cancel
Showing results for 
Search instead for 
Did you mean: 
Administration & Architecture
Explore discussions on Databricks administration, deployment strategies, and architectural best practices. Connect with administrators and architects to optimize your Databricks environment for performance, scalability, and security.
cancel
Showing results for 
Search instead for 
Did you mean: 

Privileged Identity Management for Databricks with Microsoft Entra ID

HariSelvarajan
Databricks Employee
Databricks Employee

Privileged Identity Management (PIM) can be used to secure access to critical Databricks roles with Just-in-Time (JIT) access. This approach helps organizations enforce time-bound permissions, approval workflows, and centralized auditing for sensitive resources.
In my latest blog, I walk through the process of setting up PIM for Azure Databricks, demonstrating how to grant temporary account admin access via SCIM integration with Microsoft Entra ID.
With PIM, Databricks users can request access only when needed, with full oversight on who accesses what and for how long.

https://lnkd.in/e5iYEVZp

3 REPLIES 3

jasonkhaihoang
New Contributor II

Thanks. However, as what I know, Azure PIM does not work for Service Principals. It's only applied to human user access 🙂

sugidwan
New Contributor II

Thanks for sharing this, it is helpful. However, onboarding the AAD group as an account admin under the Databricks account is not straightforward and is also not clearly explained in the blog.

You can use the instructions here for adding group to account as account admin

https://learn.microsoft.com/en-us/azure/databricks/admin/users-groups/groups#account-admin