You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/stream-analytics/blob-output-managed-identity.md
+19-16Lines changed: 19 additions & 16 deletions
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,7 @@ ms.author: ebnkruma
6
6
ms.service: stream-analytics
7
7
ms.topic: how-to
8
8
ms.date: 07/07/2021
9
+
ms.custom: subject-rbac-steps
9
10
---
10
11
11
12
# Use Managed Identity to authenticate your Azure Stream Analytics job to Azure Blob Storage
@@ -171,35 +172,37 @@ Unless you need the job to create containers on your behalf, you should choose *
171
172
172
173
1. Navigate to the container's configuration pane within your storage account.
173
174
174
-
2. Select **Access Control (IAM)** on the left-hand side.
175
+
1. Select **Access control (IAM)**.
175
176
176
-
3. Under the "Add a role assignment" section click **Add**.
177
+
1. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
177
178
178
-
4. In the role assignment pane:
179
+
1. Assign the following role. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
179
180
180
-
1. Set the **Role** to "Storage Blob Data Contributor"
181
-
2. Ensure the **Assign access to** dropdown is set to "Azure AD user, group, or service principal".
182
-
3. Type the name of your Stream Analytics job in the search field.
183
-
4. Select your Stream Analytics job and click **Save**.
181
+
| Setting | Value |
182
+
| --- | --- |
183
+
| Role | Storage Blob Data Contributor |
184
+
| Assign access to | User, group, or service principal |
185
+
| Members | <Name of your Stream Analytics job> |

186
188
187
189
#### Account level access
188
190
189
191
1. Navigate to your storage account.
190
192
191
-
2. Select **Access Control (IAM)** on the left-hand side.
193
+
1. Select **Access control (IAM)**.
192
194
193
-
3. Under the "Add a role assignment" section click **Add**.
195
+
1. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
194
196
195
-
4. In the role assignment pane:
197
+
1. Assign the following role. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
196
198
197
-
1. Set the **Role** to "Storage Blob Data Contributor"
198
-
2. Ensure the **Assign access to** dropdown is set to "Azure AD user, group, or service principal".
199
-
3. Type the name of your Stream Analytics job in the search field.
200
-
4. Select your Stream Analytics job and click **Save**.
199
+
| Setting | Value |
200
+
| --- | --- |
201
+
| Role | Storage Blob Data Contributor |
202
+
| Assign access to | User, group, or service principal |
203
+
| Members | <Name of your Stream Analytics job> |
Copy file name to clipboardExpand all lines: articles/stream-analytics/event-hubs-managed-identity.md
+10-11Lines changed: 10 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,7 @@ ms.author: ebnkruma
6
6
ms.service: stream-analytics
7
7
ms.topic: how-to
8
8
ms.date: 07/07/2021
9
+
ms.custom: subject-rbac-steps
9
10
---
10
11
11
12
# Use managed identities to access Event Hub from an Azure Stream Analytics job
@@ -38,21 +39,19 @@ First, you create a managed identity for your Azure Stream Analytics job.
38
39
39
40
For the Stream Analytics job to access your Event Hub using managed identity, the service principal you created must have special permissions to the Event Hub.
40
41
41
-
1.Go to **Access Control (IAM)** in your Event Hub.
42
+
1.Select **Access control (IAM)**.
42
43
43
-
1. Select **+ Add**and **Add role assignment**.
44
+
1. Select **Add** > **Add role assignment**to open the **Add role assignment** page.
44
45
45
-
1.On the **Add role assignment** page, enter the following options:
46
+
1.Assign the following role. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
46
47
47
-
|Parameter|Value|
48
-
|---------|-----|
49
-
|Role|Azure Event Hubs Data Owner|
50
-
|Assign access to|User, group, or service principal|
51
-
|Select|Enter the name of your Stream Analytics job|
48
+
| Setting |Value|
49
+
|---|---|
50
+
|Role|Azure Event Hubs Data Owner|
51
+
|Assign access to|User, group, or service principal|
52
+
| Members |<Name of your Stream Analytics job>|
52
53
53
-
:::image type="content" source="media/event-hubs-managed-identity/add-role-assignment.png" alt-text="Add role assignment":::
54
-
55
-
1. Select **Save** and wait a minute or so for changes to propagate.
54
+

56
55
57
56
You can also grant this role at the Event Hub Namespace level, which will naturally propagate the permissions to all Event Hubs created under it. That is, all Event Hubs under a Namespace can be used as a managed-identity-authenticating resource in your Stream Analytics job.
0 commit comments