Edit

Share via


Disable shared-key access for your hub's storage account (preview)

Note

The information provided in this article is specific to a hub-based project and doesn't apply to an Azure AI Foundry project. For more information, see Types of projects.

An Azure AI Foundry hub defaults to using a shared key to access its default Azure Storage account. With key-based authorization, anyone who has the key and access to the storage account can access data.

To reduce the risk of unauthorized access, disable key-based authorization and instead use Microsoft Entra ID for authorization. This configuration uses a Microsoft Entra ID value to authorize access to the storage account. The identity used to access storage is either the user's identity or a managed identity. The user's identity is used to view data in Azure Machine Learning studio or to run a notebook while authenticated with the user's identity. Machine Learning uses a managed identity to access the storage account - for example, when the managed identity runs a training job.

Use of your hub with a shared-key disabled storage account is currently in preview.

Important

This feature is currently in public preview. This preview version is provided without a service-level agreement, and we don't recommend it for production workloads. Certain features might not be supported or might have constrained capabilities.

For more information, see Supplemental Terms of Use for Microsoft Azure Previews.

Prerequisites

You need an existing storage account with shared-key authorization disabled. For more information about the process and implications of disabling shared-key authorization for your storage account, see Prevent shared-key authorization for an Azure Storage account.

Not applicable.

Create a new hub

When you create a new hub, the creation process can automatically disable shared-key access. You can also create a storage account, disable shared-key access, and use it during hub creation.

This section shows you how to create a hub with identity-based access to the storage account.

  1. In the Azure portal, search for Azure AI Foundry. On the left menu, select AI Hubs, and select + Create > Hub.

    Screenshot that shows the Azure AI Foundry portal.

  2. On the Basics tab, enter the hub details, and select the Storage tab. Select the storage account that you previously created.

    Screenshot that shows hub creation by using the previously created storage account.

  3. On the Identity tab, set Storage account access to Identity-based access. Enable Disable shared key access.

    Screenshot that shows hub creation by using Identity-based storage access.

  4. Continue the hub creation process. As the hub is created, the managed identity is automatically assigned the permissions it needs to access the storage account.

Update an existing hub

If you have an existing Azure AI Foundry hub, use the steps in this section to update the hub to use Microsoft Entra ID to authorize access to the storage account. Then disable shared-key access on the storage account.

  1. Go to the Azure portal and select Azure AI Foundry hub.

  2. On the left menu, select Properties. At the bottom of the pane, set Storage account access to Identity-based access. Select Save at the top of the pane to save the configuration.

    Screenshot that shows selection of Identity-based access.

Assign roles to users

After you update the hub, update the storage account to disable shared-key access. For more information, see Prevent shared-key authorization for an Azure Storage account.

You must also identify all the users who need access to the default datastores, such as data scientists. The users must be assigned the Storage Blob Data Contributor and Storage File Data Privileged Contributor roles in Azure RBAC for the storage account. If the users need only read access, use the Storage Blob Data Reader and Storage File Data Privileged Reader roles instead. For more information, see the Role assignments section.

Revert to using shared keys

To revert a hub back to using shared keys to access the storage account, use the following information.

  1. Go to Properties and select Credential-based access.

    Screenshot that shows selection of Credential-based access.

  2. Select Save.

After you revert the hub, update the storage account to enable shared key access. For more information, see Prevent shared-key authorization for an Azure Storage account.

Scenarios for hub storage account role assignments

To work with a storage account with disabled shared-key access, you need to grant more roles to either your users or the managed identity for your hub. Hubs have a system-assigned managed identity by default. Some scenarios require a user-assigned managed identity. This table summarizes the scenarios that require extra role assignments.

Scenario Microsoft Entra ID Required roles Notes
Azure AI Speech User's identity Storage Blob Data Contributor
Storage File Data Privileged Contributor
Models as a service System-assigned managed identity Storage Blob Data Contributor The hub's managed identity.
Automatically assigned the role when you provision the hub.
Don't manually change this role assignment.
Azure AI Search System-assigned managed identity Storage Blob Data Contributor The hub's managed identity.
Automatically assigned the role when you provision the hub.
Don't manually change this role assignment.
Fine-tuning of open-source software models User-assigned managed identity Storage Blob Data Contributor
Prompt flow User's identity Storage Blob Data Contributor
Storage File Data Privileged Contributor
Add and manage your own data User's identity Storage Blob Data Contributor