple Authentication and Security Layer (SASL) based authentication.
52
-
53
-
Azure Key Vault is the recommended way to sync the connection string to the Kubernetes cluster so that it can be referenced in the data flow. [Secure settings](../deploy-iot-ops/howto-enable-secure-settings.md) must be enabled to configure this endpoint using the operations experience web UI.
51
+
Microsoft Fabric Real-Time Intelligence, supports Simple Authentication and Security Layer (SASL), System-assigned managed identity, and User-assigned managed identity authentication methods. The following sections describe how to configure a data flow endpoint for Microsoft Fabric Real-Time Intelligence using these authentication methods. For details on the available authentication methods, see [Available authentication methods](#available-authentication-methods).
54
52
55
53
# [Operations experience](#tab/portal)
56
54
57
55
1. In the IoT Operations experience portal, select the **Data flow endpoints** tab.
58
56
1. Under **Create new data flow endpoint**, select **Microsoft Fabric Real-Time Intelligence** > **New**.
59
-
60
-
61
57
1. Enter the following settings for the endpoint.
62
58
63
59
:::image type="content" source="media/howto-configure-fabric-real-time-intelligence/event-stream-sasl.png" alt-text="Screenshot using operations experience to create a new Fabric Real-Time Intelligence data flow endpoint.":::
@@ -66,7 +62,7 @@ Azure Key Vault is the recommended way to sync the connection string to the Kube
| Host | The hostname of the event stream custom endpoint in the format `*.servicebus.windows.net:9093`. Use the bootstrap server address noted previously. |
69
-
| Authentication method |*SASL* is currently the only supported authentication method. |
65
+
| Authentication method |*SASL* is currently the only supported authentication method in operations experience. Use Azure CLI, Bicep, or Kubernetes manifests to configure other authentication methods. |
70
66
| SASL type | Choose *Plain*|
71
67
| Synced secret name | Enter a name for the synced secret. A Kubernetes secret with this name is created on the cluster. |
72
68
@@ -89,7 +85,7 @@ Azure Key Vault is the recommended way to sync the connection string to the Kube
89
85
Use the [az iot ops dataflow endpoint create fabric-realtime](/cli/azure/iot/ops/dataflow/endpoint/apply#az-iot-ops-dataflow-endpoint-create-fabric-realtime) command to create or replace a Microsoft Fabric Real-Time Intelligence data flow endpoint.
The following authentication methods are available for Fabric Real-Time Intelligence data flow endpoints.
187
+
188
+
### System-assigned managed identity
189
+
190
+
Before you configure the data flow endpoint, assign a role to the Azure IoT Operations managed identity that grants permission to connect to the Kafka broker:
191
+
192
+
1. In Azure portal, go to your Azure IoT Operations instance and select **Overview**.
193
+
1. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*.
194
+
1. Go to the cloud resource you need to grant permissions. For example, go to the Event Hubs namespace > **Access control (IAM)** > **Add role assignment**.
195
+
1. On the **Role** tab, select an appropriate role.
196
+
1. On the **Members** tab, for **Assign access to**, select **User, group, or service principal** option, then select **+ Select members** and search for the Azure IoT Operations managed identity. For example, *azure-iot-operations-xxxx7*.
197
+
198
+
Then, configure the data flow endpoint with system-assigned managed identity settings.
199
+
200
+
# [Operations experience](#tab/portal)
201
+
202
+
> [!NOTE] Supported?
203
+
204
+
In the operations experience data flow endpoint settings page, select the **Basic** tab then choose **Authentication method** > **System assigned managed identity**.
205
+
206
+
# [Azure CLI](#tab/cli)
207
+
208
+
#### Create or replace
209
+
210
+
Use the [az iot ops dataflow endpoint create](/cli/azure/iot/ops/dataflow/endpoint/apply#az-iot-ops-dataflow-endpoint-create) command with the `--auth-type` parameter set to `SystemAssignedManagedIdentity` for system-assigned managed identity authentication.
Use the [az iot ops dataflow endpoint apply](/cli/azure/iot/ops/dataflow/endpoint/apply#az-iot-ops-dataflow-endpoint-apply) command with the `--config-file` parameter.
219
+
220
+
In this example, assume a configuration file with the following content:
To use user-assigned managed identity for authentication, you must first deploy Azure IoT Operations with secure settings enabled. Then you need to [set up a user-assigned managed identity for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections). To learn more, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
264
+
265
+
Before you configure the data flow endpoint, assign a role to the user-assigned managed identity that grants permission to connect to the Kafka broker:
266
+
267
+
1. In Azure portal, go to the cloud resource you need to grant permissions. For example, go to the Event Grid namespace > **Access control (IAM)** > **Add role assignment**.
268
+
1. On the **Role** tab, select an appropriate role.
269
+
1. On the **Members** tab, for **Assign access to**, select **Managed identity** option, then select **+ Select members** and search for your user-assigned managed identity.
270
+
271
+
Then, configure the data flow endpoint with user-assigned managed identity settings.
272
+
273
+
# [Operations experience](#tab/portal)
274
+
275
+
In the operations experience data flow endpoint settings page, select the **Basic** tab then choose **Authentication method** > **User assigned managed identity**.
276
+
277
+
# [Azure CLI](#tab/cli)
278
+
279
+
#### Create or replace
280
+
281
+
Use the [az iot ops dataflow endpoint create](/cli/azure/iot/ops/dataflow/endpoint/apply#az-iot-ops-dataflow-endpoint-create) command with the `--auth-type` parameter set to `UserAssignedManagedIdentity` for with user-assigned managed identity authentication.
Use the [az iot ops dataflow endpoint apply](/cli/azure/iot/ops/dataflow/endpoint/apply#az-iot-ops-dataflow-endpoint-apply) with the `--config-file` parameter
290
+
291
+
In this example, assume a configuration file with the following content:
292
+
293
+
```json
294
+
{
295
+
"endpointType": "Kafka",
296
+
"kafkaSettings": {
297
+
"authentication": {
298
+
"method": "UserAssignedManagedIdentity",
299
+
"userAssignedManagedIdentitySettings": {
300
+
"clientId": "<ID>",
301
+
"tenantId": "<ID>",
302
+
// Optional
303
+
"scope": "https://<Scope_Url>"
304
+
}
305
+
}
306
+
}
307
+
}
308
+
```
309
+
310
+
# [Bicep](#tab/bicep)
311
+
312
+
```bicep
313
+
kafkaSettings: {
314
+
authentication: {
315
+
method: 'UserAssignedManagedIdentity'
316
+
UserAssignedManagedIdentitySettings: {
317
+
clientId: '<CLIENT_ID>'
318
+
tenantId: '<TENANT_ID>'
319
+
// Optional
320
+
// scope: 'https://<SCOPE_URL>'
321
+
}
322
+
}
323
+
...
324
+
}
325
+
```
326
+
327
+
# [Kubernetes (preview)](#tab/kubernetes)
328
+
329
+
```yaml
330
+
kafkaSettings:
331
+
authentication:
332
+
method: UserAssignedManagedIdentity
333
+
userAssignedManagedIdentitySettings:
334
+
clientId: <CLIENT_ID>
335
+
tenantId: <TENANT_ID>
336
+
# Optional
337
+
# scope: https://<SCOPE_URL>
338
+
```
339
+
340
+
---
341
+
342
+
### SASL
343
+
344
+
To use SASL for authentication, specify the SASL authentication method and configure SASL type and a secret reference with the name of the secret that contains the SASL token.
345
+
346
+
Azure Key Vault is the recommended way to sync the connection string to the Kubernetes cluster so that it can be referenced in the data flow. [Secure settings](../deploy-iot-ops/howto-enable-secure-settings.md) must be enabled to configure this endpoint using the operations experience web UI.
347
+
348
+
# [Operations experience](#tab/portal)
349
+
350
+
In the operations experience data flow endpoint settings page, select the **Basic** tab then choose **Authentication method** > **SASL**.
| SASL type | The type of SASL authentication to use. Supported types are `Plain`, `ScramSha256`, and `ScramSha512`. |
357
+
| Synced secret name | The name of the Kubernetes secret that contains the SASL token. |
358
+
| Username reference or token secret | The reference to the username or token secret used for SASL authentication. |
359
+
| Password reference of token secret | The reference to the password or token secret used for SASL authentication. |
360
+
361
+
# [Azure CLI](#tab/cli)
362
+
363
+
#### Create or replace
364
+
365
+
Use the [az iot ops dataflow endpoint create](/cli/azure/iot/ops/dataflow/endpoint/apply#az-iot-ops-dataflow-endpoint-create) command with the `--auth-type` parameter set to `Sasl` for SASL authentication.
Use the [az iot ops dataflow endpoint apply](/cli/azure/iot/ops/dataflow/endpoint/apply#az-iot-ops-dataflow-endpoint-apply) with the `--config-file` parameter
374
+
375
+
In this example, assume a configuration file with the following content:
The secret must be in the same namespace as the Kafka data flow endpoint. The secret must have the SASL token as a key-value pair.
431
+
188
432
## Advanced settings
189
433
190
434
The advanced settings for this endpoint are identical to the [advanced settings for Azure Event Hubs endpoints](howto-configure-kafka-endpoint.md#advanced-settings).
Copy file name to clipboardExpand all lines: articles/iot-operations/connect-to-cloud/howto-configure-kafka-endpoint.md
+15-25Lines changed: 15 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -543,18 +543,6 @@ This configuration creates a managed identity with the default audience, which i
543
543
544
544
Not supported in the operations experience.
545
545
546
-
# [Bicep](#tab/bicep)
547
-
548
-
```bicep
549
-
kafkaSettings: {
550
-
authentication: {
551
-
method: 'SystemAssignedManagedIdentity'
552
-
systemAssignedManagedIdentitySettings: {
553
-
audience: '<YOUR_AUDIENCE_OVERRIDE_VALUE>'
554
-
}
555
-
}
556
-
}
557
-
```
558
546
559
547
[Azure CLI](#tab/cli)
560
548
@@ -572,6 +560,19 @@ kafkaSettings: {
572
560
}
573
561
```
574
562
563
+
# [Bicep](#tab/bicep)
564
+
565
+
```bicep
566
+
kafkaSettings: {
567
+
authentication: {
568
+
method: 'SystemAssignedManagedIdentity'
569
+
systemAssignedManagedIdentitySettings: {
570
+
audience: '<YOUR_AUDIENCE_OVERRIDE_VALUE>'
571
+
}
572
+
}
573
+
}
574
+
```
575
+
575
576
# [Kubernetes (preview)](#tab/kubernetes)
576
577
577
578
```yaml
@@ -686,19 +687,9 @@ Enter the following settings for the endpoint:
686
687
| Username reference or token secret | The reference to the username or token secret used for SASL authentication. |
687
688
| Password reference of token secret | The reference to the password or token secret used for SASL authentication. |
688
689
689
-
# [Bicep](#tab/bicep)
690
+
# [Azure CLI](#tab/cli)
690
691
691
-
```bicep
692
-
kafkaSettings: {
693
-
authentication: {
694
-
method: 'Sasl' // Or ScramSha256, ScramSha512
695
-
saslSettings: {
696
-
saslType: 'Plain' // Or ScramSha256, ScramSha512
697
-
secretRef: '<SECRET_NAME>'
698
-
}
699
-
}
700
-
}
701
-
```
692
+
#### Create or replace
702
693
703
694
Use the [az iot ops dataflow endpoint create](/cli/azure/iot/ops/dataflow/endpoint/apply#az-iot-ops-dataflow-endpoint-create) command with the `--auth-type` parameter set to `Sasl` for SASL authentication.
704
695
@@ -752,7 +743,6 @@ The supported SASL types are:
752
743
- `ScramSha512`
753
744
754
745
The secret must be in the same namespace as the Kafka data flow endpoint. The secret must have the SASL token as a key-value pair.
0 commit comments