Azure Data Lake
An overview of the Azure Data Lake integration with Secoda
Getting started with Azure Data Lake
There are two steps to connect Azure Data Lake Storage Gen2 with Secoda:
Set up Microsoft Entra ID authentication
Connect Azure Data Lake to Secoda
1. Set up Authentication
Option 1: OAuth Authentication (Recommended)
Register a new application in Azure
Navigate to the Azure Portal and go to "Azure Active Directory" > "App registrations", then click "New registration"
Enter a name for your application (e.g., "Secoda Data Lake Integration")
Select "Accounts in this organizational directory only" for supported account types
Click "Register"
Configure IAM Permissions
In your storage container, click on "Access control (IAM)"
Click on "Add" > "Add role assignment"
Select "Storage Blob Data Reader" from the "Role" dropdown
On the “Assign access to” dropdown, choose the application that was created in step 1 (e.g., "Secoda Data Lake Integration")
Click "Save" to apply changes
Create a Client Secret
Go to "Certificates & secrets" in your app registration
Click "New client secret"
Add a description and select an expiration period
Copy the generated secret value (you won't be able to see it again)
Note Your Application Details
Copy the "Application (client) ID" from the Overview page
Copy the "Directory (tenant) ID" from the Overview page
Keep the client secret you just created
Option 2: Service Principal Authentication
This method uses a service principal for programmatic access.
Create a Service Principal:
az ad sp create-for-rbac --name <<YOUR_NAME_HERE>> --role "Storage Blob Data Reader"
Configure IAM Permissions
In your storage container, click on "Access control (IAM)"
Click on "Add" > "Add role assignment"
Select "Storage Blob Data Reader" from the "Role" dropdown
On the “Assign access to” dropdown, choose the service principal that was just created
Click "Save" to apply changes
Note Your Service Principal Details
Application (client) ID
Client secret
Tenant ID
Subscription ID
2. Connect Azure Data Lake to Secoda
After setting up Microsoft Entra ID authentication, the next step is to connect Azure Data Lake to Secoda:
In the Secoda App, navigate to the "Integrations" tab
Click on "Connect Integration"
Search for and select "Azure Data Lake"
Choose your authentication method:
OAuth: Click "Connect with OAuth" and follow the Microsoft Entra ID authorization flow
Managed: Enter the following credentials:
Tenant ID
Subscription ID
Storage account name
Client ID (app or service principal created for this integration)
Client Secret
(Optional) Username and Password for user-based authentication
Test the Connection - if successful, you'll be prompted to run your initial sync.
Last updated
Was this helpful?