Categories
Azure

Key Vault adoption for Data Factory and Databricks

In this article we’ll review how to create a Key Vault and setup access policies so it can be used from Data Factory and Databricks. Then setup Data Factory linked service and Databricks secret scope to the Key Vault. Setup Key Vault access policies To get Key Vault secrets from any service, it needs to […]

Categories
Azure

Azure Active Directory authorization strategy utilizing nested groups

In this article we’ll review how we can create Azure Active Directory authorization strategy utilizing nested groups with assigned role-based access control (RBAC) and access control lists (ACL). What’s the difference between the two access types. How we can access resources and fine-grain the control with examples for Data Lake and Databricks. Role-Based Access Control […]

Categories
Azure

Databricks CI/CD

In this article we’ll review how to implement continuous integration and continuous delivery on Azure Databricks using Azure DevOps. We’ll be covering how to build and deploy Databricks notebooks, interactive clusters and libraries for the interactive clusters. We’ll start by organizing the authorization via Service Principals and Databricks Personal Access Tokens, including setup of service […]

Categories
Azure

Auto-provision Databricks active table access and configure consumption for PowerBI

I’m assuming you already have:1. Databricks with admin priviliges.2. Data Factory with contributing access.3. PowerBI Desktop installed. The idea is to update the access for Databricks tables for specific AD groups. If you’re interested in auto-provisioning Databricks AD Groups you can follow up this article: https://ivotalkstech.com/azure/auto-provision-databricks-ad-groups-that-match-specific-regex Go to your Databricks admin console and make sure […]

Categories
Azure

Auto-provision Databricks AD groups that match specific RegEx

I’m assuming you already have:1. Configured Databricks with SCIM provissioning connector 2. Active Directory Plan eligable for these operations3. Automation Account from which you have specific system user you authenticate with. Also these auto-assignemnts of users and/or groups works for other Enterprise Applications or Application Registration as well. Go to Enterprise Applications, locate your configured […]