Authentication of Azure databricks to Azure Storage account - databricks

I need to access my Azure Storage Account from the Azure Databricks notebook.
From authentication side, all key dependant methods (SAS, key based authentication) worked but we can't expose the Access Credentials from Storage Account into the notebook.
Is there an option du Authenticate the Databricks on Storageaccount over Service Principal or Managed Identity.
As goal, the notebook in Databricks shall only use this code and use the assigned Service principal / Managed identity (developer doesn't see credentials)?
These are possible options for authentication for us:

If you want to access storage account with service principle.
Please follow these steps:
Create service principle account with azure AD app registration
Create storage account and grant service principle access to storage account.
Add application secrete to key vault.
Create key vault secrete scope with Databricks.
For more information refer this Blob by Dhyanendra Singh Rathore and SO thread.

Related

Cannot access storage table with the azure application which is having owner access

We earlier used sas token to access the storage account.Now the requirment is to not to use it. Is it possible for an azure app to access the storage account if it has owner access. I tried using it . But getting this error.
message": "The specified resource does not exist
the url we are using is
`https://${tableService.storageAccountName}.table.core.windows.net/tablename
Simply pointing to a storage account, without any form of credentials, will not work for a private storage account or container.
There are a couple of options you have to provide credentials to connect to a storage account, like using the connection strings containing the access keys or using Managed Identities for Azure resources.
Managed identities provide an identity for applications to use when connecting to resources that support Azure Active Directory (Azure AD) authentication. Applications may use the managed identity to obtain Azure AD tokens.
Here are some of the benefits of using managed identities:
You don't need to manage credentials. Credentials aren’t even accessible to you.
You can use managed identities to authenticate to any resource that supports Azure AD authentication, including your own applications.
Managed identities can be used without any additional cost.
Because of these benefits and the ease of use I would suggest you Authorize access to blob data with managed identities for Azure resources.
Azure Blob Storage supports Azure Active Directory (Azure AD) authentication with managed identities for Azure resources. Managed identities for Azure resources can authorize access to blob data using Azure AD credentials from applications running in Azure virtual machines (VMs), function apps, virtual machine scale sets, and other services. By using managed identities for Azure resources together with Azure AD authentication, you can avoid storing credentials with your applications that run in the cloud.
Assign an RBAC role to a managed identity
When an Azure AD security principal attempts to access data in an Azure Storage account, that security principal must have permissions to the data resource. Whether the security principal is a managed identity in Azure or an Azure AD user account running code in the development environment, the security principal must be assigned an Azure role that grants access to data in Azure Storage.

securing app service connectivity to azure storage

we have a blob container with anonymous access (open to internet) and an appservice talking to it.
What are our options of ensuring that only the appservice can talk to this storage endpoint? vnet integration is our last option.
Thanks -nen
What are our options of ensuring that only the appservice can talk to
this storage endpoint?
One option would be to make use of Azure Role Based Access Control (RBAC) Data roles.
For this, first you would assign a managed identity to your App Service and then assign that identity appropriate Azure Storage RBAC data roles.
You would also need to block access to the storage account via access keys or shared access signature so that only your App Service can connect to your storage account using Azure AD authorization.
You can read more about it here: https://learn.microsoft.com/en-us/azure/storage/blobs/assign-azure-role-data-access?tabs=portal.

Snowflake Service Account for Azure storage access

According to Snowflake Doc for Azure:
Click the Accept button. This action allows the Azure service principal created for your Snowflake account to obtain an access token on any resource inside your tenant.
A Storage Integration requires a Service Principal to access data
Do you know how the service principal creation is managed ?
Is there a different and unique Snowflake service principal per account ? the same is valid for Reader/Managed Accounts or sub Accounts ?
Thanks
Yes, the service principal is per account basis and it follows the same principal as for other Security objects in Snowflake.

How can you access a Storage Account blob container without using an Account Key?

How can you access a Storage Account blob container without using an Account Key?
I can access data in Storage Account blobs in Power BI ... but it needs the account Access Key !
Is there some way to access the data using some other authentication approach, i.e. an app registration, service principal, managed identity, whatever ?
You could use Shared Access Signature(SAS) to connect Blob Storage in Power BI. This guide will help you.
If you access blob with Azure AD, it doesn't seem to integrate with Power BI. And there is a .Net code sample about creating a block blob.
Azure AD authenticates the security principal (a user,
group, or service principal) running the application. If
authentication succeeds, Azure AD returns the access token to the
application, and the application can then use the access token to
authorize requests to Azure Blob storage or Queue storage.
For more information, the document describes the options that Azure Storage offers for authorizing access to resources.

While using Azure Managed service Identity, AKS, AAD and Key vault. Do all these resources need to be in the same subscription/Resource group or VNET

Basically I have a setup where I have
Hub-Spoke subscription and vnet topology in azure.
AAD for internal users and developer access and b2c for external
users.
AAD and Keyvault are in HUB subscription/VNET.
APIs which are deployed in Azure AKS clusters are in the spoke subscription.
Also have API Management fronting the APIs which is in the same
subscription and VNET as the AKS/APIs so in the Spoke subscription
Given the setup above, I have these questions
Do all the APIs, API management, Keyvault and Azure AD need to be
tied to the same subscription or can I have Keyvault in my hub
subcription and other services in different subscriptions.
Do we register each API as an app in the same AAD as
KEYVAULT or can we just register the API management and use API
management to get the secrets.
Can we use managed service identity, even if the components are in
different subscriptions but registered with the same Azure AD
Authentication in Azure is done at a tenant level, so presuming you're not using the advanced services for Key Vault (ARM access, VM encryption etc) you can have your Key Vault in one subscription and access that from MSI in a difference subscription - as long as you grant that MSI user permissions to the key vault.
As long as you grant permissions to the resource, AAD has very little awareness of subscriptions (subscriptions are basically one big resource that you can grant privileges to)
Edited to clarify advanced access policies
There are three advanced access policies for key vault.
enabledForDeployment
enabledForDiskEncryption
enabledForTemplateDeployment
the enabledForTemplateDeployment policy only applies if you are reading a secret from an ARM template deployment. i.e. if you are passing a VM password directly from Key vault.
For your situation, if this is a requirement, then you could simply have those being placed in a different key vault located in the same subscription.

Resources