<@ULVA73B9P> I have an app register created for m...
# ask-marvin
s
@Marvin I have an app register created for my prefect user in azure, I need to save the client secrets in prefect blocks. I am not seeing an azure secrets unlike aws and GCP in my prefect UI , which secret block should I use for storing AZURE_CLIENT_ID, AZURE_TENANT_ID and AZURE_CLIENT_SECRET? This app register has contributor permission to blob storage
m
To store Azure client secrets in Prefect, you can use a generic secret block since specific blocks for Azure like AWS and GCP might not be available. You can create blocks for credentials either through the Prefect UI or using Python code. For Azure, you should initially install the
prefect-azure
library and register the blocks in Prefect-Azure using
prefect block register -m prefect_azure
. Here's a guide for moving data with Prefect, which also mentions creating a credentials block: Configuring Data Movement. Although the provided documents do not explicitly cover Azure secrets blocks, the usual approach to handling credentials in Prefect will involve storing configuration details in a block which can then be referenced when needed. Overall, you will firstly want to make sure that the appropriate Prefect extensions for Azure are installed and registered. You can then create a secret block in Prefect using the UI or code, and reference the block in your flows or tasks for Azure operations. Make sure you do not publicly expose sensitive credential values.