Secret redaction
Storing credentials as Azure Databricks secrets makes it easy to protect your credentials when you run notebooks and jobs. However, it is easy to accidentally print a secret to standard output buffers or display the value during variable assignment.
To prevent this, Azure Databricks redacts all secret values that are read using dbutils.secrets.get()
. When displayed in notebook cell output, the secret values are replaced with [REDACTED]
.
For example, if you set a variable to a secret value using dbutils.secrets.get()
and then print that variable, that variable is replaced with [REDACTED]
.
Warning
Secret redaction for notebook cell output applies only to literals. The secret redaction functionality does not prevent deliberate and arbitrary transformations of a secret literal. To ensure the proper control of secrets, you should use Access control lists (limiting permission to run commands) to prevent unauthorized access to shared notebook contexts.