<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Error on github association in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/error-on-github-association/m-p/138021#M4420</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/116727"&gt;@EdsonDEV&lt;/a&gt;&amp;nbsp;,&amp;nbsp; Thanks for the screenshot—your Linked accounts page is showing “Error fetching credentials,” which blocks linking GitHub and can make the settings view spin indefinitely.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 class="paragraph"&gt;What typically causes this&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;A broken or stale &lt;STRONG&gt;linked Git credential&lt;/STRONG&gt; (for example, a PAT that expired or a credential key that no longer exists) can surface as “Error fetching credentials / key does not exist in workspace.”&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;Using the &lt;STRONG&gt;Databricks GitHub App&lt;/STRONG&gt; (OAuth) with a &lt;STRONG&gt;GitHub EMU&lt;/STRONG&gt; account isn’t supported; EMU users must link with a personal access token (PAT) instead.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;A PAT that lacks required scopes (at minimum, repo and workflow if you use Actions) will fail validation when Databricks tries to use it.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;If your org enforces &lt;STRONG&gt;SAML SSO&lt;/STRONG&gt; in GitHub, the PAT must be explicitly authorized for SSO or Git operations will be denied.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;Having multiple GitHub sessions in the browser can cause odd auth/UI behavior; using an incognito window or separate browser profile avoids session collisions.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 class="paragraph"&gt;Fast troubleshooting steps&lt;/H3&gt;
&lt;H3 class="paragraph"&gt;Open the settings in an &lt;STRONG&gt;incognito&lt;/STRONG&gt; window (or another browser), then go to Settings &amp;gt; Linked accounts and click &lt;STRONG&gt;Retry&lt;/STRONG&gt; to reload the credentials.&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;Decide your auth path:
&lt;UL&gt;
&lt;LI&gt;If you’re on GitHub EMU, choose &lt;STRONG&gt;Personal access token&lt;/STRONG&gt; and avoid the GitHub App.&lt;/LI&gt;
&lt;LI&gt;If you are on GitHub.com or GitHub AE (not Enterprise Server), the &lt;STRONG&gt;GitHub App (OAuth)&lt;/STRONG&gt; is recommended; otherwise use PAT.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;For PATs, create a &lt;STRONG&gt;fine‑grained token&lt;/STRONG&gt; with at least:
&lt;UL&gt;
&lt;LI&gt;Repository access limited to the repos you need, and&lt;/LI&gt;
&lt;LI&gt;Permissions: Contents = Read and write; include &lt;STRONG&gt;workflow&lt;/STRONG&gt; if you use Actions. Then paste it under Settings &amp;gt; Linked accounts and Save.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;If your org uses GitHub &lt;STRONG&gt;SAML SSO&lt;/STRONG&gt;, open the token’s details and click &lt;STRONG&gt;Authorize&lt;/STRONG&gt; for SSO, then Save again in Databricks.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;If the banner persists and you previously had a bad or expired PAT, you may have a &lt;STRONG&gt;corrupted/ghost credential&lt;/STRONG&gt; record. This is a known class of issue; Support can clear the bad key on the backend when the UI can’t load or remove it.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 class="paragraph"&gt;Notes and references&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;Setup flow and options (OAuth vs PAT), EMU limitation, and scopes are documented in Databricks docs under “Configure Git credentials &amp;amp; connect a remote repo.” * The Linked accounts page is the right place to add/edit Git credentials for Git folders (Repos).&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="paragraph"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="paragraph"&gt;Hoping this helps, Louis.&lt;/DIV&gt;</description>
    <pubDate>Thu, 06 Nov 2025 18:50:18 GMT</pubDate>
    <dc:creator>Louis_Frolio</dc:creator>
    <dc:date>2025-11-06T18:50:18Z</dc:date>
    <item>
      <title>Error on github association</title>
      <link>https://community.databricks.com/t5/administration-architecture/error-on-github-association/m-p/83601#M1611</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;I'm having an error when trying to link a &lt;STRONG&gt;GitHub&lt;/STRONG&gt; account to store some scripts. Looks like my &lt;STRONG&gt;profile&lt;/STRONG&gt; keeps on eternal loading too. Does anyone know how I can fix that?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 12:44:06 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/error-on-github-association/m-p/83601#M1611</guid>
      <dc:creator>EdsonDEV</dc:creator>
      <dc:date>2024-08-20T12:44:06Z</dc:date>
    </item>
    <item>
      <title>Re: Error on github association</title>
      <link>https://community.databricks.com/t5/administration-architecture/error-on-github-association/m-p/138021#M4420</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/116727"&gt;@EdsonDEV&lt;/a&gt;&amp;nbsp;,&amp;nbsp; Thanks for the screenshot—your Linked accounts page is showing “Error fetching credentials,” which blocks linking GitHub and can make the settings view spin indefinitely.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 class="paragraph"&gt;What typically causes this&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;A broken or stale &lt;STRONG&gt;linked Git credential&lt;/STRONG&gt; (for example, a PAT that expired or a credential key that no longer exists) can surface as “Error fetching credentials / key does not exist in workspace.”&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;Using the &lt;STRONG&gt;Databricks GitHub App&lt;/STRONG&gt; (OAuth) with a &lt;STRONG&gt;GitHub EMU&lt;/STRONG&gt; account isn’t supported; EMU users must link with a personal access token (PAT) instead.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;A PAT that lacks required scopes (at minimum, repo and workflow if you use Actions) will fail validation when Databricks tries to use it.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;If your org enforces &lt;STRONG&gt;SAML SSO&lt;/STRONG&gt; in GitHub, the PAT must be explicitly authorized for SSO or Git operations will be denied.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;Having multiple GitHub sessions in the browser can cause odd auth/UI behavior; using an incognito window or separate browser profile avoids session collisions.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 class="paragraph"&gt;Fast troubleshooting steps&lt;/H3&gt;
&lt;H3 class="paragraph"&gt;Open the settings in an &lt;STRONG&gt;incognito&lt;/STRONG&gt; window (or another browser), then go to Settings &amp;gt; Linked accounts and click &lt;STRONG&gt;Retry&lt;/STRONG&gt; to reload the credentials.&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;Decide your auth path:
&lt;UL&gt;
&lt;LI&gt;If you’re on GitHub EMU, choose &lt;STRONG&gt;Personal access token&lt;/STRONG&gt; and avoid the GitHub App.&lt;/LI&gt;
&lt;LI&gt;If you are on GitHub.com or GitHub AE (not Enterprise Server), the &lt;STRONG&gt;GitHub App (OAuth)&lt;/STRONG&gt; is recommended; otherwise use PAT.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;For PATs, create a &lt;STRONG&gt;fine‑grained token&lt;/STRONG&gt; with at least:
&lt;UL&gt;
&lt;LI&gt;Repository access limited to the repos you need, and&lt;/LI&gt;
&lt;LI&gt;Permissions: Contents = Read and write; include &lt;STRONG&gt;workflow&lt;/STRONG&gt; if you use Actions. Then paste it under Settings &amp;gt; Linked accounts and Save.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;If your org uses GitHub &lt;STRONG&gt;SAML SSO&lt;/STRONG&gt;, open the token’s details and click &lt;STRONG&gt;Authorize&lt;/STRONG&gt; for SSO, then Save again in Databricks.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="paragraph"&gt;If the banner persists and you previously had a bad or expired PAT, you may have a &lt;STRONG&gt;corrupted/ghost credential&lt;/STRONG&gt; record. This is a known class of issue; Support can clear the bad key on the backend when the UI can’t load or remove it.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 class="paragraph"&gt;Notes and references&lt;/H3&gt;
&lt;UL&gt;
&lt;LI class="paragraph"&gt;Setup flow and options (OAuth vs PAT), EMU limitation, and scopes are documented in Databricks docs under “Configure Git credentials &amp;amp; connect a remote repo.” * The Linked accounts page is the right place to add/edit Git credentials for Git folders (Repos).&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="paragraph"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="paragraph"&gt;Hoping this helps, Louis.&lt;/DIV&gt;</description>
      <pubDate>Thu, 06 Nov 2025 18:50:18 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/error-on-github-association/m-p/138021#M4420</guid>
      <dc:creator>Louis_Frolio</dc:creator>
      <dc:date>2025-11-06T18:50:18Z</dc:date>
    </item>
  </channel>
</rss>

