<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PATs sharing in a global data platform in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/pats-sharing-in-a-global-data-platform/m-p/129527#M3948</link>
    <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/124839"&gt;@noorbasha534&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P class=""&gt;Honestly, I really understand your pain around token management. I face the same situation myself and it can definitely become a headache, especially when you have multiple technologies in play, some of them open-source, and even cases where you end up overlapping tools that essentially try to do the same job.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;From my experience, the best approach is to use a central system such as &lt;SPAN class=""&gt;&lt;STRONG&gt;Secret Manager&lt;/STRONG&gt;&lt;/SPAN&gt; or &lt;SPAN class=""&gt;&lt;STRONG&gt;Azure Key Vault&lt;/STRONG&gt;&lt;/SPAN&gt; as the secure place to store these PATs. If that’s not possible, then try to rely on role assumptions so that machines or services can fetch the required secrets dynamically without embedding them everywhere.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;When it comes to rotation, my recommendation is to use the &lt;I&gt;same system&lt;/I&gt; for creation and rotation. For example, if you create PATs via Terraform, avoid rotating them with a separate Cloud Function or Lambda, otherwise you’ll constantly introduce drift. A better pattern is to leverage reporting capabilities to identify tokens that are about to expire, and then have a process that both rotates and notifies stakeholders. I’ve implemented this email system with the Graph API client to avoid spams.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;It’s also worth noting that if you work with &lt;SPAN class=""&gt;&lt;STRONG&gt;Service Principals&lt;/STRONG&gt;&lt;/SPAN&gt;, you’ll need PATs anyway since they’re not human users. And even if you move to OAuth, you still face expiration periods — meaning you’ll have to reconnect or refresh sessions, which can also break ingestion pipelines or refreshes. For example, I’ve seen this happen with &lt;SPAN class=""&gt;&lt;STRONG&gt;Power BI dashboards&lt;/STRONG&gt;&lt;/SPAN&gt;, where failed refreshes were reported just because the OAuth token had expired for the assigned user.&lt;BR /&gt;&lt;BR /&gt;Hope this helps, &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Isi&lt;/P&gt;</description>
    <pubDate>Sun, 24 Aug 2025 20:12:17 GMT</pubDate>
    <dc:creator>Isi</dc:creator>
    <dc:date>2025-08-24T20:12:17Z</dc:date>
    <item>
      <title>PATs sharing in a global data platform</title>
      <link>https://community.databricks.com/t5/administration-architecture/pats-sharing-in-a-global-data-platform/m-p/128195#M3854</link>
      <description>&lt;P&gt;Hello all&lt;/P&gt;&lt;P&gt;Checking on how others implement sharing of Databricks personal access tokens for authentication wherein you have atleast 25+ different technologies extracting data via SQL warehouses ((imagine a global data platform that hosts data for usage across company))&lt;/P&gt;&lt;P&gt;1. Some technologies don't support oauth, example - Collibra, Knime - forcing us to generate PATs&lt;/P&gt;&lt;P&gt;2. Some technologies can't read from a key vault where we like to put the PATs centrally - example, Collibra, Knime, Informatica&lt;/P&gt;&lt;P&gt;These situations are resulting into maintenance overhead for us. Though we have PATs expiry alert, these need to be regenerated &amp;amp; sent to the respective stakeholders. How to document stakeholders at scale is another topic where I like to hear the ideas.&lt;/P&gt;&lt;P&gt;Appreciate the mind share...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Aug 2025 10:08:23 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/pats-sharing-in-a-global-data-platform/m-p/128195#M3854</guid>
      <dc:creator>noorbasha534</dc:creator>
      <dc:date>2025-08-12T10:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: PATs sharing in a global data platform</title>
      <link>https://community.databricks.com/t5/administration-architecture/pats-sharing-in-a-global-data-platform/m-p/129527#M3948</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/124839"&gt;@noorbasha534&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P class=""&gt;Honestly, I really understand your pain around token management. I face the same situation myself and it can definitely become a headache, especially when you have multiple technologies in play, some of them open-source, and even cases where you end up overlapping tools that essentially try to do the same job.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;From my experience, the best approach is to use a central system such as &lt;SPAN class=""&gt;&lt;STRONG&gt;Secret Manager&lt;/STRONG&gt;&lt;/SPAN&gt; or &lt;SPAN class=""&gt;&lt;STRONG&gt;Azure Key Vault&lt;/STRONG&gt;&lt;/SPAN&gt; as the secure place to store these PATs. If that’s not possible, then try to rely on role assumptions so that machines or services can fetch the required secrets dynamically without embedding them everywhere.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;When it comes to rotation, my recommendation is to use the &lt;I&gt;same system&lt;/I&gt; for creation and rotation. For example, if you create PATs via Terraform, avoid rotating them with a separate Cloud Function or Lambda, otherwise you’ll constantly introduce drift. A better pattern is to leverage reporting capabilities to identify tokens that are about to expire, and then have a process that both rotates and notifies stakeholders. I’ve implemented this email system with the Graph API client to avoid spams.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;It’s also worth noting that if you work with &lt;SPAN class=""&gt;&lt;STRONG&gt;Service Principals&lt;/STRONG&gt;&lt;/SPAN&gt;, you’ll need PATs anyway since they’re not human users. And even if you move to OAuth, you still face expiration periods — meaning you’ll have to reconnect or refresh sessions, which can also break ingestion pipelines or refreshes. For example, I’ve seen this happen with &lt;SPAN class=""&gt;&lt;STRONG&gt;Power BI dashboards&lt;/STRONG&gt;&lt;/SPAN&gt;, where failed refreshes were reported just because the OAuth token had expired for the assigned user.&lt;BR /&gt;&lt;BR /&gt;Hope this helps, &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Isi&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 20:12:17 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/pats-sharing-in-a-global-data-platform/m-p/129527#M3948</guid>
      <dc:creator>Isi</dc:creator>
      <dc:date>2025-08-24T20:12:17Z</dc:date>
    </item>
  </channel>
</rss>

