There isnāt a Databricks-side wildcard subject pattern to solve this.
Databricks service principal federation policies donāt support wildcard / glob / regex matching on subject today, the policyās oidc_policy.subject is effectively an exact match against whatever claim you configure as the āsubject claimā (default: sub). The Databricks docs describe subject as the unique identifier for the workload, and only mention switching subject_claim away from sub if sub is not stable. https://docs.databricks.com/aws/en/dev-tools/auth/oauth-federation-policy
So the ārecommendedā way to make this work across many PRs/workflows is not a wildcard in Databricks, but making the GitHub-issued subject stable.
The recommended solution is to make the GitHub sub stable, use GitHub Environments so sub is repo:<org>/<repo>:environment:<env> even for PR workflows.
If your org has customized sub to include job_workflow_ref/PR refs, update that GitHub customization to a stable template.
Otherwise, fall back to subject_claim = a stable claim like repository, understanding the security implications