Query on Deny Assignment applied on Azure Databricks

Chakraborty, Shubham 100 Reputation points
2025-04-03T03:45:45.9+00:00

We are facing issue in updating resource tags recently on Azure Databricks. After checking the Databricks managed resource group of the respective Databricks resources, we found that there is a deny assignment applied under IAM.

We want to understand, how we were able to update or add resource tags earlier on the same Databricks resources with having the deny assignment. But when trying to do same thing it is blocking us from modifying or adding any more tags?

The Deny assignment is not created or applied recently on the resources, it was there from a long time.

Azure Databricks
Azure Databricks
An Apache Spark-based analytics platform optimized for Azure.
2,406 questions
{count} votes

1 answer

Sort by: Most helpful
  1. J N S S Kasyap 1,625 Reputation points Microsoft External Staff
    2025-04-03T08:08:10.2766667+00:00

    Hi @Chakraborty, Shubham

    While deny assignments have existed for a long time, Azure's enforcement of these restrictions has become stricter over time. In the past, there might have been cases where users could still modify certain properties (like resource tags), but Microsoft has now fully enforced these assignments, explicitly blocking modifications. As a result, any attempts to update tags on resources within the Databricks managed resource group will fail due to these enforced deny assignments.

    Azure Databricks applies a system-managed deny assignment to its managed resource group. This restriction prevents direct modifications, like updating resource tags, to ensure resource stability and security. You cannot remove or alter this deny assignment, as it’s a core part of the service’s design.

    To understand what changed, check role-based access control (RBAC) updates and Azure policies at the subscription or resource group level. Reviewing Azure Activity Logs can also reveal past successful tag changes and highlight differences with current restrictions.

    Since modifying tags in the managed resource group isn’t allowed, tag the Databricks workspace resource instead. The workspace, located in your own resource group, supports tag updates, and these tags can propagate to managed resources. This is the recommended approach for managing tags effectively.

    Please refer the below Microsoft Documentation
    https://learn.microsoft.com/en-us/azure/role-based-access-control/deny-assignments?tabs=azure-portal
    https://learn.microsoft.com/en-us/azure/databricks/release-notes/product/2020/january
    https://learn.microsoft.com/en-us/answers/questions/1923228/azure-policy-does-not-work-for-resources-created-b

    I hope this information helps. Please do let us know if you have any further queries.

    Kindly consider upvoting the comment if the information provided is helpful. This can assist other community members in resolving similar issues.

    Thank you.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.