<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secret scope with Azure RBAC in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/87816#M1715</link>
    <description>&lt;P&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/79106"&gt;@daniel_sahal&lt;/a&gt;&amp;nbsp; I'm not a fan of this solution either. The worst part is that neither Databricks nor Microsoft want to address this issue. And it's been known for years...&lt;BR /&gt;From security perspective, I think it's better to handle secrets by yourself, i.e writing custom library. That way you have much more granular control over who has access to what.&lt;/P&gt;</description>
    <pubDate>Tue, 03 Sep 2024 09:41:44 GMT</pubDate>
    <dc:creator>szymon_dybczak</dc:creator>
    <dc:date>2024-09-03T09:41:44Z</dc:date>
    <item>
      <title>Secret scope with Azure RBAC</title>
      <link>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/86836#M1683</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;We have lots of Azure keyvaults that we use in our Azure Databricks workspaces. We have created secret scopes that are backed by the keyvaults. Azure supports two ways of authenticating to keyvaults:&lt;/P&gt;&lt;P&gt;- Access policies, which has been marked as legacy.&lt;/P&gt;&lt;P&gt;- Role-based access control (RBAC), which is a unified standard in all Azure services.&lt;/P&gt;&lt;P&gt;The Databricks secret scopes can only be defined using access policies. Given that Azure stirs towards RBAC, is there a plan to support RBAC for secret scopes?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 11:03:20 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/86836#M1683</guid>
      <dc:creator>achistef</dc:creator>
      <dc:date>2024-08-30T11:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: Secret scope with Azure RBAC</title>
      <link>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/87148#M1698</link>
      <description>&lt;P&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/97555"&gt;@achistef&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually, RBAC is supported for authentication for the secret scopes.&lt;/P&gt;&lt;P&gt;The thing is, when you setup the secret scope, Databricks is automatically assigning permissions through access policies. With RBAC - you'll need to grant the role on your own.&lt;BR /&gt;&lt;BR /&gt;As a test:&lt;/P&gt;&lt;P data-unlink="true"&gt;1. I've created an Azure KeyVault with "&lt;SPAN&gt;Azure role-based access control" as a permission model.&lt;BR /&gt;2. Navigated to&amp;nbsp;https://&amp;lt;databricks-instance&amp;gt;#secrets/createScope&amp;nbsp;and created a secret scope&lt;BR /&gt;3. In Azure KeyVault IAM, added&amp;nbsp;Key Vault Secrets User to the AzureDatabricks (fa5c679a-c02e-4f33-a397-7419315171b3) Application&lt;BR /&gt;4. Created a test secret and tried to access that from a notebook. Tada, it works.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2024 06:29:07 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/87148#M1698</guid>
      <dc:creator>daniel_sahal</dc:creator>
      <dc:date>2024-09-02T06:29:07Z</dc:date>
    </item>
    <item>
      <title>Re: Secret scope with Azure RBAC</title>
      <link>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/87152#M1699</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/97555"&gt;@achistef&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As Daniel mentioned, RBAC is supported, but you should be aware of the consequences it entails.&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;For Datbricks to connect to Keyvault on RBAC we add AzureDatabricks Enterprise Application ID in RBAC, but this allows all the Databricks instances deployed in that tenant to have an access to that KeyVault.&lt;BR /&gt;You can read more in below discussion:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://learn.microsoft.com/en-us/answers/questions/690162/allow-only-a-specific-azure-databricks-instance-to" target="_blank" rel="noopener"&gt;Allow only a specific Azure Databricks instance to connect to keyvault - Microsoft Q&amp;amp;A&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;And here is video how to configure Databricks and KeyVault using RBAC:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.youtube.com/watch?v=NQv8a8MSVls&amp;amp;t=621s" target="_blank"&gt;Unlocking Secrets in Azure Databricks with Azure Key Vault! &lt;span class="lia-unicode-emoji" title=":old_key:"&gt;🗝&lt;/span&gt;️&lt;span class="lia-unicode-emoji" title=":sparkles:"&gt;✨&lt;/span&gt; | Azure Databricks Tutorials (youtube.com)&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2024 06:59:23 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/87152#M1699</guid>
      <dc:creator>szymon_dybczak</dc:creator>
      <dc:date>2024-09-02T06:59:23Z</dc:date>
    </item>
    <item>
      <title>Re: Secret scope with Azure RBAC</title>
      <link>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/87767#M1713</link>
      <description>&lt;P&gt;That is very helpful, thank you for your answers.&lt;/P&gt;&lt;P&gt;FYI there is some outdated documentation about this topic&amp;nbsp;&lt;BR /&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/databricks/security/secrets/secret-scopes#configure-your-azure-key-vault-instance-for-azure-databricks" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/databricks/security/secrets/secret-scopes#configure-your-azure-key-vault-instance-for-azure-databricks&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 05:29:50 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/87767#M1713</guid>
      <dc:creator>achistef</dc:creator>
      <dc:date>2024-09-03T05:29:50Z</dc:date>
    </item>
    <item>
      <title>Re: Secret scope with Azure RBAC</title>
      <link>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/87771#M1714</link>
      <description>&lt;P&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/110502"&gt;@szymon_dybczak&lt;/a&gt;&amp;nbsp;When using Access Policies, you're still adding the permissions to AzureDatabricks SP, so it's kinda the same issue as with RBAC. That's why I'm not a big fan of having secret scopes at all.&lt;/P&gt;&lt;P&gt;What's more, to even create a secret scope in Databricks, you need (i mean, a user who creates a secret scope) a Contributor or Owner role on the KeyVault, so that's a little bit of security that was added here.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 06:59:34 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/87771#M1714</guid>
      <dc:creator>daniel_sahal</dc:creator>
      <dc:date>2024-09-03T06:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: Secret scope with Azure RBAC</title>
      <link>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/87816#M1715</link>
      <description>&lt;P&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/79106"&gt;@daniel_sahal&lt;/a&gt;&amp;nbsp; I'm not a fan of this solution either. The worst part is that neither Databricks nor Microsoft want to address this issue. And it's been known for years...&lt;BR /&gt;From security perspective, I think it's better to handle secrets by yourself, i.e writing custom library. That way you have much more granular control over who has access to what.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 09:41:44 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/87816#M1715</guid>
      <dc:creator>szymon_dybczak</dc:creator>
      <dc:date>2024-09-03T09:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: Secret scope with Azure RBAC</title>
      <link>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/93981#M2057</link>
      <description>&lt;P&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/79106"&gt;@daniel_sahal&lt;/a&gt;&amp;nbsp;Where in the portal did you get the App ID for&amp;nbsp;&lt;SPAN&gt;AzureDatabricks (fa5c679a-c02e-4f33-a397-7419315171b3) Application? I can't seem to find it. Thanks.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2024 06:02:43 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/93981#M2057</guid>
      <dc:creator>Chamak</dc:creator>
      <dc:date>2024-10-15T06:02:43Z</dc:date>
    </item>
    <item>
      <title>Re: Secret scope with Azure RBAC</title>
      <link>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/100534#M2432</link>
      <description>&lt;P&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/126880"&gt;@Chamak&lt;/a&gt;&amp;nbsp;You can find 'AzureDatabricks' in User, group or service principal assignment. You dont need to find application id, as it will automatically displayed when you add AzureDatabricks as member.&lt;/P&gt;
&lt;P&gt;cc:&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/79106"&gt;@daniel_sahal&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Screenshot 2024-12-01 at 10.41.11 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.databricks.com/t5/image/serverpage/image-id/13252iCB7D78C49B5DCA05/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2024-12-01 at 10.41.11 PM.png" alt="Screenshot 2024-12-01 at 10.41.11 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Dec 2024 19:47:59 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/secret-scope-with-azure-rbac/m-p/100534#M2432</guid>
      <dc:creator>kuldeep-in</dc:creator>
      <dc:date>2024-12-01T19:47:59Z</dc:date>
    </item>
  </channel>
</rss>

