10-14-2025 02:33 AM
I am using a service principal with workspace admin access to deploy Databricks asset bundles. The deployment works successfully via Jenkins using the same credentials and commands. However, when attempting the deployment through GitHub Actions, I encounter the following error:
Error: failed during request visitor: inner token: AADSTS70025: The client '***' has no configured federated identity credentialsWhat could be causing this issue? Are there additional configuration steps required for GitHub Actions to authenticate with Databricks using a service principal? Any guidance would be appreciated.
Databricks cli version: v0.252.0
Terraform Binary: 1.12.0
Terraform Provider: 1.79.0
Commands used:
.databrickscfg
#profileName
[DEFAULT]
host=https://adb-***.azuredatabricks.net
azure_tenant_id=***
azure_client_id=***
azure_client_secret=***
databricks auth profiles
databricks bundle validate -t dev -p DEFAULT
10-14-2025 03:19 AM
Hi @Nisha_Tech ,
It seems that for some reason github actions wants to authenticate osuing OAuth Token federation:
Authenticate access to Databricks using OAuth token federation | Databricks on AWS
I guess that you want to authenticate using SP. Could you check if you've done all required steps? They are described at below articles:
Authorize service principal access to Databricks with OAuth | Databricks on AWS
10-14-2025 07:08 PM
Hi @szymon_dybczak ,
Thank you for your response.
We do not want to enable OAuth tokens on service principals as it is not permissible. The service principal we are using can deploy to the Databricks workspace without OAuth when using Jenkins. Why is GitHub Actions specifically requiring an OAuth token? Is there a particular restriction or configuration difference for GitHub Actions?
Thanks,
10-15-2025 12:22 AM - edited 10-15-2025 12:23 AM
Hi @Nisha_Tech ,
Ok, got it. Github Actions should also support MS Entra service principal authentication but I guess you need to configure it a different way.
Could you try to configure it in the same way they recommend in documentation?
Service principals for CI/CD - Azure Databricks | Microsoft Learn
I guess if you configure AZURE_CREDENTIAL then you can use Azure Login action which will perform authentication for your session. There's a good example how to use that at below link:
Authenticate to Azure from GitHub Actions by a secret | Microsoft Learn
Hi @Nisha_Tech ,
Ok, got it. Github Actions should also support MS Entra service principal authentication but I guess you need to configure it a different way.
Could you try to configure it in the same way they recommend in documentation?
Service principals for CI/CD - Azure Databricks | Microsoft Learn
I guess if you configure AZURE_CREDENTIAL then you can use Azure Login action which will perform authentication for your session. There's a good example how to use that at below link:
Authenticate to Azure from GitHub Actions by a secret | Microsoft Learn
Unfortunately, I can't check it myself because at current project I have only access to Azure Devops.
yesterday - last edited yesterday
3 hours ago
Environment variables override .databrickscfg, that's why it is probably failing to OIDC.
Make sure that you have correct specification in your databricks.yml so it will be source of true. Smth like:
- name: Deploy bundle
env:
DATABRICKS_HOST: https://adb-***.azuredatabricks.net
ARM_TENANT_ID: ${{ secrets.AZURE_TENANT_ID }}
ARM_CLIENT_ID: ${{ secrets.AZURE_CLIENT_ID }}
ARM_CLIENT_SECRET: ${{ secrets.AZURE_CLIENT_SECRET }}
Passionate about hosting events and connecting people? Help us grow a vibrant local community—sign up today to get started!
Sign Up Now