Add Azure AAD-enabled authentication to Azure Credentials set. This will enable Seqera Platform to authenticate as a Service Principal when creating Azure compute resources or accessing Azure storage.
Currently, Azure uses account names and keys for accessing Azure.
Azure Batch comes in two flavors:
  • Batch managed
    : The batch service manages VMs so everything is done 'under' the batch account. Uses keys for authentication
  • User Subscription
    : The VMs etc are run in the user account under one subscription, which is more flexible. Only uses AAD for authentication.
An alternative to using account keys, as supported by Nextflow, would be to use a service principal which has the correct permissions. We would have a similar page but with options to add:
  • A batch account name
  • A storage account name
  • An Azure location
  • A service principal ID (Directory tenant ID)
  • A tenant ID (Application Tenant ID)
  • A service principal secret (Client secret value)