01 Run account list command (Windows/macOS/Linux) with custom output filters to list the IDs of the cloud subscriptions available in your Azure cloud account:
az account list
--query '[*].id'
02 The command output should return the requested subscription identifiers (IDs):
[
"abcdabcd-1234-abcd-1234-abcdabcdabcd",
"abcd1234-abcd-1234-abcd-abcd1234abcd"
]
03 Run account set command (Windows/macOS/Linux) with the ID of the Azure cloud subscription that you want to examine as the identifier parameter to set the selected subscription to be the current active subscription (the command does not produce an output):
az account set
--subscription abcdabcd-1234-abcd-1234-abcdabcdabcd
04 Run databricks workspace update command (OSX/Linux/UNIX) to enable the Secure Cluster Connectivity (No Public IP) feature for the selected Databricks workspace:
az databricks workspace update
--ids "/subscriptions/abcdabcd-1234-abcd-1234-abcdabcdabcd/resourceGroups/cloud-shell-storage-westeurope/providers/Microsoft.Databricks/workspaces/cc-project9-data-workspace"
--enable-no-public-ip true
05 The command output should return the configuration information available for the updated Databricks workspace:
{
"authorizations": [
{
"principalId": "abcd1234-abcd-1234-abcd-abcd1234abcd",
"roleDefinitionId": "abcd1234-abcd-1234-abcd-abcd1234abcd"
}
],
"createdBy": {
"applicationId": "abcd1234-abcd-1234-abcd-abcd1234abcd",
"oid": "abcd1234-abcd-1234-abcd-abcd1234abcd",
"puid": "ABCDABCDABCDABCD"
},
"createdDateTime": "2025-10-09T08:51:19.9701424Z",
"id": "/subscriptions/abcdabcd-1234-abcd-1234-abcdabcdabcd/resourceGroups/cloud-shell-storage-westeurope/providers/Microsoft.Databricks/workspaces/cc-project9-data-workspace",
"isUcEnabled": false,
"location": "westeurope",
"managedResourceGroupId": "/subscriptions/abcdabcd-1234-abcd-1234-abcdabcdabcd/resourceGroups/databricks-rg-cc-project9-data-workspace-abcdabcdabcd",
"name": "cc-project9-data-workspace",
"parameters": {
"customPrivateSubnetName": {
"type": "String",
"value": "cc-project9-vnet-subnet-002"
},
"customPublicSubnetName": {
"type": "String",
"value": "cc-project9-vnet-subnet-001"
},
"customVirtualNetworkId": {
"type": "String",
"value": "/subscriptions/abcdabcd-1234-abcd-1234-abcdabcdabcd/resourceGroups/cloud-shell-storage-westeurope/providers/Microsoft.Network/virtualNetworks/cc-project9-vnet"
},
"enableNoPublicIp": {
"type": "Bool",
"value": true
},
"prepareEncryption": {
"type": "Bool",
"value": false
},
"requireInfrastructureEncryption": {
"type": "Bool",
"value": false
},
"resourceTags": {
"type": "Object",
"value": {
"application": "databricks",
"databricks-environment": "true"
}
},
"storageAccountName": {
"type": "String",
"value": "abcdabcdabcdabcdabcdabcd"
},
"storageAccountSkuName": {
"type": "String",
"value": "Standard_GRS"
}
},
"provisioningState": "Succeeded",
"resourceGroup": "cloud-shell-storage-westeurope",
"sku": {
"name": "premium"
},
"tags": {},
"type": "Microsoft.Databricks/workspaces",
"workspaceId": "123456789012",
"workspaceUrl": "adb-123456789012.5.azuredatabricks.net"
}
06 Repeat steps no. 4 and 5 for each Azure Databricks workspace that you want to configure, available in the selected subscription.
07 Repeat steps no. 3 – 6 for each Azure subscription created in your Microsoft Azure cloud account.