<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: service principal control plane access management in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/service-principal-control-plane-access-management/m-p/117147#M3304</link>
    <description>&lt;P&gt;On the docs it states:&amp;nbsp;&lt;SPAN&gt;Service principals give automated tools and scripts API-only access to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Databricks&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;resources, providing greater security than using users accounts.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://docs.databricks.com/gcp/en/admin/users-groups/service-principals#what-is-a-service-principal" target="_blank"&gt;https://docs.databricks.com/gcp/en/admin/users-groups/service-principals#what-is-a-service-principal&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 30 Apr 2025 12:30:06 GMT</pubDate>
    <dc:creator>Walter_C</dc:creator>
    <dc:date>2025-04-30T12:30:06Z</dc:date>
    <item>
      <title>service principal control plane access management</title>
      <link>https://community.databricks.com/t5/administration-architecture/service-principal-control-plane-access-management/m-p/117097#M3301</link>
      <description>&lt;P&gt;hi, our account admin has created a service principal to automate job execution. however, our security team is concerned that, by design, anyone with the service principal credentials might access the control plane, where the service principal is defined. In theory, this behavior should be impossible, but I would like to know if there is a specific section in the Databricks documentation that explicitly addresses this.&lt;/P&gt;&lt;P&gt;#Databricks #Security&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2025 08:01:19 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/service-principal-control-plane-access-management/m-p/117097#M3301</guid>
      <dc:creator>antonionuzzo</dc:creator>
      <dc:date>2025-04-30T08:01:19Z</dc:date>
    </item>
    <item>
      <title>Re: service principal control plane access management</title>
      <link>https://community.databricks.com/t5/administration-architecture/service-principal-control-plane-access-management/m-p/117147#M3304</link>
      <description>&lt;P&gt;On the docs it states:&amp;nbsp;&lt;SPAN&gt;Service principals give automated tools and scripts API-only access to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Databricks&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;resources, providing greater security than using users accounts.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://docs.databricks.com/gcp/en/admin/users-groups/service-principals#what-is-a-service-principal" target="_blank"&gt;https://docs.databricks.com/gcp/en/admin/users-groups/service-principals#what-is-a-service-principal&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2025 12:30:06 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/service-principal-control-plane-access-management/m-p/117147#M3304</guid>
      <dc:creator>Walter_C</dc:creator>
      <dc:date>2025-04-30T12:30:06Z</dc:date>
    </item>
  </channel>
</rss>

