<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Automatic Identity Management in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/automatic-identity-management/m-p/150166#M4973</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/212135"&gt;@andrefilipemm&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;These are important questions when planning a migration to identity federation and Unity Catalog. Let me address each one.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;BACKGROUND: HOW IDENTITY FEDERATION WORKS&lt;/P&gt;
&lt;P&gt;When you enable identity federation on a workspace, identity management shifts from the workspace level to the account level. Users and service principals that were created at the workspace level are automatically recognized at the account level (they share the same underlying identity based on email/applicationId). Groups, however, behave differently: workspace-local groups remain workspace-scoped and do NOT automatically become account groups.&lt;/P&gt;
&lt;P&gt;Databricks documentation on identity best practices:&lt;BR /&gt;&lt;A href="https://docs.databricks.com/aws/en/admin/users-groups/best-practices" target="_blank"&gt;https://docs.databricks.com/aws/en/admin/users-groups/best-practices&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;QUESTION 1: WILL ENABLING IDENTITY FEDERATION CAUSE USER/GROUP COLLISIONS?&lt;/P&gt;
&lt;P&gt;For users and service principals: No collisions. Workspace-level users and service principals are already synced to the account level based on their email address or application ID. When you enable identity federation, those identities are recognized as the same identity at both levels. There is no duplication.&lt;/P&gt;
&lt;P&gt;For groups: This is where you need to be careful. Workspace-local groups and account groups are separate objects, even if they share the same name. When you enable identity federation, your existing workspace-local groups remain as workspace-local groups. They do not automatically merge with or collide with account-level groups. However, if you then create an account group with the same name and assign it to the workspace, you will have two groups with identical names (one workspace-local, one account-level), which can cause confusion.&lt;/P&gt;
&lt;P&gt;The recommended approach is to rename your workspace-local groups (e.g., append " (workspace)" to the name) before creating equivalent account groups. This avoids any ambiguity.&lt;/P&gt;
&lt;P&gt;If you are currently using workspace-level SCIM provisioning via Terraform, you should be aware that workspace-level SCIM does not recognize account groups and API calls will fail if they involve account groups. You will need to transition your SCIM provisioning to the account level.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;QUESTION 2: SHOULD WORKSPACE-LOCAL USERS AND GROUPS BE DESTROYED AFTER ENABLING IDENTITY FEDERATION?&lt;/P&gt;
&lt;P&gt;Users and service principals: You do NOT need to destroy workspace-level users and service principals. They are the same identity at both levels. Removing them at the workspace level simply removes their workspace assignment, it does not delete the account-level identity.&lt;/P&gt;
&lt;P&gt;Groups: Yes, after migration you should eventually remove workspace-local groups, but only AFTER you have:&lt;/P&gt;
&lt;P&gt;1. Created equivalent account-level groups with the same memberships&lt;BR /&gt;2. Migrated all permissions from the workspace-local groups to the new account groups&lt;BR /&gt;3. Verified that everything works correctly with the account groups&lt;/P&gt;
&lt;P&gt;The recommended four-step process from the Databricks documentation is:&lt;/P&gt;
&lt;P&gt;1. Migrate workspace-level SCIM provisioning to account-level SCIM (set up your Entra ID SCIM connector at the account level and disable the workspace-level one)&lt;BR /&gt;2. Rename workspace-local groups (e.g., append " (workspace)") to avoid name conflicts&lt;BR /&gt;3. Create account groups, assign them to the workspace, grant equivalent permissions using the Permissions API or the UCX migration utilities&lt;BR /&gt;4. Delete the original workspace-local groups once you have confirmed the account groups are working&lt;/P&gt;
&lt;P&gt;Documentation on converting workspace-local groups:&lt;BR /&gt;&lt;A href="https://docs.databricks.com/aws/en/admin/users-groups/workspace-local-groups" target="_blank"&gt;https://docs.databricks.com/aws/en/admin/users-groups/workspace-local-groups&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;QUESTION 3: WHAT HAPPENS TO RESOURCES BOUND TO WORKSPACE-LOCAL USERS AND GROUPS?&lt;/P&gt;
&lt;P&gt;Permissions on workspace-level objects (notebooks, folders, jobs, clusters, etc.) that were granted to workspace-local users and service principals will continue to work because those identities are the same at both the workspace and account levels.&lt;/P&gt;
&lt;P&gt;Permissions granted to workspace-local groups, however, will need to be migrated. Workspace-local groups cannot be used with Unity Catalog, cannot be assigned to other workspaces, and cannot be granted account-level roles. When you delete a workspace-local group, any permissions tied to it are lost.&lt;/P&gt;
&lt;P&gt;Before deleting workspace-local groups, you must explicitly migrate their permissions to the replacement account groups. You can do this using:&lt;/P&gt;
&lt;P&gt;- The Databricks Permissions API to read and re-apply workspace object permissions&lt;BR /&gt;- The UCX (Unity Catalog migration) utilities, which include tooling for group permission migration&lt;/P&gt;
&lt;P&gt;This is the most critical step in the migration, so take your time and validate thoroughly before removing the old groups.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;TERRAFORM-SPECIFIC GUIDANCE&lt;/P&gt;
&lt;P&gt;Since you are currently using Terraform with the Databricks provider, here is the transition path:&lt;/P&gt;
&lt;P&gt;1. Set up account-level SCIM provisioning from Entra ID. You can do this through an Azure Enterprise Application configured as an account-level SCIM connector. Documentation:&lt;BR /&gt;&lt;A href="https://docs.databricks.com/aws/en/admin/users-groups/scim/aad" target="_blank"&gt;https://docs.databricks.com/aws/en/admin/users-groups/scim/aad&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;2. In your Terraform code, shift from workspace-level resources (databricks_group, databricks_user at the workspace provider) to account-level resources using the account-level Databricks provider. Use databricks_mws_permission_assignment to assign account-level groups to workspaces.&lt;/P&gt;
&lt;P&gt;3. Use the databricks_group data source at the account level to reference groups synced from Entra ID rather than manually replicating them.&lt;/P&gt;
&lt;P&gt;This eliminates the manual group replication you described and centralizes identity management at the account level, which is the intended architecture for Unity Catalog environments.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;SUMMARY&lt;/P&gt;
&lt;P&gt;- Enabling identity federation does not cause collisions for users/service principals. Groups need careful handling (rename, recreate, migrate permissions, delete old ones).&lt;BR /&gt;- Do not simply destroy workspace-local groups. Follow the four-step migration process to preserve permissions.&lt;BR /&gt;- Resource permissions tied to users/service principals carry over. Permissions tied to workspace-local groups must be explicitly migrated to account groups before deletion.&lt;/P&gt;
&lt;P&gt;Hope this helps with your migration planning.&lt;/P&gt;
&lt;P&gt;* This reply used an agent system I built to research and draft this response based on the wide set of documentation I have available and previous memory. I personally review the draft for any obvious issues and for monitoring system reliability and update it when I detect any drift, but there is still a small chance that something is inaccurate, especially if you are experimenting with brand new features.&lt;/P&gt;</description>
    <pubDate>Sun, 08 Mar 2026 07:21:02 GMT</pubDate>
    <dc:creator>SteveOstrowski</dc:creator>
    <dc:date>2026-03-08T07:21:02Z</dc:date>
    <item>
      <title>Automatic Identity Management</title>
      <link>https://community.databricks.com/t5/administration-architecture/automatic-identity-management/m-p/145292#M4762</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;In the context of reviewing our company's databricks structure and migrating legacy workspaces to Unity Catalog enabled ones, we're stuck with a few questions regarding enabling the automatic identity management feature.&lt;/P&gt;&lt;P&gt;We currently provision Databricks users and groups using Terraform, pulling group membership data from Microsoft Entra ID. Our approach involves:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Manual Replication:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;For each Databricks workspace, we manually replicate Entra ID group definitions in Terraform.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Terraform Resources:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;We use the Databricks Terraform provider to create:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;databricks_group&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;resources for each group&lt;/LI&gt;&lt;LI&gt;databricks_user&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;resources for individual users&lt;/LI&gt;&lt;LI&gt;databricks_service_principal&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;resources for service principals&lt;/LI&gt;&lt;LI&gt;databricks_group_member&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;resources to manage memberships&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Limitations:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;This approach requires manual updates and Terraform deployments for every group or membership change.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Questions&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;If we enable the AIM will there be user/groups collision? My understand says otherwise, considering that we currently provision local workspace user/groups and AIM works at the databricks account level. Hence, the groups that'll be generated via AIM will be account sourced and shouldn't conflict with workspace provisioned ones.&lt;/LI&gt;&lt;LI&gt;Suppose there is no group collision. The next step to take after enabling AIM is simply destroying all workspace local users/groups since these will no longer be needed?&lt;/LI&gt;&lt;LI&gt;A follow-up question to 2: what happens to workspace resources which are bound to workspace users and groups?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2026 17:10:24 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/automatic-identity-management/m-p/145292#M4762</guid>
      <dc:creator>andrefilipemm</dc:creator>
      <dc:date>2026-01-26T17:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: Automatic Identity Management</title>
      <link>https://community.databricks.com/t5/administration-architecture/automatic-identity-management/m-p/150166#M4973</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/212135"&gt;@andrefilipemm&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;These are important questions when planning a migration to identity federation and Unity Catalog. Let me address each one.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;BACKGROUND: HOW IDENTITY FEDERATION WORKS&lt;/P&gt;
&lt;P&gt;When you enable identity federation on a workspace, identity management shifts from the workspace level to the account level. Users and service principals that were created at the workspace level are automatically recognized at the account level (they share the same underlying identity based on email/applicationId). Groups, however, behave differently: workspace-local groups remain workspace-scoped and do NOT automatically become account groups.&lt;/P&gt;
&lt;P&gt;Databricks documentation on identity best practices:&lt;BR /&gt;&lt;A href="https://docs.databricks.com/aws/en/admin/users-groups/best-practices" target="_blank"&gt;https://docs.databricks.com/aws/en/admin/users-groups/best-practices&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;QUESTION 1: WILL ENABLING IDENTITY FEDERATION CAUSE USER/GROUP COLLISIONS?&lt;/P&gt;
&lt;P&gt;For users and service principals: No collisions. Workspace-level users and service principals are already synced to the account level based on their email address or application ID. When you enable identity federation, those identities are recognized as the same identity at both levels. There is no duplication.&lt;/P&gt;
&lt;P&gt;For groups: This is where you need to be careful. Workspace-local groups and account groups are separate objects, even if they share the same name. When you enable identity federation, your existing workspace-local groups remain as workspace-local groups. They do not automatically merge with or collide with account-level groups. However, if you then create an account group with the same name and assign it to the workspace, you will have two groups with identical names (one workspace-local, one account-level), which can cause confusion.&lt;/P&gt;
&lt;P&gt;The recommended approach is to rename your workspace-local groups (e.g., append " (workspace)" to the name) before creating equivalent account groups. This avoids any ambiguity.&lt;/P&gt;
&lt;P&gt;If you are currently using workspace-level SCIM provisioning via Terraform, you should be aware that workspace-level SCIM does not recognize account groups and API calls will fail if they involve account groups. You will need to transition your SCIM provisioning to the account level.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;QUESTION 2: SHOULD WORKSPACE-LOCAL USERS AND GROUPS BE DESTROYED AFTER ENABLING IDENTITY FEDERATION?&lt;/P&gt;
&lt;P&gt;Users and service principals: You do NOT need to destroy workspace-level users and service principals. They are the same identity at both levels. Removing them at the workspace level simply removes their workspace assignment, it does not delete the account-level identity.&lt;/P&gt;
&lt;P&gt;Groups: Yes, after migration you should eventually remove workspace-local groups, but only AFTER you have:&lt;/P&gt;
&lt;P&gt;1. Created equivalent account-level groups with the same memberships&lt;BR /&gt;2. Migrated all permissions from the workspace-local groups to the new account groups&lt;BR /&gt;3. Verified that everything works correctly with the account groups&lt;/P&gt;
&lt;P&gt;The recommended four-step process from the Databricks documentation is:&lt;/P&gt;
&lt;P&gt;1. Migrate workspace-level SCIM provisioning to account-level SCIM (set up your Entra ID SCIM connector at the account level and disable the workspace-level one)&lt;BR /&gt;2. Rename workspace-local groups (e.g., append " (workspace)") to avoid name conflicts&lt;BR /&gt;3. Create account groups, assign them to the workspace, grant equivalent permissions using the Permissions API or the UCX migration utilities&lt;BR /&gt;4. Delete the original workspace-local groups once you have confirmed the account groups are working&lt;/P&gt;
&lt;P&gt;Documentation on converting workspace-local groups:&lt;BR /&gt;&lt;A href="https://docs.databricks.com/aws/en/admin/users-groups/workspace-local-groups" target="_blank"&gt;https://docs.databricks.com/aws/en/admin/users-groups/workspace-local-groups&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;QUESTION 3: WHAT HAPPENS TO RESOURCES BOUND TO WORKSPACE-LOCAL USERS AND GROUPS?&lt;/P&gt;
&lt;P&gt;Permissions on workspace-level objects (notebooks, folders, jobs, clusters, etc.) that were granted to workspace-local users and service principals will continue to work because those identities are the same at both the workspace and account levels.&lt;/P&gt;
&lt;P&gt;Permissions granted to workspace-local groups, however, will need to be migrated. Workspace-local groups cannot be used with Unity Catalog, cannot be assigned to other workspaces, and cannot be granted account-level roles. When you delete a workspace-local group, any permissions tied to it are lost.&lt;/P&gt;
&lt;P&gt;Before deleting workspace-local groups, you must explicitly migrate their permissions to the replacement account groups. You can do this using:&lt;/P&gt;
&lt;P&gt;- The Databricks Permissions API to read and re-apply workspace object permissions&lt;BR /&gt;- The UCX (Unity Catalog migration) utilities, which include tooling for group permission migration&lt;/P&gt;
&lt;P&gt;This is the most critical step in the migration, so take your time and validate thoroughly before removing the old groups.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;TERRAFORM-SPECIFIC GUIDANCE&lt;/P&gt;
&lt;P&gt;Since you are currently using Terraform with the Databricks provider, here is the transition path:&lt;/P&gt;
&lt;P&gt;1. Set up account-level SCIM provisioning from Entra ID. You can do this through an Azure Enterprise Application configured as an account-level SCIM connector. Documentation:&lt;BR /&gt;&lt;A href="https://docs.databricks.com/aws/en/admin/users-groups/scim/aad" target="_blank"&gt;https://docs.databricks.com/aws/en/admin/users-groups/scim/aad&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;2. In your Terraform code, shift from workspace-level resources (databricks_group, databricks_user at the workspace provider) to account-level resources using the account-level Databricks provider. Use databricks_mws_permission_assignment to assign account-level groups to workspaces.&lt;/P&gt;
&lt;P&gt;3. Use the databricks_group data source at the account level to reference groups synced from Entra ID rather than manually replicating them.&lt;/P&gt;
&lt;P&gt;This eliminates the manual group replication you described and centralizes identity management at the account level, which is the intended architecture for Unity Catalog environments.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;SUMMARY&lt;/P&gt;
&lt;P&gt;- Enabling identity federation does not cause collisions for users/service principals. Groups need careful handling (rename, recreate, migrate permissions, delete old ones).&lt;BR /&gt;- Do not simply destroy workspace-local groups. Follow the four-step migration process to preserve permissions.&lt;BR /&gt;- Resource permissions tied to users/service principals carry over. Permissions tied to workspace-local groups must be explicitly migrated to account groups before deletion.&lt;/P&gt;
&lt;P&gt;Hope this helps with your migration planning.&lt;/P&gt;
&lt;P&gt;* This reply used an agent system I built to research and draft this response based on the wide set of documentation I have available and previous memory. I personally review the draft for any obvious issues and for monitoring system reliability and update it when I detect any drift, but there is still a small chance that something is inaccurate, especially if you are experimenting with brand new features.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2026 07:21:02 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/automatic-identity-management/m-p/150166#M4973</guid>
      <dc:creator>SteveOstrowski</dc:creator>
      <dc:date>2026-03-08T07:21:02Z</dc:date>
    </item>
  </channel>
</rss>

