<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Privileged Identity Management for Databricks with Microsoft Entra ID in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/privileged-identity-management-for-databricks-with-microsoft/m-p/98050#M2248</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Privileged Identity Management (PIM) can be used to secure access to critical Databricks roles with Just-in-Time (JIT) access. This approach helps organizations enforce time-bound permissions, approval workflows, and centralized auditing for sensitive resources.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;In my latest blog, I walk through the process of setting up PIM for Azure Databricks, demonstrating how to grant temporary account admin access via SCIM integration with Microsoft Entra ID.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;With PIM, Databricks users can request access only when needed, with full oversight on who accesses what and for how long.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A class="app-aware-link " href="https://lnkd.in/e5iYEVZp" target="_self" data-test-app-aware-link=""&gt;https://lnkd.in/e5iYEVZp&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 07 Nov 2024 09:30:08 GMT</pubDate>
    <dc:creator>HariSelvarajan</dc:creator>
    <dc:date>2024-11-07T09:30:08Z</dc:date>
    <item>
      <title>Privileged Identity Management for Databricks with Microsoft Entra ID</title>
      <link>https://community.databricks.com/t5/administration-architecture/privileged-identity-management-for-databricks-with-microsoft/m-p/98050#M2248</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Privileged Identity Management (PIM) can be used to secure access to critical Databricks roles with Just-in-Time (JIT) access. This approach helps organizations enforce time-bound permissions, approval workflows, and centralized auditing for sensitive resources.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;In my latest blog, I walk through the process of setting up PIM for Azure Databricks, demonstrating how to grant temporary account admin access via SCIM integration with Microsoft Entra ID.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;With PIM, Databricks users can request access only when needed, with full oversight on who accesses what and for how long.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A class="app-aware-link " href="https://lnkd.in/e5iYEVZp" target="_self" data-test-app-aware-link=""&gt;https://lnkd.in/e5iYEVZp&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 09:30:08 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/privileged-identity-management-for-databricks-with-microsoft/m-p/98050#M2248</guid>
      <dc:creator>HariSelvarajan</dc:creator>
      <dc:date>2024-11-07T09:30:08Z</dc:date>
    </item>
    <item>
      <title>Re: Privileged Identity Management for Databricks with Microsoft Entra ID</title>
      <link>https://community.databricks.com/t5/administration-architecture/privileged-identity-management-for-databricks-with-microsoft/m-p/98619#M2275</link>
      <description>&lt;P&gt;Thanks. However, as what I know, Azure PIM does not work for Service Principals. It's only applied to human user access &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2024 06:50:38 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/privileged-identity-management-for-databricks-with-microsoft/m-p/98619#M2275</guid>
      <dc:creator>jasonkhaihoang</dc:creator>
      <dc:date>2024-11-13T06:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: Privileged Identity Management for Databricks with Microsoft Entra ID</title>
      <link>https://community.databricks.com/t5/administration-architecture/privileged-identity-management-for-databricks-with-microsoft/m-p/111964#M3095</link>
      <description>&lt;P&gt;Thanks for sharing this, it is helpful. However, onboarding the AAD group as an account admin under the Databricks account is not straightforward and is also not clearly explained in the blog.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 05:02:28 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/privileged-identity-management-for-databricks-with-microsoft/m-p/111964#M3095</guid>
      <dc:creator>sugidwan</dc:creator>
      <dc:date>2025-03-07T05:02:28Z</dc:date>
    </item>
    <item>
      <title>Re: Privileged Identity Management for Databricks with Microsoft Entra ID</title>
      <link>https://community.databricks.com/t5/administration-architecture/privileged-identity-management-for-databricks-with-microsoft/m-p/111973#M3096</link>
      <description>&lt;P&gt;You can use the instructions here for adding group to account as account admin&lt;/P&gt;&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/databricks/admin/users-groups/groups#account-admin" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/databricks/admin/users-groups/groups#account-admin&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 07:02:23 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/privileged-identity-management-for-databricks-with-microsoft/m-p/111973#M3096</guid>
      <dc:creator>HariSelvarajan</dc:creator>
      <dc:date>2025-03-07T07:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: Privileged Identity Management for Databricks with Microsoft Entra ID</title>
      <link>https://community.databricks.com/t5/administration-architecture/privileged-identity-management-for-databricks-with-microsoft/m-p/124689#M3619</link>
      <description>&lt;P&gt;Is this possible without SCIM?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 18:18:36 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/privileged-identity-management-for-databricks-with-microsoft/m-p/124689#M3619</guid>
      <dc:creator>AnitPatelADB</dc:creator>
      <dc:date>2025-07-09T18:18:36Z</dc:date>
    </item>
  </channel>
</rss>

