Azure Key Vault secrets facilitate the secure management of confidential credentials for authentication, ensuring they remain undisclosed within the notebook. This method preserves credential security while enabling monitoring of their usage and access across diverse services. In addition to managing secrets, Key Vault also supports key management and certificate management.
Azure Key Vault Secrets In Databricks
Creating A Secret Scope
To create a secret scope in Databricks, users can access the portal at https://<databricks-instance>#secrets/createScope, leveraging properties available from the Azure Key Vault portal.
Alternatively, users can create a Databricks-backed secret scope using the Databricks CLI or the Secrets API.
Access should be allowed to the Databricks workspace from the Networking tab within Azure Key Vault settings.
Alternatively, users can access secrets directly by changing the Spark configuration within the notebook.
Key Differences
Databricks-Backed Secret Scopes
In Databricks, users have the capability to create and delete customized secrets within their Databricks-backed secret scopes. These actions are exclusively performed through the Databricks CLI or Secrets API but can be accessed from within notebooks.
In contrast, Synapse does not include the capability to create or delete custom secrets directly within the workspace. It exclusively accesses secrets and keys directly from Azure Key Vault.