<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Disable Public Network Access on Databricks Managed Storage Account - Deny Assignment in Data Engineering</title>
    <link>https://community.databricks.com/t5/data-engineering/disable-public-network-access-on-databricks-managed-storage/m-p/154760#M54136</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Issue Description:&lt;/STRONG&gt;&lt;BR /&gt;I am attempting to disable public network access on the Azure &lt;STRONG&gt;Databricks managed storage account&lt;/STRONG&gt;. However, I am encountering the following error:&lt;/P&gt;&lt;P&gt;Failed to save resource settings — access is denied due to a deny assignment created by Azure Databricks on the managed resource group.&lt;/P&gt;&lt;P&gt;Although the client has Microsoft.Storage/storageAccounts/write permission, the operation is blocked by a &lt;STRONG&gt;system deny assignment&lt;/STRONG&gt; associated with the Databricks workspace.&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;goal is to block all public access to the databricks managed storage account&lt;/STRONG&gt; while ensuring secure connectivity for:&lt;/P&gt;&lt;P&gt;&amp;nbsp;-- Control Plane → Storage Account&lt;BR /&gt;-- Compute Plane (Databricks clusters) → Storage Account&lt;BR /&gt;-- External Sources → Storage Account (via Private Endpoint or other secure mechanisms only)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Context / Query:&lt;/STRONG&gt;&lt;BR /&gt;Based on the Microsoft documentation on Databricks storage firewall support, it mentions:&lt;/P&gt;&lt;P&gt;"&lt;A href="https://learn.microsoft.com/en-us/azure/databricks/security/network/storage/firewall-support" target="_blank"&gt;Enable firewall support for your workspace storage account - Azure Databricks | Microsoft Learn&lt;/A&gt;"&lt;/P&gt;&lt;P&gt;“Contact your Azure Databricks account team to update the managed resource group configuration before proceeding.”&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I would like to understand:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp; Whether the firewall support approach allows disabling public network access for the managed storage account&lt;BR /&gt;2). If not directly, what is the recommended architecture/configuration to:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; a). Restrict public access&lt;BR /&gt;&amp;nbsp; &amp;nbsp; b). Ensure Control Plane and Compute Plane connectivity&lt;BR /&gt;&amp;nbsp; &amp;nbsp; c). Enable secure external access (Private Endpoint / VNet-based access)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Ask:&lt;/STRONG&gt;&lt;BR /&gt;--&amp;gt; Whether disabling public access on the managed storage account is supported in this setup&lt;BR /&gt;--&amp;gt; If yes, the exact steps/configuration required&lt;BR /&gt;--&amp;gt; If not, the alternative secure approach to meet the above requirements&lt;/P&gt;</description>
    <pubDate>Thu, 16 Apr 2026 17:52:13 GMT</pubDate>
    <dc:creator>MyProfile</dc:creator>
    <dc:date>2026-04-16T17:52:13Z</dc:date>
    <item>
      <title>Disable Public Network Access on Databricks Managed Storage Account - Deny Assignment</title>
      <link>https://community.databricks.com/t5/data-engineering/disable-public-network-access-on-databricks-managed-storage/m-p/154760#M54136</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Issue Description:&lt;/STRONG&gt;&lt;BR /&gt;I am attempting to disable public network access on the Azure &lt;STRONG&gt;Databricks managed storage account&lt;/STRONG&gt;. However, I am encountering the following error:&lt;/P&gt;&lt;P&gt;Failed to save resource settings — access is denied due to a deny assignment created by Azure Databricks on the managed resource group.&lt;/P&gt;&lt;P&gt;Although the client has Microsoft.Storage/storageAccounts/write permission, the operation is blocked by a &lt;STRONG&gt;system deny assignment&lt;/STRONG&gt; associated with the Databricks workspace.&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;goal is to block all public access to the databricks managed storage account&lt;/STRONG&gt; while ensuring secure connectivity for:&lt;/P&gt;&lt;P&gt;&amp;nbsp;-- Control Plane → Storage Account&lt;BR /&gt;-- Compute Plane (Databricks clusters) → Storage Account&lt;BR /&gt;-- External Sources → Storage Account (via Private Endpoint or other secure mechanisms only)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Context / Query:&lt;/STRONG&gt;&lt;BR /&gt;Based on the Microsoft documentation on Databricks storage firewall support, it mentions:&lt;/P&gt;&lt;P&gt;"&lt;A href="https://learn.microsoft.com/en-us/azure/databricks/security/network/storage/firewall-support" target="_blank"&gt;Enable firewall support for your workspace storage account - Azure Databricks | Microsoft Learn&lt;/A&gt;"&lt;/P&gt;&lt;P&gt;“Contact your Azure Databricks account team to update the managed resource group configuration before proceeding.”&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I would like to understand:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp; Whether the firewall support approach allows disabling public network access for the managed storage account&lt;BR /&gt;2). If not directly, what is the recommended architecture/configuration to:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; a). Restrict public access&lt;BR /&gt;&amp;nbsp; &amp;nbsp; b). Ensure Control Plane and Compute Plane connectivity&lt;BR /&gt;&amp;nbsp; &amp;nbsp; c). Enable secure external access (Private Endpoint / VNet-based access)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Ask:&lt;/STRONG&gt;&lt;BR /&gt;--&amp;gt; Whether disabling public access on the managed storage account is supported in this setup&lt;BR /&gt;--&amp;gt; If yes, the exact steps/configuration required&lt;BR /&gt;--&amp;gt; If not, the alternative secure approach to meet the above requirements&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2026 17:52:13 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/disable-public-network-access-on-databricks-managed-storage/m-p/154760#M54136</guid>
      <dc:creator>MyProfile</dc:creator>
      <dc:date>2026-04-16T17:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Disable Public Network Access on Databricks Managed Storage Account - Deny Assignment</title>
      <link>https://community.databricks.com/t5/data-engineering/disable-public-network-access-on-databricks-managed-storage/m-p/154784#M54142</link>
      <description>&lt;P&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/225471"&gt;@MyProfile&lt;/a&gt;&amp;nbsp;This would be helpful, check once -&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/answers/questions/1707749/managed-storage-accounts-compliance" target="_blank"&gt;https://learn.microsoft.com/en-us/answers/questions/1707749/managed-storage-accounts-compliance&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Apr 2026 06:19:28 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/disable-public-network-access-on-databricks-managed-storage/m-p/154784#M54142</guid>
      <dc:creator>Sumit_7</dc:creator>
      <dc:date>2026-04-17T06:19:28Z</dc:date>
    </item>
  </channel>
</rss>

