@Domonkos Rozsa :
You are correct that Databricks does not support SSO and MFA for the Account Owner. However, there are several built-in mechanisms that can help secure the Account Owner account and protect it from unauthorized access:
- Password policy: Databricks allows you to set a password policy for all users, including the Account Owner. You can set password length, complexity requirements, and expiration rules to ensure that passwords are secure and regularly updated.
- IP access lists: Databricks allows you to restrict access to your account based on IP address. You can create IP access lists that specify which IP addresses are allowed to access your Databricks account, and block access from all other IP addresses. This can help prevent unauthorized access to the Account Owner account.
- Audit logging: Databricks provides extensive audit logging capabilities, including logs of all user activity, login attempts, and administrative actions. You can use these logs to monitor activity on the Account Owner account and identify any suspicious activity.
- Role-based access control: Databricks supports role-based access control (RBAC), which allows you to grant permissions to users based on their roles and responsibilities. By assigning appropriate roles to the Account Owner, you can limit the actions they can perform and reduce the risk of accidental or intentional damage to your account.
Regarding the lockout mechanism, Databricks does not have an automatic lockout feature for the Account Owner account. However, you can set up an alert in Databricks monitoring that triggers when multiple failed login attempts are detected for the Account Owner account. This can help you identify and respond to potential unauthorized access attempts.
Overall, the best practices to secure the Account Owner account include enforcing strong passwords, restricting access to trusted IP addresses, monitoring activity through audit logging, and using RBAC to limit permissions. Additionally, you should regularly review and update your security measures to ensure they remain effective against evolving threats.