<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to create secret scope -&amp;quot;Fetch request failed due expired user session&amp;quot; in Data Engineering</title>
    <link>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153911#M54027</link>
    <description>&lt;P&gt;Thanks a lot LR for the detailed breakdown!&lt;/P&gt;&lt;P&gt;This was very helpful in narrowing things down. I’ve walked through the checks you outlined and wanted to share what I’m seeing so far:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Networking / AKV Firewall&lt;/STRONG&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;Based on discussions with our network team, temporarily enabling &lt;EM&gt;“Allow public access from all networks”&lt;/EM&gt; requires a policy exemption, so we haven’t been able to test that path yet.&lt;/LI&gt;&lt;LI&gt;But we did add the &lt;STRONG&gt;Databricks control plane IPs for East US&lt;/STRONG&gt; to the Key Vault firewall.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;“Allow trusted Microsoft services to bypass this firewall”&lt;/STRONG&gt; is already enabled.&lt;/LI&gt;&lt;LI&gt;The workspace is &lt;STRONG&gt;SCC-enabled&lt;/STRONG&gt;:&lt;/LI&gt;&lt;LI&gt;How do we correctly allowlist the SCC-related domains/endpoints in the Key Vault firewall? Saw mentions of Service Tags in the MS docs but was not sure if there was an explicit step/way to add domains yet.&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AnandGNR_0-1775738251807.png" style="width: 400px;"&gt;&lt;img src="https://community.databricks.com/t5/image/serverpage/image-id/25850iE338088D96533386/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AnandGNR_0-1775738251807.png" alt="AnandGNR_0-1775738251807.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AnandGNR_1-1775738266340.png" style="width: 400px;"&gt;&lt;img src="https://community.databricks.com/t5/image/serverpage/image-id/25851iEB40E03F24712747/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AnandGNR_1-1775738266340.png" alt="AnandGNR_1-1775738266340.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Permissions Model:&lt;/STRONG&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;Confirmed that the Key Vault is using &lt;STRONG&gt;Vault Access Policy&lt;/STRONG&gt; mode (not RBAC).&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;&lt;STRONG&gt;CLI Attempt (userAADToken error)&lt;/STRONG&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;I tried creating the scope via CLI, but I’m hitting:&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Error: Scope with Azure KeyVault must have userAADToken defined!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;OL&gt;&lt;UL&gt;&lt;LI&gt;Using this json config:&lt;/LI&gt;&lt;/UL&gt;&lt;/OL&gt;&lt;P&gt;{&lt;BR /&gt;&amp;nbsp; "scope": "scope_name",&lt;BR /&gt;&amp;nbsp; "initial_manage_principal": "users",&lt;BR /&gt;&amp;nbsp; "scope_backend_type": "AZURE_KEYVAULT",&lt;BR /&gt;&amp;nbsp; "backend_azure_keyvault": {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; "resource_id": "/subscriptions/&amp;lt;SUB_ID&amp;gt;/resourceGroups/&amp;lt;RG_NAME&amp;gt;/providers/Microsoft.KeyVault/vaults/&amp;lt;VAULT_NAME&amp;gt;",&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; "dns_name": "https://&amp;lt;VAULT_NAME&amp;gt;.vault.azure.net/"&lt;BR /&gt;&amp;nbsp; }&lt;BR /&gt;}&lt;/P&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;I found this KB article addressing the issue, but I’m not fully clear on implementing it yet.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://kb.databricks.com/security/creating-an-azure-key-vault-backed-secret-scope-with-the-databricks-cli-fails-with-a-useraadtoken-error#:~:text=Note,backed%20secret%20scope%20requirements%20documentation.&amp;amp;text=Where:,when%20you%20created%20client%20credentials" target="_blank"&gt;https://kb.databricks.com/security/creating-an-azure-key-vault-backed-secret-scope-with-the-databricks-cli-fails-with-a-useraadtoken-error#:~:text=Note,backed%20secret%20scope%20requirements%20documentation.&amp;amp;text=Where:,when%20you%20created%20client%20credentials&lt;/A&gt;.&lt;/LI&gt;&lt;LI&gt;Would you have pointers/advice on what would be the implementation steps needed or how we could resolve the error observed with may be another approach.&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;&lt;STRONG&gt;AzureDatabricks SP&lt;/STRONG&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;Confirmed that the &lt;STRONG&gt;AzureDatabricks enterprise application exists&lt;/STRONG&gt; in our tenant and the App ID matches.&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;Appreciate the direction so far. It definitely helped isolate this further!&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
    <pubDate>Thu, 09 Apr 2026 12:43:38 GMT</pubDate>
    <dc:creator>AnandGNR</dc:creator>
    <dc:date>2026-04-09T12:43:38Z</dc:date>
    <item>
      <title>Unable to create secret scope -"Fetch request failed due expired user session"</title>
      <link>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153637#M53980</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I’m trying to create an &lt;STRONG&gt;Azure Key Vault-backed secret scope&lt;/STRONG&gt; in a &lt;STRONG&gt;Databricks Premium workspace&lt;/STRONG&gt;, but I keep getting this error:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Fetch request failed due expired user session&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Setup details:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Databricks workspace: Premium&lt;/LI&gt;&lt;LI&gt;Azure Key Vault: Owner permissions on my account.&lt;/LI&gt;&lt;LI&gt;Databricks roles: Workspace &amp;amp; account admin&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;AzureDatabricks SP: Get and List permissions with AcessPolicies&lt;/LI&gt;&lt;LI&gt;Key Vault Networking: firewall: Public access allowed from selected networks. It also has a Private Endpoint.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;What I’ve tried:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Cleared browser cache, retried from multiple users who have owner/contributor access on the KV&lt;/LI&gt;&lt;LI&gt;Verified all permissions based on&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/databricks/security/secrets/#akv-ss" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/databricks/security/secrets/#akv-ss&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Still no luck.&lt;/P&gt;&lt;P&gt;Has anyone faced this issue? Any workarounds/pointers would be appreciated!&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 15:58:15 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153637#M53980</guid>
      <dc:creator>AnandGNR</dc:creator>
      <dc:date>2026-04-07T15:58:15Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to create secret scope -"Fetch request failed due expired user session"</title>
      <link>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153641#M53983</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/141160"&gt;@AnandGNR&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The error message "Fetch request failed due expired user session" is a bit misleading here — it's not actually about your browser session. It's a known quirk of the Databricks secret scope creation UI/API when it can't successfully reach or validate the Azure Key Vault endpoint during the creation flow. Here's a structured breakdown of what to check:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1. The Real Culprit: Network Connectivity from Databricks to AKV&lt;/STRONG&gt;&lt;BR /&gt;Your Key Vault has "Public access from selected networks" enabled with a Private Endpoint. This is almost certainly the root cause.&lt;BR /&gt;When Databricks tries to validate the AKV URI during secret scope creation, that call originates from the Databricks control plane, not your browser or your workspace VNet. If the AKV firewall doesn't allow the Databricks control plane IPs, the handshake fails — and the UI surfaces this confusingly as a "session" error.&lt;BR /&gt;Fix options:&lt;/P&gt;&lt;P&gt;Temporarily set AKV to "Allow public access from all networks" while creating the scope, then lock it back down. This is the fastest way to confirm if networking is the issue.&lt;BR /&gt;Add Databricks control plane IPs to the AKV firewall allowlist. For Azure Databricks on Azure, the control plane egress IPs vary by region. Find yours here: Azure Databricks IP addresses&lt;BR /&gt;Ensure "Allow trusted Microsoft services to bypass this firewall" is checked in your AKV networking tab — Databricks (as an Azure-native service) can leverage this.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. Access Policy vs. RBAC Mode Mismatch&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;You mentioned setting Get and List on the AzureDatabricks service principal via Access Policies. Make sure your AKV is actually in Vault Access Policy mode, not Azure RBAC mode — these are mutually exclusive.&lt;/P&gt;&lt;P&gt;Go to AKV → Access configuration → check the Permission model&lt;BR /&gt;If it's set to Azure role-based access control, your Access Policy grants are being silently ignored. In that case, assign the Key Vault Secrets User role to the AzureDatabricks SP via IAM instead&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;3. Use the CLI Instead of the UI&lt;/STRONG&gt;&lt;BR /&gt;The #secrets/createScope UI page in Databricks is notoriously fragile for AKV-backed scopes. Use the REST API or Databricks CLI directly — it gives much better error messages:&lt;/P&gt;&lt;P&gt;databricks secrets create-scope \&lt;BR /&gt;--scope &amp;lt;scope-name&amp;gt; \&lt;BR /&gt;--scope-backend-type AZURE_KEYVAULT \&lt;BR /&gt;--resource-id /subscriptions/&amp;lt;sub-id&amp;gt;/resourceGroups/&amp;lt;rg&amp;gt;/providers/Microsoft.KeyVault/vaults/&amp;lt;vault-name&amp;gt; \&lt;BR /&gt;--dns-name https://&amp;lt;vault-name&amp;gt;.vault.azure.net/&lt;/P&gt;&lt;P&gt;If this fails, the error returned will be far more specific than the UI's generic session message.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4. Verify the AzureDatabricks SP is Registered in Your Tenant&lt;/STRONG&gt;&lt;BR /&gt;The AzureDatabricks enterprise application must exist in your AAD tenant (it's auto-created the first time someone logs into Databricks in the tenant, but occasionally it's missing).&lt;/P&gt;&lt;P&gt;az ad sp list --display-name "AzureDatabricks" --query "[].{AppId:appId, Id:id}"&lt;/P&gt;&lt;P&gt;If this returns empty, you need to provision it:&lt;BR /&gt;az ad sp create --id 2ff814a6-3304-4ab8-85cb-cd0e6f879c1d&lt;/P&gt;&lt;P&gt;That GUID is the well-known App ID for the AzureDatabricks first-party application.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Recommended Sequence&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Confirm the AzureDatabricks SP exists in your tenant (step 4)&lt;BR /&gt;Confirm AKV permission model matches how you granted access (step 2)&lt;BR /&gt;Temporarily open AKV firewall to all networks and retry via CLI (steps 1 + 3)&lt;BR /&gt;If it works, re-lock the firewall and add the correct control plane IPs to the allowlist&lt;/P&gt;&lt;P&gt;The combination of the Private Endpoint + selected-network firewall is the most common cause of this exact symptom. The CLI approach will also get you out of the UI's session-validation quirks entirely.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 16:42:05 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153641#M53983</guid>
      <dc:creator>lingareddy_Alva</dc:creator>
      <dc:date>2026-04-07T16:42:05Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to create secret scope -"Fetch request failed due expired user session"</title>
      <link>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153642#M53984</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/141160"&gt;@AnandGNR&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Try to do following. Go to your KeyVault, then in Firewalls and virtual networks set:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"Allow trusted Microsoft services to bypass this firewall&lt;/STRONG&gt;&lt;SPAN&gt;."&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 16:44:33 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153642#M53984</guid>
      <dc:creator>szymon_dybczak</dc:creator>
      <dc:date>2026-04-07T16:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to create secret scope -"Fetch request failed due expired user session"</title>
      <link>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153911#M54027</link>
      <description>&lt;P&gt;Thanks a lot LR for the detailed breakdown!&lt;/P&gt;&lt;P&gt;This was very helpful in narrowing things down. I’ve walked through the checks you outlined and wanted to share what I’m seeing so far:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Networking / AKV Firewall&lt;/STRONG&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;Based on discussions with our network team, temporarily enabling &lt;EM&gt;“Allow public access from all networks”&lt;/EM&gt; requires a policy exemption, so we haven’t been able to test that path yet.&lt;/LI&gt;&lt;LI&gt;But we did add the &lt;STRONG&gt;Databricks control plane IPs for East US&lt;/STRONG&gt; to the Key Vault firewall.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;“Allow trusted Microsoft services to bypass this firewall”&lt;/STRONG&gt; is already enabled.&lt;/LI&gt;&lt;LI&gt;The workspace is &lt;STRONG&gt;SCC-enabled&lt;/STRONG&gt;:&lt;/LI&gt;&lt;LI&gt;How do we correctly allowlist the SCC-related domains/endpoints in the Key Vault firewall? Saw mentions of Service Tags in the MS docs but was not sure if there was an explicit step/way to add domains yet.&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AnandGNR_0-1775738251807.png" style="width: 400px;"&gt;&lt;img src="https://community.databricks.com/t5/image/serverpage/image-id/25850iE338088D96533386/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AnandGNR_0-1775738251807.png" alt="AnandGNR_0-1775738251807.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AnandGNR_1-1775738266340.png" style="width: 400px;"&gt;&lt;img src="https://community.databricks.com/t5/image/serverpage/image-id/25851iEB40E03F24712747/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AnandGNR_1-1775738266340.png" alt="AnandGNR_1-1775738266340.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Permissions Model:&lt;/STRONG&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;Confirmed that the Key Vault is using &lt;STRONG&gt;Vault Access Policy&lt;/STRONG&gt; mode (not RBAC).&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;&lt;STRONG&gt;CLI Attempt (userAADToken error)&lt;/STRONG&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;I tried creating the scope via CLI, but I’m hitting:&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Error: Scope with Azure KeyVault must have userAADToken defined!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;OL&gt;&lt;UL&gt;&lt;LI&gt;Using this json config:&lt;/LI&gt;&lt;/UL&gt;&lt;/OL&gt;&lt;P&gt;{&lt;BR /&gt;&amp;nbsp; "scope": "scope_name",&lt;BR /&gt;&amp;nbsp; "initial_manage_principal": "users",&lt;BR /&gt;&amp;nbsp; "scope_backend_type": "AZURE_KEYVAULT",&lt;BR /&gt;&amp;nbsp; "backend_azure_keyvault": {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; "resource_id": "/subscriptions/&amp;lt;SUB_ID&amp;gt;/resourceGroups/&amp;lt;RG_NAME&amp;gt;/providers/Microsoft.KeyVault/vaults/&amp;lt;VAULT_NAME&amp;gt;",&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; "dns_name": "https://&amp;lt;VAULT_NAME&amp;gt;.vault.azure.net/"&lt;BR /&gt;&amp;nbsp; }&lt;BR /&gt;}&lt;/P&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;I found this KB article addressing the issue, but I’m not fully clear on implementing it yet.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://kb.databricks.com/security/creating-an-azure-key-vault-backed-secret-scope-with-the-databricks-cli-fails-with-a-useraadtoken-error#:~:text=Note,backed%20secret%20scope%20requirements%20documentation.&amp;amp;text=Where:,when%20you%20created%20client%20credentials" target="_blank"&gt;https://kb.databricks.com/security/creating-an-azure-key-vault-backed-secret-scope-with-the-databricks-cli-fails-with-a-useraadtoken-error#:~:text=Note,backed%20secret%20scope%20requirements%20documentation.&amp;amp;text=Where:,when%20you%20created%20client%20credentials&lt;/A&gt;.&lt;/LI&gt;&lt;LI&gt;Would you have pointers/advice on what would be the implementation steps needed or how we could resolve the error observed with may be another approach.&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;&lt;STRONG&gt;AzureDatabricks SP&lt;/STRONG&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;Confirmed that the &lt;STRONG&gt;AzureDatabricks enterprise application exists&lt;/STRONG&gt; in our tenant and the App ID matches.&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;Appreciate the direction so far. It definitely helped isolate this further!&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 12:43:38 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153911#M54027</guid>
      <dc:creator>AnandGNR</dc:creator>
      <dc:date>2026-04-09T12:43:38Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to create secret scope -"Fetch request failed due expired user session"</title>
      <link>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153913#M54028</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/110502"&gt;@szymon_dybczak&lt;/a&gt;&amp;nbsp;:&amp;nbsp;Confirming this was already in place from the onset. Thanks!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 12:57:54 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153913#M54028</guid>
      <dc:creator>AnandGNR</dc:creator>
      <dc:date>2026-04-09T12:57:54Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to create secret scope -"Fetch request failed due expired user session"</title>
      <link>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153943#M54033</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/141160"&gt;@AnandGNR&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;The userAADToken error means the CLI doesn't support AKV scope creation — use the REST API directly with an Azure AD token instead of a&amp;nbsp;Personal Access Token.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 15:16:55 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153943#M54033</guid>
      <dc:creator>lingareddy_Alva</dc:creator>
      <dc:date>2026-04-09T15:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to create secret scope -"Fetch request failed due expired user session"</title>
      <link>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153948#M54034</link>
      <description>&lt;P&gt;Hi LR,&lt;/P&gt;&lt;P&gt;This is the sanitized version of the error response using the AD token and the secrets api:&amp;nbsp;&lt;/P&gt;&lt;P&gt;"ERROR: Response status code does not indicate success: 401 (Unauthorized).&lt;/P&gt;&lt;P&gt;{&lt;BR /&gt;"error_code": "CUSTOMER_UNAUTHORIZED",&lt;BR /&gt;"message": "Unable to grant read/list permission to Databricks service principal to KeyVault 'https://&amp;lt;VAULT_NAME&amp;gt;.vault.azure.net/': Status code 403, '{\"error\": {\"code\": \"RequestDisallowedByPolicy\", \"target\": \"&amp;lt;VAULT_NAME&amp;gt;\", \"message\": \"Resource '&amp;lt;VAULT_NAME&amp;gt;' was disallowed by policy. Policy identifiers: '[{\"policyAssignment\":{\"name\":\"Private endpoint must be configured for Key Vault\",\"id\":\"&amp;lt;POLICY_ASSIGNMENT_ID&amp;gt;\"},\"policyDefinition\":{\"name\":\"Key Vault - Private endpoint must be configured\",\"id\":\"&amp;lt;POLICY_DEFINITION_ID&amp;gt;\",\"version\":\"1.0.0\"}}]'\"}, \"additionalInfo\": [{\"type\": \"PolicyViolation\", \"info\": {\"evaluationDetails\": {\"evaluatedExpressions\": [{\"result\": \"True\", \"expressionKind\": \"Field\", \"expression\": \"type\", \"path\": \"type\", \"expressionValue\": \"Microsoft.KeyVault/vaults\", \"targetValue\": \"Microsoft.KeyVault/vaults\", \"operator\": \"Equals\"}, {\"result\": \"True\", \"expressionKind\": \"Field\", \"expression\": \"Microsoft.KeyVault/vaults/privateEndpointConnections\", \"path\": \"properties.privateEndpointConnections\", \"targetValue\": \"false\", \"operator\": \"Exists\"}]}, \"policyDefinitionId\": \"&amp;lt;POLICY_DEFINITION_ID&amp;gt;\", \"policyDefinitionName\": \"&amp;lt;POLICY_DEFINITION_ID&amp;gt;\", \"policyDefinitionDisplayName\": \"Key Vault - Private endpoint must be configured\", \"policyDefinitionVersion\": \"1.0.0\", \"policyDefinitionEffect\": \"deny\", \"policyAssignmentId\": \"&amp;lt;POLICY_ASSIGNMENT_ID&amp;gt;\", \"policyAssignmentName\": \"&amp;lt;POLICY_ASSIGNMENT_ID&amp;gt;\", \"policyAssignmentDisplayName\": \"Private endpoint must be configured for Key Vault\", \"policyAssignmentScope\": \"&amp;lt;POLICY_SCOPE&amp;gt;\", \"policyAssignmentParameters\": {}, \"policyExemptionIds\": [], \"policyEnrollmentIds\": []}}]}'",&lt;BR /&gt;"details": [&lt;BR /&gt;{&lt;BR /&gt;"@type": "type.googleapis.com/google.rpc.RequestInfo",&lt;BR /&gt;"request_id": "&amp;lt;REQUEST_ID&amp;gt;",&lt;BR /&gt;"serving_data": ""&lt;BR /&gt;}]&lt;BR /&gt;}"&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 15:48:53 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153948#M54034</guid>
      <dc:creator>AnandGNR</dc:creator>
      <dc:date>2026-04-09T15:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to create secret scope -"Fetch request failed due expired user session"</title>
      <link>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153956#M54041</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/141160"&gt;@AnandGNR&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;My understanding based on above error was your org has a policy: "Private endpoint must be configured for Key Vault" with effect deny. When Databricks tries to programmatically grant its SP Get/List on your vault during scope creation, Azure Policy intercepts that ARM call and blocks it because the vault modification is being initiated outside the private endpoint path.&lt;/P&gt;&lt;P&gt;The ball is in your Azure Policy admin's court. The Databricks control plane has no way to route its ARM calls through a private endpoint.&lt;/P&gt;&lt;P&gt;This is purely my understanding , please talk to you Azure policy Admin&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/141160"&gt;@AnandGNR&lt;/a&gt;&amp;nbsp;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 16:13:25 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/unable-to-create-secret-scope-quot-fetch-request-failed-due/m-p/153956#M54041</guid>
      <dc:creator>lingareddy_Alva</dc:creator>
      <dc:date>2026-04-09T16:13:25Z</dc:date>
    </item>
  </channel>
</rss>

