Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Learn how to use managed identities to authenticate Blob storage while configuring primary storage during HDInsight cluster creation.
Enable Managed Identity using Azure portal
Select Primary storage type from the dropdown list.
Choose the Selection method as Select from list.
Click Enable Managed Identity to authenticate for HDInsight cluster creation.
Select the Managed Identity from the dropdown list.
Click on Next.
On the Security & Networking tab, select User assigned managed identity as the same Managed Identity which during cluster creation in the Basic tab.
Use ARM template
You can use managed identities to authenticate Azure blob storage by using ARM template while you create HDInsight cluster.
Same thing can be achieved via ARM request if that is how you want to create HDInsight cluster.
Earlier for Azure Storage based clusters, you would provide storage key for the Azure Storage Account in
properties -> storageProfile -> storageaccounts -> keyField of the arm request and following field would remain null
properties -> storageProfile -> storageaccounts -> msiResourceIdTo set the key as null, and
msiResourceIdas full path of the MSI you want to use./subscriptions/test-subscription/resourcegroups/test-rg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-msiAdd one more field in the ARM request which would otherwise be null, which is
identityThe content should have following fields.
{ "type": "UserAssigned", "userAssignedIdentities": { "<full path of the MSI>": {} }For Example,
{ "type": "UserAssigned", "userAssignedIdentities": { "/subscriptions/test-subscription/resourcegroups/test-rg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-msi": {} } }
MSI based Script Action using primary Azure Blob Storage storage
Previously while adding the primary storage as Azure Blob Storage storage in the Azure HDInsight cluster, you can't provide MSI for authentication. Also to access a script action that isn't accessible anonymously, you need to mention the SAS Key in the script action parameters, so the Azure HDInsight Cluster can access the script for execution.
Now, you can add Azure Blob Storage storage in Azure HDInsight cluster as a primary storage using MSI.
Hence there's no need to provide the SAS key in the script action parameters, while adding the script action, if the script uploaded to the primary Azure Blob Storage storage account.
The script is downloaded and implemented. This will work even if the script isn't publicly accessible.
The new feature specifically supports scripts that aren't publicly accessible but don't require a SAS key or token. This provides an additional layer of security for scripts that need to be kept private.
The traditional script action, whether accessed anonymously or with a SAS key included in the script URI, continues to function without any modifications. For more information, see Customize Azure HDInsight clusters by using script actions.
Configure Azure Blob storage as secondary storage
Access Key as authentication
Use access keys to authenticate Azure blob storage while configuring it as secondary storage during HDInsight cluster creation.
Learn how to use access keys to authenticate Blob storage while configuring secondary storage during HDInsight cluster creation.
Note
If the primary storage is already chosen as Blob storage, then same authentication mechanism may need to be chosen for secondary storage. (i.e. access key in this scenario).
- Select
Additional Azure Storagein the storage section in portal during HDInsight cluster creation. - Choose the
Storage Accountfrom the drop-down. - Select authentication mechanism as
Use access key. - Enter Access key details.
- Click Next.
Managed Identity as authentication
Use manage identities to authenticate Azure blob storage while configuring it as secondary storage during HDInsight cluster creation.
Note
If the primary storage is chosen as Blob storage, then same authentication mechanism may need to be chosen for secondary storage (i.e. managed identity in this scenario). Only one Managed identity can be used to authenticate both primary and secondary storages and the managed identity need to have sufficient access to secondary storage being selected.
- Configure Blob as secondary storage using Azure portal.
- Select Additional Azure Storage in the storage section in portal during HDInsight cluster creation.
- Choose the Storage Account from the drop-down.
- Select authentication mechanism as
Use managed identity. - Select the managed identity from the list.
- Click Next.