-
Notifications
You must be signed in to change notification settings - Fork 151
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Using Entra ID authentication for internal workspace resources #4313
Comments
A lot of these depend on the use of Entra/Azure AD Groups, otherwise when new users are added all the services need updating. We do this in AzureML at present. All Workspace Users become AML Data Scientists. Group assignment to app roles require an Entra ID P2 licence, I'm not sure if its just one that's needed, given most of the users are external. @TonyWildish-BH have you looked into the Entra licencing requirements for group assignments to app roles? If we were to do this then the required Entra licencing would have to be a prerequisite. |
Group assignment would be the perfect solution, but I'd rather not impose a requirement for a P2 license, that seems a bit too much to ask. How much would it complicate things to make it an optional feature, conditional on the P2 licence? Or we could just go user by user. From my viewpoint, I wouldn't mind if the services didn't update automatically when a new user comes on board a project. That won't happen very often for us, and we can script it up if we feel the need. |
@TonyWildish-BH We've got a local template of Azure SQL working with Entra only authentication that uses groups to manage permissions. Would need to be generalised a bit if it were merged back - like you say around Entra groups. The Databricks workspace service already uses Entra auth - IIRC I don't think there's an option for local users. |
If we don't use groups then each script becomes custom to the service and requires maintaining. So if we are going to do this project wide really think we need to rely on AD groups. |
Sounds like AD groups is the best option then. If there's a way to make this gracefully degrade in the absence of a P2 licence, without overly complicating the code, that would be ideal. |
Looks like this might have changed, a P1 is required. |
There's already work in progress to embed the 'real' username into VMs, instead of a random 4-character name (#3770). I'd like to see that use of Entra ID username extended to other cases:
I'd be interested to hear if other people have any thoughts on this?
The text was updated successfully, but these errors were encountered: