Sometimes accessing data requires that you authenticate to external data sources through JDBC. Instead of directly entering your credentials into a notebook, use Azure Databricks secrets to store your credentials and reference them in notebooks and jobs. To manage secrets, you can use the Databricks CLI to access the Secrets API.
Secrets requires Databricks Runtime 4.0 or above and Databricks CLI 0.7.1 or above.
To set up secrets you:
- Create a secret scope. Secret scope names are case insensitive.
- Add secrets to the scope. Secret names are case insensitive.
- If you have the Azure Databricks Premium Plan, assign access control to the secret scope.
This guide shows you how to perform these setup tasks and manage secrets. For more information, see:
- An end-to-end example of how to use secrets in your workflows.
- Reference for the Secrets CLI.
- Reference for the Secrets API.
- How to use Secrets utilities to reference secrets in notebooks and jobs.
In this guide:
- Secret Scopes
- Secret Access Control
- Secret Redaction
- Secret Workflow Example