Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Not helpful: Using Managed Identity with Azure Communication Services #123308

Open
jordanmills opened this issue Jun 12, 2024 · 5 comments
Open

Comments

@jordanmills
Copy link

Section Using Managed Identity with Azure Communication Services makes no sense

It basically says to enable system assigned managed identity on an ACS resource, then give that identity access to the resource it represents. Maybe it means to grant some other managed identity access to the ACS resource, but it also does not say what access to grant. This should be rewritten for clarity and specify exactly what access to grant for what functionality.

Also the second to last sentence is a fragment that makes no sense. "Now that you have learned how to enable Managed Identity with Azure Communication Services."


Document Details

Do not edit this section. It is required for learn.microsoft.com ➟ GitHub issue linking.

@TPavanBalaji
Copy link
Contributor

@jordanmills
Thanks for your feedback! We will investigate and update as appropriate.

@AjayKumar-MSFT
Copy link
Contributor

Thanks for bringing this to our attention. Your feedback has been shared with the content owner for further review.

@ascott18
Copy link

ascott18 commented Oct 18, 2024

Just submitted some feedback from the on-page feedback buttons on this. Its crazy how hard it is to figure out how to authenticate to this service with managed authentication. The fact that this page claims to be explaining this but is in fact describing the exact opposite (how to let ACS authenticate to other resources) is disappointing.

The real documentation for this is nested under the SMTP articles for some reason. https://learn.microsoft.com/en-us/azure/communication-services/quickstarts/email/send-email-smtp/smtp-authentication#creating-a-custom-email-role-for-the-microsoft-entra-application

Tucked away in this article is the fact that you need to assign the "Contributor" privileged admin role to principals that need to send email, which is kind of crazy in and of itself - why is there not a built-in role that grants email-sending permissions? I don't think I've ever seen any other Azure service where the official instructions for granting the most basic usage permission of a resource starts out with "here's how to create custom roles in azure".

@ascott18
Copy link

Related: #109461

@jordanmills
Copy link
Author

Just submitted some feedback from the on-page feedback buttons on this. Its crazy how hard it is to figure out how to authenticate to this service with managed authentication. The fact that this page claims to be explaining this but is in fact describing the exact opposite (how to let ACS authenticate to other resources) is disappointing.

The real documentation for this is nested under the SMTP articles for some reason. https://learn.microsoft.com/en-us/azure/communication-services/quickstarts/email/send-email-smtp/smtp-authentication#creating-a-custom-email-role-for-the-microsoft-entra-application

Tucked away in this article is the fact that you need to assign the "Contributor" privileged admin role to principals that need to send email, which is kind of crazy in and of itself - why is there not a built-in role that grants email-sending permissions? I don't think I've ever seen any other Azure service where the official instructions for granting the most basic usage permission of a resource starts out with "here's how to create custom roles in azure".

Thank you, that definitely helps. Or at least demonstrates the futility. That's the kind of thing that should be a data plane action. There's no world where it's okay to give a client application full control of a resource it needs to use for a specific purpose. How am I supposed to take any of this seriously when least operating privilege isn't even an afterthought?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants