<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Usage of Azure DevOps System.AccessToken as PAT in Databricks in Data Engineering</title>
    <link>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/33677#M24626</link>
    <description>&lt;P&gt;hey everyone. We will be improving this in the coming week or two, bumping up the limit. Thank you for reporting.&lt;/P&gt;</description>
    <pubDate>Mon, 09 Jan 2023 08:34:40 GMT</pubDate>
    <dc:creator>DBReposDev</dc:creator>
    <dc:date>2023-01-09T08:34:40Z</dc:date>
    <item>
      <title>Usage of Azure DevOps System.AccessToken as PAT in Databricks</title>
      <link>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/33673#M24622</link>
      <description>&lt;P&gt;Hi there! I'm trying to use Azure DevOps Pipeline to automate Azure Databricks Repos API. Im using the following workflow:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Get an Access Token for a Databricks Service Principal using a Certificate (which works great)&lt;/LI&gt;&lt;LI&gt;Usage REST Api to generate Git Credential using System.AccessToken -&amp;gt; Fails with:&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;I&gt;personal_access_token cannot be longer than 100 characters&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I grabed the System.AccessToken from Azure DevOps and decoded it using JWT.io and it really is valid JWT. JWT will use a lot more than 100 chars, a resonable max char count would be 2048 (mine is 1118).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible that Databricks limits the PAT's to 100 chars? Are there alternatives for automating "git pull" using a Service Principal?&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;requests.post(
&amp;nbsp;
            f"{BASE_URL}/api/2.0/git-credentials",
&amp;nbsp;
            json={
&amp;nbsp;
                "git_provider": "azureDevOpsServices",
&amp;nbsp;
                "git_username": "DataHub Build Service (ORGNAME)",
&amp;nbsp;
                "personal_access_token": os.environ["SYSTEM_ACCESSTOKEN"],
&amp;nbsp;
            },
&amp;nbsp;
            headers=headers,
&amp;nbsp;
        )&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2022 06:47:54 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/33673#M24622</guid>
      <dc:creator>arsamkull</dc:creator>
      <dc:date>2022-08-24T06:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: Usage of Azure DevOps System.AccessToken as PAT in Databricks</title>
      <link>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/33674#M24623</link>
      <description>&lt;P&gt;hi @Adrian Ehrsam​&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try using databricks rest api to clone the repos&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/databricks/dev-tools/api/latest/repos" target="test_blank"&gt;https://learn.microsoft.com/en-us/azure/databricks/dev-tools/api/latest/repos&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and enable file in repos to consume the data as shown in this notebook&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.databricks.com/_static/notebooks/files-in-repos.html" target="test_blank"&gt;https://docs.databricks.com/_static/notebooks/files-in-repos.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 03:20:18 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/33674#M24623</guid>
      <dc:creator>Soma</dc:creator>
      <dc:date>2022-11-01T03:20:18Z</dc:date>
    </item>
    <item>
      <title>Re: Usage of Azure DevOps System.AccessToken as PAT in Databricks</title>
      <link>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/33675#M24624</link>
      <description>&lt;P&gt;Well that's what I'm trying todo, but I do not get the authentication working in CI/CD because of the Length of the Access Token of Azure Devops' System.AccessToken. Must say it feels like a bug in Databricks &lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 04:38:52 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/33675#M24624</guid>
      <dc:creator>arsamkull</dc:creator>
      <dc:date>2022-11-01T04:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: Usage of Azure DevOps System.AccessToken as PAT in Databricks</title>
      <link>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/33676#M24625</link>
      <description>&lt;P&gt;I have the same issue, I want to automate Repos checkout during CI/CD via the rest api. Unfortunately, Azure DevOps doesn't allow Service Principals to pull from a repo and PAT validity is limited to one year max. So using the System.AccessToken would be a nice way to get around these limitations but unfortunately it's limited to 100 chars by Databricks...&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 13:13:37 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/33676#M24625</guid>
      <dc:creator>Fual</dc:creator>
      <dc:date>2022-11-17T13:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: Usage of Azure DevOps System.AccessToken as PAT in Databricks</title>
      <link>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/33677#M24626</link>
      <description>&lt;P&gt;hey everyone. We will be improving this in the coming week or two, bumping up the limit. Thank you for reporting.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 08:34:40 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/33677#M24626</guid>
      <dc:creator>DBReposDev</dc:creator>
      <dc:date>2023-01-09T08:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: Usage of Azure DevOps System.AccessToken as PAT in Databricks</title>
      <link>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/33678#M24627</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;@Adrian Ehrsam​&amp;nbsp;The PAT limit has been increased to 2048 now. Please check. &lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 08:07:40 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/33678#M24627</guid>
      <dc:creator>Srihasa_Akepati</dc:creator>
      <dc:date>2023-01-27T08:07:40Z</dc:date>
    </item>
    <item>
      <title>Re: Usage of Azure DevOps System.AccessToken as PAT in Databricks</title>
      <link>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/127576#M48015</link>
      <description>&lt;P&gt;Hey there, it's still not enough to use Entra ID tokens&amp;nbsp;&lt;A href="https://www.databricks.com/blog/integrating-entra-id-azure-devops-and-databricks-better-security-cicd" target="_blank"&gt;Integrating Entra ID, Azure DevOps and Databricks for Better Security in CI/CD | Databricks Blog...&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 13:49:34 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/usage-of-azure-devops-system-accesstoken-as-pat-in-databricks/m-p/127576#M48015</guid>
      <dc:creator>aivashyna-vrns</dc:creator>
      <dc:date>2025-08-06T13:49:34Z</dc:date>
    </item>
  </channel>
</rss>

