Skip to content

Commit f91e4f3

Browse files
authored
Merge pull request #189372 from laujan/1921051-update-managed-identities
update managed identities articles
2 parents 841b4c2 + bfa6c4f commit f91e4f3

File tree

4 files changed

+64
-42
lines changed

4 files changed

+64
-42
lines changed

articles/applied-ai-services/form-recognizer/managed-identities.md

Lines changed: 26 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -7,27 +7,25 @@ manager: nitinme
77
ms.service: applied-ai-services
88
ms.subservice: forms-recognizer
99
ms.topic: how-to
10-
ms.date: 01/26/2022
10+
ms.date: 02/22/2022
1111
ms.author: lajanuar
1212
ms.custom: ignite-fall-2021
1313
---
1414

15-
# Create and use managed identities with Form Recognizer
15+
# Managed identities for Form Recognizer
1616

17-
> [!IMPORTANT]
18-
> Azure RBAC (Azure role-based access control) assignment is currently in preview and not recommended for production workloads. Certain features may not be supported or have constrained capabilities. Azure RBAC assignments are used to grant permissions for managed identity.
17+
Managed identities for Azure resources are service principals that create an Azure Active Directory (Azure AD) identity and specific permissions for Azure managed resources:
1918

20-
## What is managed identity?
19+
* You can use managed identities to grant access to any resource that supports Azure AD authentication, including your own applications. Unlike security keys and authentication tokens, managed identities eliminate the need for developers to manage credentials.
2120

22-
Azure managed identity is a service principal. It creates an Azure Active Directory (Azure AD) identity and specific permissions for Azure managed resources. You can use a managed identity to grant access to any resource that supports Azure AD authentication. To grant access, assign a role to a managed identity using [Azure RBAC](../../role-based-access-control/overview.md) (Azure role-based access control). There's no added cost to use managed identity in Azure.
21+
* To grant access to an Azure resource, assign an Azure role to a managed identity using [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md).
2322

24-
Managed identity supports both privately and publicly accessible Azure blob storage accounts. For storage accounts with public access, you can opt to use a shared access signature (SAS) to grant limited access. In this article, you'll learn to enable a system-assigned managed identity for your Form Recognizer instance.
23+
* There's no added cost to use managed identities in Azure.
2524

26-
## Private storage account access
27-
> [!NOTE]
28-
>
29-
> Form Recognizer only supports system-assigned managed identities today. User-assigned managed identities is on the roadmap and will be enabled in the near future.
25+
> [!TIP]
26+
> Managed identities eliminate the need for you to manage credentials, including Shared Access Signature (SAS) tokens. Managed identities are a safer way to grant access to data without having credentials in your code.
3027
28+
## Private storage account access
3129

3230
Private Azure storage account access and authentication are supported by [managed identities for Azure resources](../../active-directory/managed-identities-azure-resources/overview.md). If you have an Azure storage account, protected by a Virtual Network (VNet) or firewall, Form Recognizer can't directly access your storage account data. However, once a managed identity is enabled, Form Recognizer can access your storage account using an assigned managed identity credential.
3331

@@ -45,7 +43,7 @@ To get started, you'll need:
4543

4644
* A [**Form Recognizer**](https://portal.azure.com/#create/Microsoft.CognitiveServicesTextTranslation) or [**Cognitive Services**](https://portal.azure.com/#create/Microsoft.CognitiveServicesAllInOne) resource in the Azure portal. For detailed steps, _see_ [Create a Cognitive Services resource using the Azure portal](../../cognitive-services/cognitive-services-apis-create-account.md?tabs=multiservice%2cwindows).
4745

48-
* An [**Azure blob storage account**](https://portal.azure.com/#create/Microsoft.StorageAccount-ARM) in the same region as your Form Recognizer resource. You'll create containers to store and organize your blob data within your storage account.
46+
* An [**Azure blob storage account**](https://portal.azure.com/#create/Microsoft.StorageAccount-ARM) in the same region as your Form Recognizer resource. You'll create containers to store and organize your blob data within your storage account.
4947

5048
* If your storage account is behind a firewall, **you must enable the following configuration**: </br></br>
5149

@@ -62,7 +60,11 @@ To get started, you'll need:
6260

6361
## Managed identity assignments
6462

65-
There are two types of managed identity: **system-assigned** and **user-assigned**. Currently, Form Recognizer is supported by system-assigned managed identity. A system-assigned managed identity is **enabled** directly on a service instance. It isn't enabled by default; you have to go to your resource and update the identity setting. The system-assigned managed identity is tied to your resource throughout its lifecycle. If you delete your resource, the managed identity will be deleted as well.
63+
There are two types of managed identity: **system-assigned** and **user-assigned**. Currently, Form Recognizer supports system-assigned managed identity:
64+
65+
* A system-assigned managed identity is **enabled** directly on a service instance. It isn't enabled by default; you must go to your resource and update the identity setting.
66+
67+
* The system-assigned managed identity is tied to your resource throughout its lifecycle. If you delete your resource, the managed identity will be deleted as well.
6668

6769
In the following steps, we'll enable a system-assigned managed identity and grant Form Recognizer limited access to your Azure blob storage account.
6870

@@ -82,6 +84,10 @@ In the following steps, we'll enable a system-assigned managed identity and gran
8284

8385
1. In the main window, toggle the **System assigned Status** tab to **On**.
8486

87+
## Grant access to your storage account
88+
89+
You need to grant Form Recognizer access to your storage account before it can create, read, or delete blobs. Now that you've enabled Form Recognizer with a system-assigned managed identity, you can use Azure role-based access control (Azure RBAC), to give Form Recognizer access to Azure storage. The **Storage Blob Data Reader** role gives Form Recognizer (represented by the system-assigned managed identity) read and list access to the blob container and data.
90+
8591
1. Under **Permissions** select **Azure role assignments**:
8692

8793
:::image type="content" source="media/managed-identities/enable-system-assigned-managed-identity-portal.png" alt-text="Screenshot: enable system-assigned managed identity in Azure portal.":::
@@ -94,14 +100,14 @@ In the following steps, we'll enable a system-assigned managed identity and gran
94100
>
95101
> If you're unable to assign a role in the Azure portal because the Add > Add role assignment option is disabled or you get the permissions error, "you do not have permissions to add role assignment at this scope", check that you're currently signed in as a user with an assigned a role that has Microsoft.Authorization/roleAssignments/write permissions such as Owner or User Access Administrator at the Storage scope for the storage resource.
96102
97-
7. Next, you're going to assign a **Storage Blob Data Reader** role to your Form Recognizer service resource. In the **Add role assignment** pop-up window complete the fields as follows and select **Save**:
103+
1. Next, you're going to assign a **Storage Blob Data Reader** role to your Form Recognizer service resource. In the **Add role assignment** pop-up window complete the fields as follows and select **Save**:
98104

99105
| Field | Value|
100106
|------|--------|
101-
|**Scope**| ***Storage***|
102-
|**Subscription**| ***The subscription associated with your storage resource***.|
103-
|**Resource**| ***The name of your storage resource***|
104-
|**Role** | ***Storage Blob Data Reader***—allows for read access to Azure Storage blob containers and data.|
107+
|**Scope**| **_Storage_**|
108+
|**Subscription**| **_The subscription associated with your storage resource_**.|
109+
|**Resource**| **_The name of your storage resource_**|
110+
|**Role** | **_Storage Blob Data Reader_**—allows for read access to Azure Storage blob containers and data.|
105111

106112
:::image type="content" source="media/managed-identities/add-role-assignment-window.png" alt-text="Screenshot: add role assignments page in the Azure portal.":::
107113

@@ -113,9 +119,9 @@ In the following steps, we'll enable a system-assigned managed identity and gran
113119

114120
:::image type="content" source="media/managed-identities/assigned-roles-window.png" alt-text="Screenshot: Azure role assignments window.":::
115121

116-
That's it! You've completed the steps to enable a system-assigned managed identity. With this identity credential, you can grant Form Recognizer-specific access rights to documents and files stored in your BYOS account.
122+
That's it! You've completed the steps to enable a system-assigned managed identity. With managed identity and Azure RBAC, you granted Form Recognizer specific access rights to your storage resource without having to manage credentials such as SAS tokens.
117123

118124
## Learn more about managed identity
119125

120126
> [!div class="nextstepaction"]
121-
> [Managed identities for Azure resources: frequently asked questions - Azure AD](../../active-directory/managed-identities-azure-resources/managed-identities-faq.md)
127+
> [Access Azure Storage form a web app using managed identities](/azure/app-service/scenario-secure-app-access-storage?toc=/azure/applied-ai-services/form-recognizer/toc.json&bc=/azure/applied-ai-services/form-recognizer/breadcrumb/toc.json )

articles/applied-ai-services/form-recognizer/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -152,6 +152,8 @@ items:
152152
items:
153153
- name: Use Form Recognizer with Azure Logic Apps
154154
href: tutorial-logic-apps.md
155+
- name: Use managed identities to access Azure storage
156+
href: /azure/app-service/scenario-secure-app-access-storage?toc=/azure/applied-ai-services/form-recognizer/toc.json&bc=/azure/applied-ai-services/form-recognizer/breadcrumb/toc.json
155157
- name: "Create Form Recognizer workflows with AI Builder"
156158
expanded: true
157159
items:

articles/cognitive-services/Translator/document-translation/managed-identity.md

Lines changed: 34 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,32 @@
11
---
2-
title: Create and use managed identity
2+
title: Create and use managed identities for Document Translation
33
titleSuffix: Azure Cognitive Services
4-
description: Understand how to create and use managed identity in the Azure portal
4+
description: Understand how to create and use managed identities in the Azure portal
55
author: laujan
66
manager: nitinme
77
ms.service: cognitive-services
88
ms.subservice: translator-text
99
ms.topic: how-to
10-
ms.date: 09/09/2021
10+
ms.date: 02/22/2022
1111
ms.author: lajanuar
1212
---
1313

14-
# Create and use managed identity
14+
# Managed identities for Document Translation
1515

1616
> [!IMPORTANT]
1717
>
18-
> Managed identity for Document Translation is currently unavailable in the global region. If you intend to use managed identity for Document Translation operations, [create your Translator resource](https://portal.azure.com/#create/Microsoft.CognitiveServicesTextTranslation) in a non-global Azure region.
18+
> Managed identities for Azure resources are currently unavailable for Document Translation service in the global region. If you intend to use managed identities for Document Translation operations, [create your Translator resource](https://portal.azure.com/#create/Microsoft.CognitiveServicesTextTranslation) in a non-global Azure region.
1919
20-
## What is managed identity?
20+
Managed identities for Azure resources are service principals that create an Azure Active Directory (Azure AD) identity and specific permissions for Azure managed resources:
2121

22-
Azure managed identity is a service principal that creates an Azure Active Directory (Azure AD) identity and specific permissions for Azure managed resources. You can use a managed identity to grant access to any resource that supports Azure AD authentication. To grant access, assign a role to a managed identity using [Azure role-based access control](../../../role-based-access-control/overview.md) (Azure RBAC). There is no added cost to use managed identity in Azure.
22+
* You can use managed identities to grant access to any resource that supports Azure AD authentication, including your own applications. Unlike security keys and authentication tokens, managed identities eliminate the need for developers to manage credentials.
2323

24-
Managed identity supports both privately and publicly accessible Azure blob storage accounts. For storage accounts **with public access**, you can opt to use a shared access signature (SAS) to grant limited access. In this article, we will examine how to manage access to translation documents in your Azure blob storage account using system-assigned managed identity.
24+
* To grant access to an Azure resource, assign an Azure role to a managed identity using [Azure role-based access control (Azure RBAC)](../../../role-based-access-control/overview.md).
25+
26+
* There's no added cost to use managed identities in Azure.
27+
28+
> [!TIP]
29+
> Managed identities eliminate the need for you to manage credentials, including Shared Access Signature (SAS) tokens. Managed identities are a safer way to grant access to data without having credentials in your code.
2530
2631
## Prerequisites
2732

@@ -43,17 +48,21 @@ To get started, you'll need:
4348
* In the main window, select **Allow access from Selected networks**.
4449
:::image type="content" source="../media/managed-identities/firewalls-and-virtual-networks.png" alt-text="Screenshot: Selected networks radio button selected.":::
4550

46-
* On the selected networks page navigate to the **Exceptions** category and make certain that the [**Allow Azure services on the trusted services list to access this storage account**](../../../storage/common/storage-network-security.md?tabs=azure-portal#manage-exceptions) checkbox is enabled.
51+
* On the selected networks page, navigate to the **Exceptions** category and make certain that the [**Allow Azure services on the trusted services list to access this storage account**](../../../storage/common/storage-network-security.md?tabs=azure-portal#manage-exceptions) checkbox is enabled.
4752

4853
:::image type="content" source="../media/managed-identities/allow-trusted-services-checkbox-portal-view.png" alt-text="Screenshot: allow trusted services checkbox, portal view":::
4954

50-
## Managed Identity assignments
55+
## Managed identity assignments
56+
57+
There are two types of managed identities: **system-assigned** and **user-assigned**. Currently, Document Translation supports system-assigned managed identities:
5158

52-
There are two types of managed identity: **system-assigned** and **user-assigned**. Currently, Document Translation is supported by system-assigned managed identity. A system-assigned managed identity is **enabled** directly on a service instance. It is not enabled by default; you must go to your resource and update the identity setting. The system-assigned managed identity is tied to your resource throughout its lifecycle. If you delete your resource, the managed identity will be deleted as well.
59+
* A system-assigned managed identity is **enabled** directly on a service instance. It isn't enabled by default; you must go to your resource and update the identity setting.
60+
61+
* The system-assigned managed identity is tied to your resource throughout its lifecycle. If you delete your resource, the managed identity will be deleted as well.
5362

5463
In the following steps, we'll enable a system-assigned managed identity and grant your Translator resource limited access to your Azure blob storage account.
5564

56-
## Enable a system-assigned managed identity using the Azure portal
65+
## Enable a system-assigned managed identity
5766

5867
>[!IMPORTANT]
5968
>
@@ -69,6 +78,12 @@ In the following steps, we'll enable a system-assigned managed identity and gran
6978

7079
1. In the main window, toggle the **System assigned Status** tab to **On**.
7180

81+
## Grant access to your storage account
82+
83+
You need to grant Translator access to your storage account before it can create, read, or delete blobs. Now that you enabled Translator with a system-assigned managed identity, you can use Azure role-based access control (Azure RBAC), to give Translator access to Azure storage.
84+
85+
The **Storage Blob Data Contributor** role gives Translator (represented by the system-assigned managed identity) read, write, and delete access to the blob container and data.
86+
7287
1. Under **Permissions** select **Azure role assignments**:
7388

7489
:::image type="content" source="../media/managed-identities/enable-system-assigned-managed-identity-portal.png" alt-text="Screenshot: enable system-assigned managed identity in Azure portal.":::
@@ -85,27 +100,24 @@ In the following steps, we'll enable a system-assigned managed identity and gran
85100

86101
| Field | Value|
87102
|------|--------|
88-
|**Scope**| ***Storage***.|
89-
|**Subscription**| ***The subscription associated with your storage resource***.|
90-
|**Resource**| ***The name of your storage resource***.|
91-
|**Role** | ***Storage Blob Data Contributor***.|
103+
|**Scope**| **_Storage_**.|
104+
|**Subscription**| **_The subscription associated with your storage resource_**.|
105+
|**Resource**| **_The name of your storage resource_**.|
106+
|**Role** | **_Storage Blob Data Contributor_**.|
92107

93108
:::image type="content" source="../media/managed-identities/add-role-assignment-window.png" alt-text="Screenshot: add role assignments page in the Azure portal.":::
94109

95-
1. After you've received the _Added Role assignment_ confirmation message, refresh the page to see the added role assignment.
110+
1. After you've received the _Added Role assignment_ confirmation message, refresh the page to see the added role assignment.
96111

97112
:::image type="content" source="../media/managed-identities/add-role-assignment-confirmation.png" alt-text="Screenshot: Added role assignment confirmation pop-up message.":::
98113

99114
1. If you don't see the change right away, wait and try refreshing the page once more. When you assign or remove role assignments, it can take up to 30 minutes for changes to take effect.
100115

101116
:::image type="content" source="../media/managed-identities/assigned-roles-window.png" alt-text="Screenshot: Azure role assignments window.":::
102117

103-
Great! You have completed the steps to enable a system-assigned managed identity. With this identity credential, you can grant Translator specific access rights to your storage resource.
118+
Great! You've completed the steps to enable a system-assigned managed identity. With managed identity and Azure RBAC, you granted Translator specific access rights to your storage resource without having to manage credentials such as SAS tokens.
104119

105120
## Next steps
106121

107122
> [!div class="nextstepaction"]
108-
> [Managed identities for Azure resources: frequently asked questions](../../../active-directory/managed-identities-azure-resources/managed-identities-faq.md)
109-
110-
> [!div class="nextstepaction"]
111-
>[Use managed identities to acquire an access token](../../../app-service/overview-managed-identity.md?tabs=dotnet#configure-target-resource)
123+
> [Access Azure Storage from a web app using managed identities](/azure/app-service/scenario-secure-app-access-storage?toc=/azure/cognitive-services/translator/toc.json&bc=/azure/cognitive-services/translator/breadcrumb/toc.json)

articles/cognitive-services/Translator/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,8 @@ items:
6767
href: containers/translator-container-supported-parameters.md
6868
- name: Tutorials
6969
items:
70+
- name: Use managed identities to access Azure storage
71+
href: /azure/app-service/scenario-secure-app-access-storage?toc=/azure/cognitive-services/translator/toc.json&bc=/azure/cognitive-services/translator/breadcrumb/toc.json
7072
- name: Create a Translator workflow
7173
href: /ai-builder/flow-text-translation?toc=/azure/cognitive-services/translator/toc.json&bc=/azure/cognitive-services/translator/breadcrumb/toc.json
7274
- name: Translate text with Translator

0 commit comments

Comments
 (0)