<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using logged in user's identity in Databricks Apps in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/using-logged-in-user-s-identity-in-databricks-apps/m-p/103315#M2606</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/88823"&gt;@Walter_C&lt;/a&gt;&amp;nbsp;, thanks for the quick reply. I understood the functioning of above stated Service Principal and Permission Management.&lt;/P&gt;&lt;P&gt;In my scenario, I have a schema 'S' with table T1(with user U1 Read, user U2 - Read Permission) and T2(user U1 Read permission). Now if I assign databricks app's service principal as owner on schema "S", It will let both user U1 and U2 access Table T1 and T2.&lt;/P&gt;&lt;P&gt;What I am searching is the way to validate if the user logged in databricks app actually have access to the Table or any other object before accessing it. Currently I can first get permissions list for the table and check if the logged in user's email id is there in the list. But I wanted to check if there can be any better way.&lt;/P&gt;</description>
    <pubDate>Fri, 27 Dec 2024 14:47:44 GMT</pubDate>
    <dc:creator>vishwas7</dc:creator>
    <dc:date>2024-12-27T14:47:44Z</dc:date>
    <item>
      <title>Using logged in user's identity in Databricks Apps</title>
      <link>https://community.databricks.com/t5/administration-architecture/using-logged-in-user-s-identity-in-databricks-apps/m-p/103304#M2602</link>
      <description>&lt;P&gt;Hi Databricks Community, I recently started using Datbricks apps where I list some schemas and tables in the UI.&lt;/P&gt;&lt;P&gt;What I explicitly want to do is only show the schemas and tables on which user actually have permission. Currently the databricks apps would use it's own identity, morever in the headers as well I do receive email and username but don't have any access token which might be used for user impersonation.&lt;/P&gt;&lt;P&gt;Do let me know if I could achieve it.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Dec 2024 14:17:10 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/using-logged-in-user-s-identity-in-databricks-apps/m-p/103304#M2602</guid>
      <dc:creator>vishwas7</dc:creator>
      <dc:date>2024-12-27T14:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: Using logged in user's identity in Databricks Apps</title>
      <link>https://community.databricks.com/t5/administration-architecture/using-logged-in-user-s-identity-in-databricks-apps/m-p/103309#M2605</link>
      <description>&lt;P class="_1t7bu9h1 paragraph"&gt;&lt;SPAN&gt;To display only the schemas and tables on which a user has permission in Databricks Apps, you need to manage permissions effectively. Here are the steps and considerations based on the provided context:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P class="_1t7bu9h1 paragraph"&gt;&lt;STRONG&gt;Service Principal for Authorization&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL class="_1t7bu9h7 _1t7bu9h2"&gt;
&lt;LI&gt;&lt;SPAN&gt;When a Databricks app is created, a service principal is automatically assigned to the app. This service principal is used to authenticate and authorize access to resources within the workspace, such as SQL warehouses, model serving endpoints, or securable objects in Unity Catalog.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;If the service principal requires access to additional resources (e.g., tables or workspace files), an account or workspace admin must grant the necessary permissions to the service principal. This follows the principle of least privilege, ensuring that the service principal only has the minimal permissions required.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="_1t7bu9h1 paragraph"&gt;&lt;STRONG&gt;Managing Permissions&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL class="_1t7bu9h7 _1t7bu9h2"&gt;
&lt;LI&gt;&lt;SPAN&gt;To manage the app’s permissions, you must have the &lt;CODE&gt;CAN MANAGE&lt;/CODE&gt; or &lt;CODE&gt;IS OWNER&lt;/CODE&gt; permission. On the app details page, you can configure permissions by selecting the user, group, or service principal and assigning the appropriate permissions.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Permissions can be managed through the Databricks Apps UI, where you can add or modify permissions for users, groups, or service principals.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Fri, 27 Dec 2024 14:30:16 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/using-logged-in-user-s-identity-in-databricks-apps/m-p/103309#M2605</guid>
      <dc:creator>Walter_C</dc:creator>
      <dc:date>2024-12-27T14:30:16Z</dc:date>
    </item>
    <item>
      <title>Re: Using logged in user's identity in Databricks Apps</title>
      <link>https://community.databricks.com/t5/administration-architecture/using-logged-in-user-s-identity-in-databricks-apps/m-p/103315#M2606</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/88823"&gt;@Walter_C&lt;/a&gt;&amp;nbsp;, thanks for the quick reply. I understood the functioning of above stated Service Principal and Permission Management.&lt;/P&gt;&lt;P&gt;In my scenario, I have a schema 'S' with table T1(with user U1 Read, user U2 - Read Permission) and T2(user U1 Read permission). Now if I assign databricks app's service principal as owner on schema "S", It will let both user U1 and U2 access Table T1 and T2.&lt;/P&gt;&lt;P&gt;What I am searching is the way to validate if the user logged in databricks app actually have access to the Table or any other object before accessing it. Currently I can first get permissions list for the table and check if the logged in user's email id is there in the list. But I wanted to check if there can be any better way.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Dec 2024 14:47:44 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/using-logged-in-user-s-identity-in-databricks-apps/m-p/103315#M2606</guid>
      <dc:creator>vishwas7</dc:creator>
      <dc:date>2024-12-27T14:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: Using logged in user's identity in Databricks Apps</title>
      <link>https://community.databricks.com/t5/administration-architecture/using-logged-in-user-s-identity-in-databricks-apps/m-p/123023#M3527</link>
      <description>&lt;P&gt;&lt;A href="https://docs.databricks.com/aws/en/dev-tools/databricks-apps/auth#retrieve-user-authorization-credentials" target="_blank"&gt;https://docs.databricks.com/aws/en/dev-tools/databricks-apps/auth#retrieve-user-authorization-credentials&lt;/A&gt;&amp;nbsp;: they launched this recently to support user identity in databricks apps&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jun 2025 04:33:04 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/using-logged-in-user-s-identity-in-databricks-apps/m-p/123023#M3527</guid>
      <dc:creator>samlauncher</dc:creator>
      <dc:date>2025-06-27T04:33:04Z</dc:date>
    </item>
  </channel>
</rss>

