db_secrets_scope_create | R Documentation |
Create Secret Scope
db_secrets_scope_create(
scope,
initial_manage_principal = NULL,
host = db_host(),
token = db_token(),
perform_request = TRUE
)
scope |
Scope name requested by the user. Scope names are unique. |
initial_manage_principal |
The principal that is initially granted
|
host |
Databricks workspace URL, defaults to calling |
token |
Databricks workspace token, defaults to calling |
perform_request |
If |
Create a Databricks-backed secret scope in which secrets are stored in Databricks-managed storage and encrypted with a cloud-based specific encryption key.
The scope name:
Must be unique within a workspace.
Must consist of alphanumeric characters, dashes, underscores, and periods, and may not exceed 128 characters.
The names are considered non-sensitive and are readable by all users in the workspace. A workspace is limited to a maximum of 100 secret scopes.
If initial_manage_principal
is specified, the initial ACL applied to the
scope is applied to the supplied principal (user or group) with MANAGE
permissions. The only supported principal for this option is the group users,
which contains all users in the workspace. If initial_manage_principal
is
not specified, the initial ACL with MANAGE
permission applied to the scope
is assigned to the API request issuer’s user identity.
Throws RESOURCE_ALREADY_EXISTS
if a scope with the given name already
exists.
Throws RESOURCE_LIMIT_EXCEEDED
if maximum number of scopes in the
workspace is exceeded.
Throws INVALID_PARAMETER_VALUE
if the scope name is invalid.
Other Secrets API:
db_secrets_delete()
,
db_secrets_list()
,
db_secrets_put()
,
db_secrets_scope_acl_delete()
,
db_secrets_scope_acl_get()
,
db_secrets_scope_acl_list()
,
db_secrets_scope_acl_put()
,
db_secrets_scope_delete()
,
db_secrets_scope_list_all()
Add the following code to your website.
For more information on customizing the embed code, read Embedding Snippets.