cancel
Showing results for 
Search instead for 
Did you mean: 
Administration & Architecture
Explore discussions on Databricks administration, deployment strategies, and architectural best practices. Connect with administrators and architects to optimize your Databricks environment for performance, scalability, and security.
cancel
Showing results for 
Search instead for 
Did you mean: 

Disable local user creation when using SCIM Provisioning

ThePussCat
New Contributor II

We have implemented SCIM Provisioning using Azure AD (MS Entra) to Azure Databricks.

All is good.

Except, we would like to know if it is possible to disable the ability to create users within Azure Databricks, so that none can be "accidentally" created?

 

Many thanks

2 REPLIES 2

NandiniN
Databricks Employee
Databricks Employee

To disable the ability to create users directly within Azure Databricks to prevent accidental user creation, you can configure your identity provider (IdP) setup.

When SCIM is in use, Azure AD becomes the source of truth for identities. Any users or groups that need access to Azure Databricks must be provisioned through Azure AD.

https://learn.microsoft.com/en-us/azure/databricks/admin/users-groups/scim/

ThePussCat
New Contributor II

Thanks for the reply, but this is what we are already doing. However it does not actually "disallow" the creation of users within Databricks itself, which is what we really want to achieve.

Join Us as a Local Community Builder!

Passionate about hosting events and connecting people? Help us grow a vibrant local community—sign up today to get started!

Sign Up Now