-
Notifications
You must be signed in to change notification settings - Fork 148
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE REQUEST] Add option to use environment variables for ADLS Subscoped credentials #69
Comments
Thanks for bringing this up @cgpoh ! There are a few considerations worth discussing and soliciting some input from additional folks to identify the best way forward:
At a high level we at least need to have a strict separation of effective privileges between the personas who can configure and run the Polaris server itself and those who can call One possibility that may require fewer changes to the management API and persistence model itself would be to have some server-level configuration settings that basically just short-circuit the storage validation/subscoping logic in |
Is your feature request related to a problem? Please describe.
My organization does not allow getting user delegation key in Azure and the only option for us to authenticate with Azure is to use service principal. When my spark job tries to write to Azure, I will get the following exception at Polaris server:
Describe the solution you'd like
Since
ADLSFileIO
fall back to useDefaultAzureCredentialBuilder
when there are noSAS token
orStorage Shared Key credential
, we can have a default catalog option to use environment as authentication type e.g.:so that any query engine can abstract away the credential and the main credential still being govern by Polaris Catalog for Azure.
The text was updated successfully, but these errors were encountered: