Workbench-managed Credentials

Enhanced Advanced

Posit Workbench includes several integrations that enable you to use credentials associated with various cloud and compute provider services. Workbench manages these credentials, so you don’t have to store them in plain text in your code or configuration files, or manually define environment variables.

Workbench supports credentials for some of the most popular cloud providers and data platforms, with support in specific session types outlined below:

Overview of supported platforms and session types.
Provider RStudio Pro VS Code JupyterLab Jupyter Notebook
AWS
Azure
Databricks
Snowflake

Managed credentials have a number of benefits:

Providers

AWS credentials

Workbench can provide user-specific AWS credentials for sessions tied to their Single Sign-On (SSO) credentials. Workbench uses the AWS web identity federation mechanism to set these credentials in individual sessions. This mechanism also powers AWS integrations like IAM Roles for Service Accounts (the recommended IAM solution for Kubernetes) and GitHub Actions.

For more information about enabling this feature, see the AWS credentials section of the Posit Workbench Administration Guide.

Azure credentials

When you configure Workbench to use Microsoft Entra ID for Single Sign-On (SSO), it can grant uses delegated permissions for additional Azure resources without requiring them to sign in again. See Microsoft Entra ID (formerly Azure Active Directory) and the Understanding delegated access sections of Microsoft’s website for more information on delegating credentials with Entra ID.

These delegated credentials eliminate the need for end users to manage complex authentication workflows when they access Azure services from within Workbench.

While users commonly receive delegated permissions to access Azure services (such as object storage or cloud-backed databases), the same mechanism can also grant access to any third-party application within the same Entra ID tenant.

For more information about enabling this feature, see the Azure credentials section of the Posit Workbench Administrator Guide.

Databricks

Workbench includes an integration with Databricks unified authentication, including authentication and authorization with Databricks via OAuth2 on AWS, or Azure.

For more information, see the Workbench-managed Databricks Credentials section of this User Guide. To learn about the Databricks pane and Connections pane integration for RStudio Pro, see the Databricks in RStudio Pro section.

Snowflake credentials

Snowflake roles are supported when you configure Snowflake accounts within Workbench and authenticate via OAuth2. The Snowflake integration in Workbench offers additional controls in the Edit Credentials dialog, which is discussed in the Workbench-managed Snowflake Credentials section.

Starting a Session with Workbench-managed credentials

Credential Selection

If your administrator has configured and enabled one or more cloud provider integrations, a new section displays in the New Session dialog. This allows you to select multiple credentials – one per provider – to use for the new session. More controls are available in the Edit Credentials dialog. See the Edit Credentials dialog section below for more information.

By default, Workbench automatically selects any cloud provider with a valid credential for use in the new session. Identify credentials in use by the corresponding button, which displays blue with a check mark in the upper-left corner.

Credentials selection options in the New Session dialog

Credentials selection options in the New Session dialog

To toggle a credential on or off, select the check mark. For providers that require authentication, the logo is either grayed out or colored to indicate the authentication status. An empty circle in the corner with no check mark means that you can enable the credential.

AWS “biostats-group” role is enabled for use. Databricks “main” workspace is authenticated but not in use.

AWS “biostats-group” role is enabled for use. Databricks “main” workspace is authenticated but not in use.

If a lock is displayed (as shown in the image above), then that credential is not authenticated yet. You can click the lock to sign in and begin the authentication flow. Any pending credentials show a spinning indicator while authentication is in progress.

Pending sign-in to the Snowflake “Default Role” for the POSIT_SOFTWARE_PBC_DEV account

Pending sign-in to the Snowflake “Default Role” for the POSIT_SOFTWARE_PBC_DEV account

Cancel a pending sign-in by opening the Edit Credentials dialog and clicking X for the provider.

Cancel sign-in button displayed next to pending Snowflake authentication

Cancel sign-in button displayed next to pending Snowflake authentication

You can enable one credential from each provider at once, provided that they are all authenticated and valid.

AWS and Databricks are enabled for use in the new session

AWS and Databricks are enabled for use in the new session

For providers that allow multiple credentials, click the drop-down arrow on the right side of the selection button. If you select a credential from the list that hasn’t been authenticated, Workbench automatically toggles off the cloud provider to prevent use of an invalid selection.

Selecting which Databricks workspace to use for the new session

Selecting which Databricks workspace to use for the new session

Edit Credentials dialog

The Edit Credentials dialog provides additional authentication and provider-specific controls not found in the New Session dialog. The Edit Credentials button opens this dialog.

Expand or Collapse sections:

To save space and reduce clutter, each provider can be collapsed. In the case of Snowflake, individual accounts can also be collapsed. Use the arrow in the top right corner of the section to toggle the display. By default, all sections are expanded. This state is stored locally to the browser.

Edit Credentials with expanded sections

Edit Credentials with expanded sections

Edit Credentials with Snowflake collapsed

Edit Credentials with Snowflake collapsed

Signing in

  • Click New Session or an existing session, and then click Edit Credentials
  • Click anywhere on the credential or click Sign In to the right. This starts the authentication flow.

Edit Credentials dialog sign in to session

Edit Credentials dialog sign in to session

Cancel the sign-in process

  • To canel the sign-in process, to the right of the provider, click X.

Edit Credentials dialog cancel sign in

Edit Credentials dialog cancel sign in

If an error occurs during authentication, a message displays to the user and a Retry button is available to reattempt the sign in.

Timeout error displayed for the Databricks provider, with “Retry” action

Timeout error displayed for the Databricks provider, with “Retry” action

Signed-in credentials

Signed-in credentials are displayed with a blue bar on the left and a blue sign-out button to the right to visually distinguish them from credentials that are not signed in.

Databricks provider shows signed-in credential with blue bar and sign-out button

Databricks provider shows signed-in credential with blue bar and sign-out button

Signing out

  • Click New Session or an existing session, and then click Edit Credentials
  • Click anywhere on the credential or click Sign Out to the right. This signs you out, and allows you to reauthenticate.

Sign Out displayed for the Databricks provider

Sign Out displayed for the Databricks provider
Back to top