Delegated Azure Credentials

Workbench | Enhanced Advanced

When Workbench is configured to use Microsoft Entra ID for Single Sign-On (SSO), users can also be granted delegated permissions for additional Azure resources without needing to sign in again.

These delegated credentials eliminate the need for end users to manage complex authentication workflows when accessing Azure services from within Workbench.

And while the most common delegated permissions are to access Azure services themselves (such as object storage or one of their cloud-backed databases), the same mechanism can be used to grant access to any third-party application in the same Microsoft Entra ID tenant.



Currently, this feature is only supported for RStudio Pro sessions.

You must:

  • Be using OpenID Connect Authentication with Microsoft Entra ID to authenticate users.
  • Have access to your organization’s Microsoft Entra ID configuration, or have an administrator who will on your behalf.
  • If the Job Launcher is enabled the launcher-sessions-callback-address setting must be configured correctly.

Workbench Configuration

To allow Workbench to request delegated Azure credentials after sign-in, offline_access must be listed in the auth-openid-scopes option:


Azure Configuration


This guide uses the Azure portal as an example, but there are many ways to manage Azure resources. Choose a method in line with your organization’s IT and security policies.

Add delegated permissions

Delegated credentials are set on a per-service basis. To grant end users access to a specific Azure service, you need to add the appropriate API permissions to Workbench’s application registration in Entra ID.

Using the Azure portal:

  1. Navigate to the Azure Active Directory Service.
  2. From the sidebar, click App registrations.
  3. In the table, find the application that is used to configure Single Sign-On for Workbench and then open it.
  4. From the sidebar, select API permissions and then click Add a permission.
  5. Select a service you want Workbench users to have access to, such as Azure Storage.
  6. Choose Delegated permissions (rather than Application permissions, if present).
  7. Under Permissions, ensure the entry for user_impersonation is selected.
  8. Click Add permissions.

Entries should appear in the Configured permissions table corresponding to the Azure service(s) you selected.

Exposing Azure Credentials to Workbench Users

Once delegated permissions are configured on the Azure portal, users must request them interactively when needed. R users can run ?rstudioapi::getDelegatedAzureToken for further instruction, and some third-party packages make use of this function to get credentials automatically when possible.

Back to top