Configure Azure Key Vault
For authentication purposes, the Designer Cloud Powered by Trifacta platform must be integrated with an Azure Key Vault keystore.
For more information, see https://azure.microsoft.com/en-us/services/key-vault/.
Please complete the following sections to create and configure your Azure Key Vault.
Create a Key Vault resource in Azure
Please complete the following steps in the Azure portal to create a Key Vault and to associate it with the Alteryx registered application.
Note
A Key Vault is required for use with the Designer Cloud Powered by Trifacta platform.
Create Key Vault in Azure
Steps:
Log into the Azure portal.
Complete the form for creating a new Key Vault resource:
Name: Provide a reasonable name for the resource. Example:
<clusterName>-<applicationName>-<group/organizationName>
Or, you can use
trifacta
.Location: Pick the location used by the cluster.
For other fields, add appropriate information based on your enterprise's preferences.
To create the resource, click Create.
Note
Retain the DNS Name value for later use.
Enable Key Vault access for the Designer Cloud Powered by Trifacta platform
Steps:
In the Azure portal, you must assign access policies for application principal of the Alteryx registered application to access the Key Vault.
Steps:
In the Azure portal, select the Key Vault you created. Then, select Access Policies.
In the Access Policies window, select the Alteryx registered application.
Click Add Access Policy.
Select the following secret permissions (at a minimum):
Get
Set
Delete
Recover
Select the Alteryx application principal.
Assign the policy you just created to that principal.
Configure Key Vault for ADLS
For ADLS Gen2, the Designer Cloud Powered by Trifacta platform creates its own key-secret combinations in the Key Vault. No additional configuration is required.
Configure the Platform
Configure Key Vault location
The location of the Azure Key Vault must be specified for the Designer Cloud Powered by Trifacta platform. The location can be found in the properties section of the Key Vault resource in the Azure portal.
Steps:
Log in to the Azure portal.
Select the Key Vault resource.
Click Properties.
Locate the DNS Name field. Copy the field value.
This value is the location for the Key Vault. It must be applied in the Designer Cloud Powered by Trifacta platform.
Steps:
You can apply this change through the Admin Settings Page (recommended) or
trifacta-conf.json
. For more information, see Platform Configuration Methods.Specify the URL in the following parameter:
"azure.keyVaultURL": "<your key value URL>",
Configure Secure Token Service
Access to the Key Vault requires use of the secure token service (STS) from the Designer Cloud Powered by Trifacta platform. To use STS with Azure, several properties must be specified. For more information, see Configure Secure Token Service.