All posts

How to configure Azure Resource Manager Domino Data Lab for secure, repeatable access

You finally got your Domino Data Lab workspace humming, only to discover half the team still can’t reach the Azure resources they need. Roles drift, secrets expire, tickets pile up. You could keep wrestling with manual onboarding, or you could let Azure Resource Manager handle the grunt work. Azure Resource Manager (ARM) defines and enforces infrastructure as code within Microsoft’s cloud. Domino Data Lab powers reproducible data science by giving every project its own isolated compute and stor

Free White Paper

VNC Secure Access + GCP Access Context Manager: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

You finally got your Domino Data Lab workspace humming, only to discover half the team still can’t reach the Azure resources they need. Roles drift, secrets expire, tickets pile up. You could keep wrestling with manual onboarding, or you could let Azure Resource Manager handle the grunt work.

Azure Resource Manager (ARM) defines and enforces infrastructure as code within Microsoft’s cloud. Domino Data Lab powers reproducible data science by giving every project its own isolated compute and storage. Together, they form a boundary between experimentation and production that’s programmable, auditable, and fast enough to keep data scientists from going rogue.

To connect the two, think identity first. ARM governs permissions through Azure Active Directory and Role-Based Access Control. Domino consumes those permissions via service principals or federated credentials. The ideal workflow provisions per-project resource groups and maps Domino workspaces to them dynamically. Instead of static keys, Domino calls Azure APIs using short-lived tokens issued through AAD. Access is fine-grained at runtime, which means no long-lived secrets, no forgotten VMs charging your budget quietly in the corner.

Once identity is sorted, automation takes over. Use ARM templates or Bicep to declare any compute or networking Domino needs, from storage accounts to Kubernetes clusters. Domino handles the orchestration layer, ARM handles lifecycle and policy. Destroying a workspace deletes its assigned resources cleanly, preserving compliance logs all the way down.

A quick rule of thumb: if you can script an Azure resource, you can control it through Domino’s automation layer without exposing credentials. That’s the sweet spot.

Best practices for integration

Continue reading? Get the full guide.

VNC Secure Access + GCP Access Context Manager: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.
  • Use Azure Managed Identities instead of hand-rolled secrets.
  • Align Domino user groups to AAD roles for transparent RBAC mapping.
  • Enable logging on all ARM deployments to feed your observability stack.
  • Rotate service principal credentials automatically or, better yet, don’t use them at all.
  • Treat every project as disposable. The less state you keep, the fewer headaches later.

When configured correctly, the combination unlocks a few underrated benefits:

  • Faster environment provisioning from Domino UI to live Azure infrastructure.
  • Single-source policy enforcement with ARM’s declarative syntax.
  • Predictable costs by tying compute to project lifecycles.
  • Cleaner audit trails satisfying SOC 2, GDPR, or internal review checklists.
  • Happier developers who no longer chase tickets for ephemeral access.

Developers feel it instantly. Spinning up a new experiment becomes a one-click act. No waiting on ops, no manual key vault dance. It’s the little things that turn infrastructure into guardrails instead of roadblocks.

Platforms like hoop.dev push this one layer further. They sit between Domino, Azure, and your identity provider, sculpting every permission into a live, identity-aware proxy. That means fewer brittle YAML policies and more confidence that only the right analyst gets to the right data, every time.

How do I connect Azure Resource Manager and Domino Data Lab?
Create a dedicated AAD app registration for Domino, assign ARM roles to that identity, and let Domino request tokens on demand. The short-lived tokens authorize resource creation and teardown without manual key management.

Can AI tools benefit from this integration?
Absolutely. When AI agents run on Domino, ARM ensures each model instance only accesses approved data sources. You get automation without compliance panic, a rare combination in the ML world.

Azure Resource Manager Domino Data Lab is not the flashy part of your stack, but it’s the part that keeps your experiments clean, traceable, and repeatable. The future of data science security looks declarative, and it starts here.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts