Globally unique resources that provide access to data management services and serve as the parent namespace for the services.
Hello Chitra Gurumurthy,
Greetings! Welcome to Microsoft Q&A Platform.
Unfortunately, it’s not currently possible to disable public access for Databricks Managed Storage Accounts (DBFS root) directly. The managed resource group configuration prevents such changes. Public access is required for Databricks to function properly, as logs, models, and other essential data are stored in the DBFS root and accessed by the Azure Databricks control plane. But if it comes to the data security, here are the relevant information. The storage account has the deny policy that prevents from making changes & accessing the data for anyone except the Databricks application. So even it has public access, you can't generate SAS, use storage account key, etc.
Deny assignments are a type of Azure Policy assignment that explicitly denies access to a specific action in Azure. In your case, the deny assignment is blocking the action 'Microsoft.Storage/storageAccounts/listKeys/action' on the specified scope. Unfortunately, you can't override this deny assignment on the managed resource group created by Azure Databricks, even if you're the owner. This is because it's a resource managed by Databricks, and it prevents direct access to the data because it stores some system information inside the storage account. If you need to access data in the Databricks managed storage account, it's recommended to use DBFS for temporary data or mount a new storage account .
References:
- Azure Policy - Deny assignments: https://docs.microsoft.com/en-us/azure/role-based-access-control/deny-assignments
- https://stackoverflow.com/questions/73064767/how-to-override-deny-assignment-so-that-i-can-access-the-databricks-managed-stor
- https://learn.microsoft.com/en-us/azure/databricks/lakehouse-architecture/security-compliance-and-privacy/best-practices
Alternatively, you can try creating a custom solution as updated above to achieve the ask, A custom policy definition allows customers to define their own rules for using Azure.
Hope this answer helps! Please let us know if you have any further queries. I’m happy to assist you further.
Please "Accept the answer” and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.