<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable local user creation when using SCIM Provisioning in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/137459#M4344</link>
    <description>&lt;P&gt;Greetings&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/155477"&gt;@ThePussCat&lt;/a&gt;&amp;nbsp;, I would like to add what my colleague posted above.&amp;nbsp;&lt;/P&gt;
&lt;DIV class="paragraph"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="paragraph"&gt;Yes—there are a couple of ways to prevent “accidental” user creation so identities only arrive via your &lt;STRONG&gt;SCIM&lt;/STRONG&gt; provisioning flow.&lt;/DIV&gt;
&lt;DIV class="paragraph"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H3 class="paragraph"&gt;Recommended controls&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;Disable &lt;STRONG&gt;auto user creation (JIT)&lt;/STRONG&gt; on SSO. This stops Databricks from creating a user the first time someone signs in via SSO; only users you provision (e.g., via SCIM) can exist in the workspace.&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;Use &lt;STRONG&gt;account‑level SCIM&lt;/STRONG&gt; with &lt;STRONG&gt;identity federation&lt;/STRONG&gt;, and turn off any workspace‑level SCIM connectors you might still have. This centralizes identity creation at the account, reduces drift, and avoids duplicate paths for user creation.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;In Microsoft Entra (Azure AD), set the enterprise app’s &lt;STRONG&gt;Assignment required&lt;/STRONG&gt; to Yes if you want only explicitly assigned users to be able to sign in. This prevents unassigned users from authenticating to Databricks (and therefore from being created), which complements disabling JIT in Databricks.&lt;BR /&gt;Note: Entra group assignment doesn’t cascade to nested groups, so only direct members of assigned groups can sign in.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 class="paragraph"&gt;Where to click&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;Databricks SSO setting: In each workspace, go to Admin settings &amp;gt; Authentication/SSO and disable the setting labeled “Auto user creation,” “Add users on first login,” or similar wording.&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;Account‑level SCIM: Configure the Azure Databricks SCIM connector at the account, then shut down any workspace‑level SCIM connectors you previously used, per the migration guidance.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;Entra Assignment required: Entra admin center &amp;gt; Enterprise applications &amp;gt; Azure Databricks SCIM/SSO app &amp;gt; Properties &amp;gt; set Assignment required = Yes (be mindful of the nested‑group behavior).&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 class="paragraph"&gt;Optional: monitoring and verification&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;Audit unexpected sign‑ins and user appearances using system tables (for example, system.access.audit) after you change the controls, so you can confirm that no new users are being created outside your SCIM flow.&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="paragraph"&gt;Hope this added information helps, Louis.&lt;/DIV&gt;</description>
    <pubDate>Mon, 03 Nov 2025 21:14:35 GMT</pubDate>
    <dc:creator>Louis_Frolio</dc:creator>
    <dc:date>2025-11-03T21:14:35Z</dc:date>
    <item>
      <title>Disable local user creation when using SCIM Provisioning</title>
      <link>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/113809#M3184</link>
      <description>&lt;P&gt;We have implemented SCIM Provisioning using Azure AD (MS Entra) to Azure Databricks.&lt;/P&gt;&lt;P&gt;All is good.&lt;/P&gt;&lt;P&gt;Except, we would like to know if it is possible to disable the ability to create users within Azure Databricks, so that none can be "accidentally" created?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 13:49:53 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/113809#M3184</guid>
      <dc:creator>ThePussCat</dc:creator>
      <dc:date>2025-03-27T13:49:53Z</dc:date>
    </item>
    <item>
      <title>Re: Disable local user creation when using SCIM Provisioning</title>
      <link>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/117299#M3309</link>
      <description>&lt;P&gt;To disable the ability to create users directly within Azure Databricks to prevent accidental user creation, you can configure your identity provider (IdP) setup.&lt;/P&gt;
&lt;P&gt;When SCIM is in use, Azure AD becomes the source of truth for identities. Any users or groups that need access to Azure Databricks must be provisioned through Azure AD.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/databricks/admin/users-groups/scim/" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/databricks/admin/users-groups/scim/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 May 2025 06:11:17 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/117299#M3309</guid>
      <dc:creator>NandiniN</dc:creator>
      <dc:date>2025-05-01T06:11:17Z</dc:date>
    </item>
    <item>
      <title>Re: Disable local user creation when using SCIM Provisioning</title>
      <link>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/117364#M3313</link>
      <description>&lt;P&gt;Thanks for the reply, but this is what we are already doing. However it does not actually "disallow" the creation of users within Databricks itself, which is what we really want to achieve.&lt;/P&gt;</description>
      <pubDate>Thu, 01 May 2025 09:49:57 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/117364#M3313</guid>
      <dc:creator>ThePussCat</dc:creator>
      <dc:date>2025-05-01T09:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: Disable local user creation when using SCIM Provisioning</title>
      <link>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/137459#M4344</link>
      <description>&lt;P&gt;Greetings&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/155477"&gt;@ThePussCat&lt;/a&gt;&amp;nbsp;, I would like to add what my colleague posted above.&amp;nbsp;&lt;/P&gt;
&lt;DIV class="paragraph"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="paragraph"&gt;Yes—there are a couple of ways to prevent “accidental” user creation so identities only arrive via your &lt;STRONG&gt;SCIM&lt;/STRONG&gt; provisioning flow.&lt;/DIV&gt;
&lt;DIV class="paragraph"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H3 class="paragraph"&gt;Recommended controls&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;Disable &lt;STRONG&gt;auto user creation (JIT)&lt;/STRONG&gt; on SSO. This stops Databricks from creating a user the first time someone signs in via SSO; only users you provision (e.g., via SCIM) can exist in the workspace.&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;Use &lt;STRONG&gt;account‑level SCIM&lt;/STRONG&gt; with &lt;STRONG&gt;identity federation&lt;/STRONG&gt;, and turn off any workspace‑level SCIM connectors you might still have. This centralizes identity creation at the account, reduces drift, and avoids duplicate paths for user creation.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;In Microsoft Entra (Azure AD), set the enterprise app’s &lt;STRONG&gt;Assignment required&lt;/STRONG&gt; to Yes if you want only explicitly assigned users to be able to sign in. This prevents unassigned users from authenticating to Databricks (and therefore from being created), which complements disabling JIT in Databricks.&lt;BR /&gt;Note: Entra group assignment doesn’t cascade to nested groups, so only direct members of assigned groups can sign in.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 class="paragraph"&gt;Where to click&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;Databricks SSO setting: In each workspace, go to Admin settings &amp;gt; Authentication/SSO and disable the setting labeled “Auto user creation,” “Add users on first login,” or similar wording.&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;Account‑level SCIM: Configure the Azure Databricks SCIM connector at the account, then shut down any workspace‑level SCIM connectors you previously used, per the migration guidance.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;Entra Assignment required: Entra admin center &amp;gt; Enterprise applications &amp;gt; Azure Databricks SCIM/SSO app &amp;gt; Properties &amp;gt; set Assignment required = Yes (be mindful of the nested‑group behavior).&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 class="paragraph"&gt;Optional: monitoring and verification&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;Audit unexpected sign‑ins and user appearances using system tables (for example, system.access.audit) after you change the controls, so you can confirm that no new users are being created outside your SCIM flow.&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="paragraph"&gt;Hope this added information helps, Louis.&lt;/DIV&gt;</description>
      <pubDate>Mon, 03 Nov 2025 21:14:35 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/137459#M4344</guid>
      <dc:creator>Louis_Frolio</dc:creator>
      <dc:date>2025-11-03T21:14:35Z</dc:date>
    </item>
    <item>
      <title>Re: Disable local user creation when using SCIM Provisioning</title>
      <link>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/137632#M4388</link>
      <description>&lt;P&gt;Louis, Many thanks! I really appreciate this reply. However perhaps you could provide more info on this statement:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Databricks SSO setting: In each workspace, go to Admin settings &amp;gt; Authentication/SSO and disable the setting labeled “Auto user creation,” “Add users on first login,” or similar wording.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I know the Databricks UI is forever changing, but I have looked around and cannot find anything that looks like what you describe.Is this perhaps a legacy setting that we have disabled?&lt;/P&gt;&lt;P&gt;Thanks again - I'll be talking to our MS Entra admin in the morning!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 18:37:11 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/137632#M4388</guid>
      <dc:creator>ThePussCat</dc:creator>
      <dc:date>2025-11-04T18:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: Disable local user creation when using SCIM Provisioning</title>
      <link>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/137633#M4389</link>
      <description>&lt;P&gt;Are you a workspace admin?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 18:52:42 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/137633#M4389</guid>
      <dc:creator>Louis_Frolio</dc:creator>
      <dc:date>2025-11-04T18:52:42Z</dc:date>
    </item>
    <item>
      <title>Re: Disable local user creation when using SCIM Provisioning</title>
      <link>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/137634#M4390</link>
      <description>&lt;P&gt;I'm the Account Admin.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;We try to avoid workspace specific configuration settings where we can, other than allowing some beta/preview on our DEV workspaces.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 19:12:55 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/137634#M4390</guid>
      <dc:creator>ThePussCat</dc:creator>
      <dc:date>2025-11-04T19:12:55Z</dc:date>
    </item>
    <item>
      <title>Re: Disable local user creation when using SCIM Provisioning</title>
      <link>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/137643#M4391</link>
      <description>&lt;P&gt;Got it. I found a little more information that might help. Give this a read and let me know if it helps.&lt;/P&gt;
&lt;DIV class="paragraph"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="paragraph"&gt;You're right that the UI has evolved, and the wording I used maps to newer account-level controls rather than a visible workspace toggle.&lt;/DIV&gt;
&lt;DIV class="paragraph"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H3 class="paragraph"&gt;What changed&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;The legacy workspace-level SSO page and its “Add users on first login / auto user creation” toggle only appears when &lt;STRONG&gt;unified login&lt;/STRONG&gt; is disabled. For most accounts today, unified login is enabled, so you won’t see that workspace SSO toggle in Admin Settings. This is expected UI behavior.&lt;/LI&gt;
&lt;LI&gt;The capability behind “auto user creation” is now called &lt;STRONG&gt;just-in-time (JIT) provisioning&lt;/STRONG&gt; at the account level. JIT automatically creates a Databricks user on first successful SSO login when enabled.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 class="paragraph"&gt;Where to check it now&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;In the &lt;STRONG&gt;account console&lt;/STRONG&gt;, go to Security &amp;gt; User provisioning and look for “Create new identities during first-time authentication.” That’s the JIT toggle that replaces the old workspace-level “auto user creation.”&lt;/LI&gt;
&lt;LI&gt;Defaults have changed over time: for accounts created after May 1, 2025, JIT is ON by default once SSO is configured; earlier accounts can enable/disable it in the same place.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 class="paragraph"&gt;Azure/Microsoft Entra specifics&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;On Azure Databricks, &lt;STRONG&gt;single sign-on with Microsoft Entra ID is the default&lt;/STRONG&gt; for both the account console and workspaces, which is why most customers don’t interact with separate workspace SSO settings anymore.&lt;/LI&gt;
&lt;LI&gt;If your account uses &lt;STRONG&gt;automatic identity management&lt;/STRONG&gt;, JIT is always enabled and cannot be turned off; new users are provisioned on first login automatically. This is by design in that mode.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 class="paragraph"&gt;Practical ways to control who can be created/onboarded&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;Use &lt;STRONG&gt;SCIM provisioning&lt;/STRONG&gt; from Microsoft Entra to sync only the users/groups you intend into the Databricks account; this is the recommended pattern for managed onboarding.&lt;/LI&gt;
&lt;LI&gt;In Microsoft Entra, set the enterprise app’s &lt;STRONG&gt;Assignment required&lt;/STRONG&gt; property to “Yes” so only assigned users can sign in to the Databricks app; unassigned users will be blocked from obtaining tokens and won’t be created via JIT.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 class="paragraph"&gt;Why you couldn’t find the workspace toggle&lt;/H3&gt;
&lt;DIV class="paragraph"&gt;Because unified login is enabled for most accounts (and cannot be disabled for accounts created after June 21, 2023 or that hadn’t configured workspace SSO before Dec 12, 2024), workspace-level SSO settings—including the old “add users on first login” toggle—are hidden and considered legacy.&lt;/DIV&gt;
&lt;DIV class="paragraph"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="paragraph"&gt;Let me know if this helps.&lt;/DIV&gt;
&lt;DIV class="paragraph"&gt;Cheers, Louis.&lt;/DIV&gt;</description>
      <pubDate>Tue, 04 Nov 2025 20:03:37 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/137643#M4391</guid>
      <dc:creator>Louis_Frolio</dc:creator>
      <dc:date>2025-11-04T20:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: Disable local user creation when using SCIM Provisioning</title>
      <link>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/137811#M4405</link>
      <description>&lt;P&gt;Thank you! Thats really clear now, and hopefully helpful to others.&lt;/P&gt;&lt;P&gt;Ours is set to (default) OFF - we do not want JIT provisioning enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2025 17:24:02 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/disable-local-user-creation-when-using-scim-provisioning/m-p/137811#M4405</guid>
      <dc:creator>ThePussCat</dc:creator>
      <dc:date>2025-11-05T17:24:02Z</dc:date>
    </item>
  </channel>
</rss>

