1. Confirm HTTPS URL with .git suffix ā no embedded credentials in URL
Don't Use Use Instead
2. If self-hosted Git ā ask admin to register the host in Databricks Admin Console
- A Databricks admin must register the custom Git host:
- Without this, Databricks silently fails auth even with valid credentials
3. Delete ALL saved Git credentials in Databricks ā re-add one clean credential
Databricks stores Git credentials per user:
- Go to Settings ā Linked Accounts ā Git Credentials
- Confirm the credential is saved under your current logged-in user
- If you have multiple Databricks accounts/workspaces, verify you're in the right workspace
- Delete and re-add the credential fresh ā sometimes a corrupted entry persists silent
4. If Azure DevOps ā verify org name and URL format
If using Azure DevOps, this is a frequent Databricks-specific trap:
Correct URL format for Azure DevOps:
https://dev.azure.com/{organization}/{project}/_git/{repository}Old format (may fail in Databricks):
https://{organization}.visualstudio.com/{project}/_git/{repository}Also ensure your PAT was generated under the correct Azure DevOps Organization ā a PAT from Org A won't work for Org B even with identical settings.
5. Regenerate PAT ā re-save in Databricks
Some PATs contain characters (+, =, /, @) that Databricks may mishandle:
- Regenerate your PAT and check if the new one works
- If your provider allows it, regenerate until you get a token without special characters
Nagesh Patil