Registering an application with Azure Active Directory (Azure AD) creates a service principal you can use to provide access to Azure storage accounts. You can then configure access to these service principals using credentials stored with secrets.
Databricks recommends using Azure Active Directory service principals scoped to clusters or Databricks SQL endpoints to configure data access. See Accessing Azure Data Lake Storage Gen2 and Blob Storage with Databricks and Configure access to cloud storage.
Registering an Azure AD application and assigning appropriate permissions will create a service principal that can access Azure Data Lake Storage Gen2 or Blob Storage resources.
In the Azure portal, go to the Azure Active Directory service.
Under Manage, click App Registrations.
Click + New registration. Enter a name for the application and click Register.
Click Certificates & Secrets.
Click + New client secret.
Add a description for the secret and click Add.
Copy and save the value for the new secret.
In the application registration overview, copy and save the Application (client) ID and Directory (tenant) ID.
Databricks recommends storing these credentials using secrets.
You control access to storage resources by assigning roles to an Azure AD application registration associated with the storage account. This example assigns the Storage Blob Data Contributor to an Azure storage account. You may need to assign other roles depending on specific requirements.
In the Azure portal, go to the Storage accounts service.
Select an Azure storage account to use with this application registration.
Click Access Control (IAM).
Click + Add and select Add role assignment from the dropdown menu.
Set the Select field to the Azure AD application name and set Role to Storage Blob Data Contributor.