Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Task 01: Create Azure Key Vault-backed secret scope for workspace

To reference the client secret stored in an Azure Key Vault, you can create a secret scope backed by Azure Key Vault in Azure Databricks.

  1. Return to the browser tab that is signed into the Azure portal, go to the Home page.

  2. Go to Resource groups > RG1 and select the Azure Databricks Service resource named, dbkws@lab.LabInstance.Id.

  3. On the Azure Databricks Service page, in the Essentials section, copy the URL here: @lab.TextBox(DBURL)

  4. Select Launch Workspace to authenticate your Azure credentials to the workspace.

    Now that you have authenticated, you will create a secret scope for the workspace for secure access to the workspace.

  5. Open a new browser tab and go to @lab.Variable(DBURL)#secrets/createScope.

    This URL is case sensitive; scope in createScope must be uppercase.

  6. Select Sign in with Microsoft Entra ID if prompted.

  7. On the Create Secret Scope page, enter the following informatoin and then select Create.

    Default Value
    Scope Name scopesecret
    Managing Principal All workspace Users
      Azure Key Vault settings
    DNS Name [Your Azure Key Vault DNS Name, e.g., https://your-keyvault-name.vault.azure.net/]
    Resource ID [Your Azure Key Vault Resource ID]

    azure-kv-scope.png

    These properties are available from the Properties tab of an Azure Key Vault in your Azure portal. azure-kv.png

  8. Select OK.

    secretConfirmed.jpg