You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Environments | Region | Up to 5| Yes | Limit up to five environments per subscription, per region.<br><br>For example, if you deploy to three regions you can get up to 15 environments for a single subscription. |
22
-
| Container Apps | Environment |20| Yes ||
21
+
| Environments | Region | Up to 15| Yes | Limit up to 15 environments per subscription, per region.<br><br>For example, if you deploy to three regions you can get up to 45 environments for a single subscription. |
22
+
| Container Apps | Environment |Unlimited| Yes ||
23
23
| Revisions | Container app | 100 | No ||
24
24
| Replicas | Revision | 30 | Yes ||
25
25
| Cores | Replica | 2 | No | Maximum number of cores that can be requested by a revision replica. |
In this article, learn how to deploy your [MLflow](https://www.mlflow.org) model to an [online endpoint](concept-endpoints.md) for real-time inference. When you deploy your MLflow model to an online endpoint, you don't need to indicate a scoring script or an environment. This characteristic is usually referred as __no-code deployment__.
24
+
In this article, learn how to deploy your [MLflow](https://www.mlflow.org) model to an [online endpoint](concept-endpoints.md) for real-time inference. When you deploy your MLflow model to an online endpoint, you don't need to indicate a scoring script or an environment. This characteristic is referred as __no-code deployment__.
25
25
26
26
For no-code-deployment, Azure Machine Learning
27
27
28
-
* Dynamically installs Python packages provided in the `conda.yaml` file, this means the dependencies are installed during container runtime.
28
+
* Dynamically installs Python packages provided in the `conda.yaml` file. Hence, dependencies are installed during container runtime.
29
29
* Provides a MLflow base image/curated environment that contains the following items:
@@ -37,11 +37,11 @@ For no-code-deployment, Azure Machine Learning
37
37
38
38
## About this example
39
39
40
-
This example shows how you can deploy an MLflow model to an online endpoint to perform predictions. This example uses an MLflow model based on the [Diabetes dataset](https://www4.stat.ncsu.edu/~boos/var.select/diabetes.html). This dataset contains ten baseline variables, age, sex, body mass index, average blood pressure, and six blood serum measurements obtained from n = 442 diabetes patients, as well as the response of interest, a quantitative measure of disease progression one year after baseline (regression).
40
+
This example shows how you can deploy an MLflow model to an online endpoint to perform predictions. This example uses an MLflow model based on the [Diabetes dataset](https://www4.stat.ncsu.edu/~boos/var.select/diabetes.html). This dataset contains ten baseline variables, age, sex, body mass index, average blood pressure, and six blood serum measurements obtained from n = 442 diabetes patients. It also contains the response of interest, a quantitative measure of disease progression one year after baseline (regression).
41
41
42
-
The model has been trained using an `scikit-learn` regressor and all the required preprocessing has been packaged as a pipeline, making this model an end-to-end pipeline that goes from raw data to predictions.
42
+
The model was trained using an `scikit-learn` regressor and all the required preprocessing has been packaged as a pipeline, making this model an end-to-end pipeline that goes from raw data to predictions.
43
43
44
-
The information in this article is based on code samples contained in the [azureml-examples](https://github.com/azure/azureml-examples) repository. To run the commands locally without having to copy/paste YAML and other files, clone the repo and then change directories to the `cli/endpoints/online` if you are using the Azure CLI or `sdk/endpoints/online` if you are using our SDK for Python.
44
+
The information in this article is based on code samples contained in the [azureml-examples](https://github.com/azure/azureml-examples) repository. To run the commands locally without having to copy/paste YAML and other files, clone the repo, and then change directories to the `cli/endpoints/online` if you are using the Azure CLI or `sdk/endpoints/online` if you are using our SDK for Python.
@@ -58,9 +58,9 @@ Before following the steps in this article, make sure you have the following pre
58
58
59
59
- An Azure subscription. If you don't have an Azure subscription, create a free account before you begin. Try the [free or paid version of Azure Machine Learning](https://azure.microsoft.com/free/).
60
60
- Azure role-based access controls (Azure RBAC) are used to grant access to operations in Azure Machine Learning. To perform the steps in this article, your user account must be assigned the owner or contributor role for the Azure Machine Learning workspace, or a custom role allowing Microsoft.MachineLearningServices/workspaces/onlineEndpoints/*. For more information, see [Manage access to an Azure Machine Learning workspace](how-to-assign-roles.md).
61
-
- You must have a MLflow model registered in your workspace. Particularly, this example will register a model trained for the [Diabetes dataset](https://www4.stat.ncsu.edu/~boos/var.select/diabetes.html).
61
+
- You must have a MLflow model registered in your workspace. Particularly, this example registers a model trained for the [Diabetes dataset](https://www4.stat.ncsu.edu/~boos/var.select/diabetes.html).
62
62
63
-
Additionally, you will need to:
63
+
Additionally, you need to:
64
64
65
65
# [Azure CLI](#tab/cli)
66
66
@@ -86,7 +86,7 @@ Additionally, you will need to:
86
86
87
87
# [Studio](#tab/studio)
88
88
89
-
There are no additional prerequisites when working in Azure Machine Learning studio.
89
+
There are no more prerequisites when working in Azure Machine Learning studio.
90
90
91
91
---
92
92
@@ -104,7 +104,7 @@ az configure --defaults workspace=<workspace> group=<resource-group> location=<l
104
104
105
105
# [Python (Azure ML SDK)](#tab/sdk)
106
106
107
-
The workspace is the top-level resource forAzure Machine Learning, providing a centralized place to work with all the artifacts you create when you use Azure Machine Learning. In this section, we'll connect to the workspacein which you'll perform deployment tasks.
107
+
The workspace is the top-level resource forAzure Machine Learning, providing a centralized place to work with all the artifacts you create when you use Azure Machine Learning. In this section, we connect to the workspacein which you perform deployment tasks.
108
108
109
109
1. Import the required libraries:
110
110
@@ -587,7 +587,7 @@ Use the following steps to deploy an MLflow model with a custom scoring script.
587
587
raise Exception("Request must contain a top level key named 'input_data'")
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/service-bus-authentication-and-authorization.md
+15-12Lines changed: 15 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,14 +2,19 @@
2
2
title: Azure Service Bus authentication and authorization | Microsoft Docs
3
3
description: Authenticate apps to Service Bus with Shared Access Signature (SAS) authentication.
4
4
ms.topic: article
5
-
ms.date: 02/01/2022
5
+
ms.date: 02/17/2023
6
6
---
7
7
8
8
# Service Bus authentication and authorization
9
-
There are two ways to authenticate and authorize access to Azure Service Bus resources: Azure Active Directory (Azure AD) and Shared Access Signatures (SAS). This article gives you details on using these two types of security mechanisms.
9
+
There are two ways to authenticate and authorize access to Azure Service Bus resources:
10
+
11
+
- Azure Active Directory (Azure AD)
12
+
- Shared Access Signatures (SAS).
13
+
14
+
This article gives you details on using these two types of security mechanisms.
10
15
11
16
## Azure Active Directory
12
-
Azure AD integration for Service Bus resources provides Azure role-based access control (RBAC) for fine-grained control over a client’s access to resources. You can use Azure RBAC to grant permissions to a security principal, which may be a user, a group, or an application service principal. The security principal is authenticated by Azure AD to return an OAuth 2.0 token. The token can be used to authorize a request to access a Service Bus resource (queue, topic, and so on).
17
+
Azure AD integration with Service Bus provides role-based access control (RBAC) to Service Bus resources. You can use Azure RBAC to grant permissions to a security principal, which may be a user, a group, or an application service principal. Azure AD authenticates the security principal and returns an OAuth 2.0 token. This token can be used to authorize a request to access a Service Bus resource (queue, topic, and so on).
13
18
14
19
For more information about authenticating with Azure AD, see the following articles:
15
20
@@ -20,23 +25,21 @@ For more information about authenticating with Azure AD, see the following artic
20
25
> [Service Bus REST API](/rest/api/servicebus/) supports OAuth authentication with Azure AD.
21
26
22
27
> [!IMPORTANT]
23
-
> Authorizing users or applications using OAuth 2.0 token returned by Azure AD provides superior security and ease of use over shared access signatures (SAS). With Azure AD, there is no need to store the tokens in your code and risk potential security vulnerabilities. We recommend that you use Azure AD with your Azure Service Bus applications when possible.
28
+
> Authorizing users or applications using OAuth 2.0 token returned by Azure AD provides superior security and ease of use over shared access signatures (SAS). With Azure AD, there is no need to store tokens in your code and risk potential security vulnerabilities. We recommend that you use Azure AD with your Azure Service Bus applications when possible.
24
29
>
25
30
> You can disable local or SAS key authentication for a Service Bus namespace and allow only Azure AD authentication. For step-by-step instructions, see [Disable local authentication](disable-local-authentication.md).
26
31
27
32
## Shared access signature
28
33
[SAS authentication](service-bus-sas.md) enables you to grant a user access to Service Bus resources, with specific rights. SAS authentication in Service Bus involves the configuration of a cryptographic key with associated rights on a Service Bus resource. Clients can then gain access to that resource by presenting a SAS token, which consists of the resource URI being accessed and an expiry signed with the configured key.
29
34
30
-
You can configure keys for SAS on a Service Bus namespace. The key applies to all messaging entities within that namespace. You can also configure keys on Service Bus queues and topics. SAS is also supported on [Azure Relay](../azure-relay/relay-authentication-and-authorization.md).
31
-
32
-
To use SAS, you can configure a shared access authorization rule on a namespace, queue, or topic. This rule consists of the following elements:
35
+
You can configure keys for SAS on a Service Bus namespace. The key applies to all messaging entities within that namespace. You can also configure keys on Service Bus queues and topics. To use SAS, you can configure a shared access authorization rule on a namespace, queue, or topic. This rule consists of the following elements:
33
36
34
-
**KeyName*: identifies the rule.
35
-
**PrimaryKey*: a cryptographic key used to sign/validate SAS tokens.
36
-
**SecondaryKey*: a cryptographic key used to sign/validate SAS tokens.
37
-
**Rights*: represents the collection of **Listen**, **Send**, or **Manage** rights granted.
37
+
***KeyName**: identifies the rule.
38
+
***PrimaryKey**: a cryptographic key used to sign/validate SAS tokens.
39
+
***SecondaryKey**: a cryptographic key used to sign/validate SAS tokens.
40
+
***Rights**: represents the collection of **Listen**, **Send**, or **Manage** rights granted.
38
41
39
-
Authorization rules configured at the namespace level can grant access to all entities in a namespace for clients with tokens signed using the corresponding key. You can configure up to 12 such authorization rules on a Service Bus namespace, queue, or topic. By default, a shared access authorization rule with all rights is configured for every namespace when it's first provisioned.
42
+
Authorization rules configured at the namespace level can grant access to all entities in a namespace for clients with tokens signed using the corresponding key. You can configure up to 12 such authorization rules on a Service Bus namespace, queue, or topic. By default, a shared access authorization rule with all rights is configured for every namespace when it's first provisioned.
40
43
41
44
To access an entity, the client requires a SAS token generated using a specific shared access authorization rule. The SAS token is generated using the HMAC-SHA256 of a resource string that consists of the resource URI to which access is claimed, and an expiry with a cryptographic key associated with the authorization rule.
0 commit comments