cancel
Showing results for 
Search instead for 
Did you mean: 
Administration & Architecture
Explore discussions on Databricks administration, deployment strategies, and architectural best practices. Connect with administrators and architects to optimize your Databricks environment for performance, scalability, and security.
cancel
Showing results for 
Search instead for 
Did you mean: 

Cap on OIDC (max 20) Enable workload identity federation for GitHub Actions

old_school
New Contributor II

Hi Databricks community,

I have followed below page and created Github OIDCs but there seems to be a cap on how many OIDC's a Service Principal can create (20 max). Is there any work around for this or some other solution apart from using Client ID and secret key for authentication.

ERROR: Too many policies for '<service principal>' (max 20)

Enable workload identity federation for GitHub Actions

https://docs.databricks.com/aws/en/dev-tools/auth/provider-github

Thank you.

 

 

1 REPLY 1

stbjelcevic
Databricks Employee
Databricks Employee

Hi @old_school ,

Most teams end up creating one policy per repo/environment combination. Are you trying to use a single service principle for all of your needs? How many OIDC's would be sufficient for a single service principle in your case?

As far as I can tell, there is no current way to increase the limit.