Privileged Identity Management for Databricks with Microsoft Entra ID
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-07-2024 01:29 AM - edited 11-07-2024 01:30 AM
Privileged Identity Management (PIM) can be used to secure access to critical Databricks roles with Just-in-Time (JIT) access. This approach helps organizations enforce time-bound permissions, approval workflows, and centralized auditing for sensitive resources.
In my latest blog, I walk through the process of setting up PIM for Azure Databricks, demonstrating how to grant temporary account admin access via SCIM integration with Microsoft Entra ID.
With PIM, Databricks users can request access only when needed, with full oversight on who accesses what and for how long.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-12-2024 10:50 PM
Thanks. However, as what I know, Azure PIM does not work for Service Principals. It's only applied to human user access 🙂
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
a month ago
Thanks for sharing this, it is helpful. However, onboarding the AAD group as an account admin under the Databricks account is not straightforward and is also not clearly explained in the blog.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
a month ago
You can use the instructions here for adding group to account as account admin
https://learn.microsoft.com/en-us/azure/databricks/admin/users-groups/groups#account-admin

