Configure managed identities for your Azure Data Explorer cluster

A managed identity from Azure Active Directory allows your cluster to easily access other AAD-protected resources such as Azure Key Vault. The identity is managed by the Azure platform and doesn't require you to provision or rotate any secrets. This article shows you how to create a managed identity for Azure Data Explorer clusters. Managed identity configuration is currently supported only to enable customer-managed keys for your cluster.

Note

Managed identities for Azure Data Explorer won't behave as expected if your Azure Data Explorer cluster is migrated across subscriptions or tenants. The app will need to obtain a new identity, which can be done by disabling and re-enabling the feature. Access policies of downstream resources will also need to be updated to use the new identity.

Add a system-assigned identity

Assign a system-assigned identity that is tied to your cluster, and is deleted if your cluster is deleted. A cluster can only have one system-assigned identity. Creating a cluster with a system-assigned identity requires an additional property to be set on the cluster. The system-assigned identity is added using C#, ARM templates, or the Azure portal as detailed below.

Add a system-assigned identity using the Azure portal

  1. Sign in to the Azure portal.

New Azure Data Explorer cluster

  1. Create an Azure Data Explorer cluster

  2. In the Security tab > System assigned identity, select On. To remove the system assigned identity, select Off.

  3. Select Next:Tags> or Review + create to create the cluster.

    Add system assigned identity to new cluster

Existing Azure Data Explorer cluster

  1. Open an existing Azure Data Explorer cluster.

  2. Select Settings > Identity in left pane of portal.

  3. In the Identity pane > System assigned tab:

    1. Move the Status slider to On.
    2. Select Save
    3. In the pop-up window, select Yes

    Add system assigned identity

  4. After a few minutes, the screen shows:

  • Object ID - used for customer managed keys

  • Role assignments - click link to assign relevant roles

    System assigned identity on

Disable a system-assigned identity

Removing a system-assigned identity will also delete it from AAD. System-assigned identities are also automatically removed from AAD when the cluster resource is deleted. A system-assigned identity can be removed by disabling the feature. The system-assigned identity is removed using C#, ARM templates, or the Azure portal as detailed below.

Disable a system-assigned identity using the Azure portal

  1. Sign in to the Azure portal.

  2. Select Settings > Identity in left pane of portal.

  3. In the Identity pane > System assigned tab:

    1. Move the Status slider to Off.
    2. Select Save
    3. In the pop-up window, select Yes to disable the system-assigned identity. The Identity pane reverts to same condition as before the addition of the system-assigned identity.

    System assigned identity off

Next steps