Skip to content

Commit fe2b035

Browse files
committed
add old draft material
1 parent eb45211 commit fe2b035

File tree

1 file changed

+49
-1
lines changed

1 file changed

+49
-1
lines changed

articles/batch/batch-aad-auth.md

Lines changed: 49 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.service: batch
1313
ms.topic: article
1414
ms.tgt_pltfrm:
1515
ms.workload: big-compute
16-
ms.date: 08/15/2019
16+
ms.date: 01/13/2020
1717
ms.author: lahugh
1818
---
1919

@@ -140,6 +140,54 @@ Your application should now appear in your access control settings with an RBAC
140140

141141
![Assign an RBAC role to your application](./media/batch-aad-auth/app-rbac-role.png)
142142

143+
### Assign a custom job submission role
144+
145+
A custom job submission role grants permission for a user to submit jobs and tasks without permission to modify pools. This prevents users from performing operations that affect cost, such as creating pools or modifying nodes.
146+
147+
This is done by adding RBAC operations, to which roles can be granted permissions. The new operations are:
148+
149+
- Pools (read, create/update, delete), including node management
150+
- Jobs (read, create/update, delete), including task management
151+
- Job Schedules (read, create/update, delete)
152+
153+
Custom job submission roles are for users authenticated by AAD, not the Batch account credentials (shared key). Note that the Batch account credentials give full permission to the Batch account. Also note that jobs using autopool require pool-level permissions.
154+
155+
Here's an example of a custom role definition:
156+
157+
```json
158+
{
159+
"properties":{
160+
"roleName":"Azure Batch Custom Job Submitter",
161+
"type":"CustomRole",
162+
"description":"Allows a user to submit jobs to Azure Batch but not manage pools",
163+
"assignableScopes":[
164+
"/subscriptions/88888888-8888-8888-8888-888888888888"
165+
],
166+
"permissions":[
167+
{
168+
"actions":[
169+
"Microsoft.Batch/*/read",
170+
"Microsoft.Authorization/*/read",
171+
"Microsoft.Resources/subscriptions/resourceGroups/read",
172+
"Microsoft.Support/*",
173+
"Microsoft.Insights/alertRules/*"
174+
],
175+
"notActions":[
176+
177+
],
178+
"dataActions":[
179+
"Microsoft.Batch/batchAccounts/jobs/*",
180+
"Microsoft.Batch/batchAccounts/jobSchedules/*"
181+
],
182+
"notDataActions":[
183+
184+
]
185+
}
186+
]
187+
}
188+
}
189+
```
190+
143191
### Get the tenant ID for your Azure Active Directory
144192

145193
The tenant ID identifies the Azure AD tenant that provides authentication services to your application. To get the tenant ID, follow these steps:

0 commit comments

Comments
 (0)