For authentication purposes, the Designer Cloud Powered by Trifacta platform must be integrated with an Azure Key Vault keystore.
For more information, see https://azure.microsoft.com/en-us/services/key-vault/.
Please complete the following sections to create and configure your Azure Key Vault.
Please complete the following steps in the Azure portal to create a Key Vault and to associate it with the Alteryx registered application.
Note
A Key Vault is required for use with the Designer Cloud Powered by Trifacta platform.
Steps:
Log into the Azure portal.
Complete the form for creating a new Key Vault resource:
Name: Provide a reasonable name for the resource. Example:
<clusterName>-<applicationName>-<group/organizationName>
Or, you can use
trifacta
.Location: Pick the location used by the cluster.
For other fields, add appropriate information based on your enterprise's preferences.
To create the resource, click Create.
Note
Retain the DNS Name value for later use.
Steps:
In the Azure portal, you must assign access policies for application principal of the Alteryx registered application to access the Key Vault.
Steps:
In the Azure portal, select the Key Vault you created. Then, select Access Policies.
In the Access Policies window, select the Alteryx registered application.
Click Add Access Policy.
Select the following secret permissions (at a minimum):
Get
Set
Delete
Recover
Select the Alteryx application principal.
Assign the policy you just created to that principal.
For ADLS Gen2, the Designer Cloud Powered by Trifacta platform creates its own key-secret combinations in the Key Vault. No additional configuration is required.
The location of the Azure Key Vault must be specified for the Designer Cloud Powered by Trifacta platform. The location can be found in the properties section of the Key Vault resource in the Azure portal.
Steps:
Log in to the Azure portal.
Select the Key Vault resource.
Click Properties.
Locate the DNS Name field. Copy the field value.
This value is the location for the Key Vault. It must be applied in the Designer Cloud Powered by Trifacta platform.
Steps:
You can apply this change through the Admin Settings Page (recommended) or
trifacta-conf.json
. For more information, see Platform Configuration Methods.Specify the URL in the following parameter:
"azure.keyVaultURL": "<your key value URL>",
Access to the Key Vault requires use of the secure token service (STS) from the Designer Cloud Powered by Trifacta platform. To use STS with Azure, several properties must be specified. For more information, see Configure Secure Token Service.