-
Notifications
You must be signed in to change notification settings - Fork 233
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Authentication is temporarily unavailable when creating Azure keyvault backed secret scope #338
Comments
Hi, we observed a same issue. Its connected to aad-token authorization. I am able to connect and list secret scopes but not to create a new one. We tried to call Databricks API directly but it is same there (so it is not problem of CLI). We are not able to deploy ntbs or create secret scope with AAD token. |
@michalmlaka : Thanks for adding that it is an API thing. We'll see if they fix it there. |
This currently does not work with AAD tokens acquired with Service principals “Service Principals cannot be used with the AKV secret integration. This is because they do not support the on-behalf-of flow. We are requesting this of the AAD team and working on documenting it. You need to use a user's AAD token.” In the interim, use below approach to create secret scope using user's AAD token Obtain token using user creds
REST API request to create secret scope
|
I am able to authenticate with AAD tokens to create a databricks personal access token, then authenticate again with the api using the databricks token to create secret scopes. I'm not sure if that works with keyvault backends, but I was running into the same issue just creating databricks backend scopes |
@gramhagen, |
Unfortunately does not working. Run into these issues: |
@aravish , Is there ETA to fix the issue that unable to create Azure Key Vault scope using Service Principal token? Using user AAD token is not a good solution for automation that is running on service principal. We cannot store personal password in automation. We are automating the Azure databricks configuration, including Azure resource creation, databricks cluster creation, Azure key Vault secret scope creation with CI/CD. This issue is blocking us to automate the process. |
I believe the PMs were talking to msft about enabling AKV creation with service principal tokens. @annashres might be the best person to talk to about this? |
Thanks @sushi1998 for the info. How to contact AnnaShrestinan? |
We tried it once again. It looks better now. (error msg.).
I assigned "Directory.Read.All" permission for AAD Graph API (https://graph.windows.net/). But it is not enough. What else do I need? |
I think we are waiting to hear from @AnnaShrestinan like @sushi1998 mentioned. To the best of my knowledge it does not have to do with setting the right permissions for your SP. |
Any update on this, i am running into the same issue? |
Not that I am aware off. What I know: databricks people are talking to Azure people. It most likely takes a while: months not weeks |
+1 same issue here. Please fix it. Creating a Secret Scope using a Service Principal with AAD Token is still not working. |
Same issue here, please fix as in my company the only way we can do things in higher envs is with SPN so it is not possible to config any other way! |
We are working with Azure to enable the use of Service Principals for creating an AKV-backed secret scope. @hpsin from Azure AD will have updates on the timeline. |
@annashres @hpsin Has there been any updates on this with timelines etc.? The alternative way is just too much rework for CI/CD processes right now, especially as I am using a regular SP for everything else in the Databricks CLI Thanks |
Any updates on this? I am also having issues trying to set up key vault backed secret scope. |
+1 only manual step in a huge deployment currently. Any updates on this? @hpsin |
We don't have timelines to announce right now on when SP impersonation is going to be supported. We're investigating how we build this - it requires the creation of a new class of scopes (delegation scopes for service principals) and updating the authorization logic of every API. We understand the importance of this feature for automation flows, and building it securely is our number one concern. |
thanks for the update 👌 |
is this still in progress... Any updates ! |
@hpsin why not just use a managed identity like azure datafactory ?? this will probably also solve some other problems related to cloud auth, currently when creating scope on UI, how the refresh token is passed to clusters ?? is the user AAD Token stored somewhere permanently ??, what happens if the user token is revoked ?? |
Any updates on this? @hpsin @annashres |
The creation of a new class of scope is almost complete, and the team is hoping to test soon. @psignoret and @annashres should be able to provide updates from here as I've transitioned away from Azure AD. |
Just checking in to see how this request is tracking? Lots of users are eagerly awaiting this capability! |
+1 looking for update on this one |
+1 @annashres and @psignoret, could you give the community an update regarding this issue? We are all eagerly waiting for this feature's arrival! |
+1 I run into same issue. Any updates after 1.5 years? |
@annashres @hpsin any update? |
@hpsin @annashres shouldn't the Azure AAD OAuth 2.0 on-behalf-of-flow improvement help to implement this in DBX? |
Hi @ralphke and @mwillebrands, @hpsin and I have both switched roles. Please refer to @nfx for updates from the product team. |
@ralphke in scope of databricks/terraform-provider-databricks#1490 we’ll know if it’s already possible or not. |
Unsubscribing from ticket. |
@nfx - Are there any updates on this - do we have a timeline? |
Hey, Do we have roadmap for this issue? |
Hi @nfx, sorry for the spam, but do you have new information on this issue since the 22nd of July? Issue #1490 is still open, so I am hoping that would help us out. |
We don't have new information to share on this topic. Per the documentation at https://learn.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow:
This is the flow we need to create an AKV backed secret scope on behalf of an SP. |
Do we have an update on this? It's hard to believe that this still isn't supported. |
Any update on this? |
@pietern @jjgriff93 @cabral1888 The statement in the article @pietern cites is true in the general case, but Azure Databricks has an exception and is able to make an OBO request on behalf of a service principal ("service principal on-behalf-of", or "SP OBO") to Azure Resource Manager. The Databricks team are working on making the necessary updates to make use of this when creating Azure Key Vault backed secret scopes. |
We get the following message when creating a secret scope with an Azure keyvault back end in the CI.
Locally it works, the
aad-token
is set in the CI script, I have tried it at different times. Anyone can help with what to do with this message?The text was updated successfully, but these errors were encountered: