Configuration of Managed Identities in Azure portal
In this Article
- 1 Overview
- 1.1 Prerequisites
- 1.2 Create a Resource group in the Azure portal
- 1.3 Create a Storage Account
- 1.4 Create a Container in the Storage Account
- 1.5 Create a Managed Identity
- 1.6 Create a Virtual Machine
- 1.7 Link the User-Assigned Managed Identity with the Virtual Machine and Storage Account
- 1.8 Link System-Assigned Managed Identity to Virtual Machine and Storage Account
- 1.9 Configure Azure Storage Account with Managed Identity
- 1.10 Videos
Overview
Binary Snaps that integrate with the Azure Storage Blob service to access Azure resources use the SAS URI or Access key authentication. The SnapLogic Platform now supports Managed Identities to authenticate the Azure Blob Storage service. Managed Identities are of two types:
System assigned managed identity: A resource created and managed by Azure for an Azure resource, such as a virtual machine or a web app, and is mapped to a single virtual machine.
User assigned managed identity: Resource created as a standalone Azure resource and is mapped with multiple resources.
The procedure of creating Managed identities for a Resource group in the Azure portal and linking them to a Storage account includes the following key steps:
Step 1: Create a Resource group in the Azure portal
Step 2: Create a Storage Account
Step 3: Create a Container in the Storage Account
Step 4: Create a Managed Identity
Step 5: Create a Virtual Machine
Step 6: Link the User-Assigned Managed Identity with the Virtual Machine and Storage Account
Step 7: Link System-Assigned Managed Identity to Virtual Machine and Storage Account
Prerequisites
To assign Azure roles, you must have:
Microsoft.Authorization/roleAssignments/write
permissions, such as Role Based Access Control Administrator or User Access Administrator. Learn more.
Create a Resource group in the Azure portal
Log in to the Azure portal.
Search for the Resource group from the search bar.
Click Create.
Specify the Subscription and Resource group and click Next.
Specify the Name and Value of the Resource group and click Next. The Resource group is created, and the details of the Resource group display.
Create a Storage Account
On the Home page of the Azure portal, search for Storage Account in the search bar.
Click +Create. The Create a storage account page displays. Click Next.
Select the Default to Microsoft Entra authorization in the Azure portal checkbox and click Next.
Continue to click Next with the default settings until the Storage account validates.
Click Create. The Storage account deploys successfully.
Â
Create a Container in the Storage Account
Click the Go to resource button on the Deployment completion page.
Navigate to Containers and click Container.
Specify the container name and click Create.
Create a Managed Identity
User assigned managed identity
On the Home page of the Azure portal, search for Managed Identities in the search bar. The Managed Identities page displays the list of existing Managed Identities.
Click Create.
Specify the resource group you created earlier in Step 1.
Specify the name of the User Assigned Managed Identity in the Name field.
Click Next where TERMS appear.
Click Create. The User-assigned Managed Identity deploys successfully.
System assigned managed identity
When you create a virtual machine, Azure automatically creates a system-assigned identity associated with the machine.
Create a Virtual Machine
On the home page of the Azure portal, search for Virtual Machine from the search bar.
Click Create.
Select the Resource group created in Step 1.
Specify the name of the virtual machine.
Continue to click Next:<> until the virtual machine validation passes.
Click Create. The Generate new key pair pop-up appears.
Click the Download private key and create resource button. The deployment completes.
The private key is not stored and cannot be retrieved if you miss to download the private key.
Click Go to resource button.
Link the User-Assigned Managed Identity with the Virtual Machine and Storage Account
Navigate to Security > Identity in the left navigation pane.
Click the User assigned option.
Click Add.
Select the Managed identity (that you have created earlier in Step 4) from the User assigned managed identities list.
A single virtual machine can have multiple user-assigned managed identities assigned to it.
Click Add. The identity is added to the virtual machine.
Navigate to Home.
Select the Storage account created in Step 2.
Click Access Control (IAM) in the left navigation.
Click Add>Add role assignment.
Search for the Storage Blob Data Contributor role from the list of roles on the Add role assignment page.
Click Next.
Choose the Managed identity option in the Assign access to field.
Click Select members in the Members field. The Select managed identities dialog box appears on the left.
Select the User-assigned managed identity option in the Managed identity field.
Select the name of the User-assigned managed identity created in Step 4.
Click Select. The User-assigned Managed identity is added to the Storage account.
Click Next until the Scope appears.
Click Review + assign.
Click the Check access tab to check the added role.
Click Managed identity in the Check access box.
Select the User-assigned managed identity in the Managed identity field.
Select the name of the user-assigned managed identity. The current role assignments appear.
Navigate to the User-assigned managed identity created in Step 4 from the search bar to obtain the client ID.
Link System-Assigned Managed Identity to Virtual Machine and Storage Account
Navigate to Home.
Navigate to Identity under the Security tab on the left navigation.
Select the System assigned tab on the top.
Select On for Status.
Click Save. The Enable system assigned managed identity pop-up appears.
6. Click Yes. A system-assigned managed identity is restricted to one per resource and is tied to the lifecycle of this resource.
Navigate to Home.
Select the storage account created in Step 2.
Click Access control (IAM) in the left navigation.
Click Add>Add role assignment.
Search for the Storage Blob Data Contributor role from the list of roles on the Add role assignment page.
Click Next.
Choose the Managed identity option in the Assign access to field.
Click Select members in the Members field. The Select managed identities box appears on the left.
Select All system-assigned managed identities in the Managed identity field.
Select the name of the virtual machine created in Step 5.
Click Select.
Click Review + assign.
Configure Azure Storage Account with Managed Identity
User assigned managed identity
Choose the Auth type as Managed Identity.
Choose the User assigned managed identity for Managed identity.
Specify the Client ID obtained after creating the User assigned managed Identity in the Azure portal.
Â
System assigned managed identity
Choose the Auth type as Managed Identity.
Choose System assigned managed identity for Managed identity.
Click Apply.
Videos
Set up Azure Managed Identity in the Azure Portal
Configure Azure Storage Account with a Managed Identity in SnapLogic:
Related Content:
Â
Have feedback? Email documentation@snaplogic.com | Ask a question in the SnapLogic Community
© 2017-2024 SnapLogic, Inc.