Description
To ensure centralized identity and access management, users and groups from Microsoft Entra ID should be synchronized with Azure Databricks. This is achieved through SCIM provisioning, which automates the creation, update, and deactivation of users and groups in Databricks based on Entra ID assignments. Enabling this integration ensures that access controls in Databricks remain consistent with corporate identity governance policies, reducing the risk of orphaned accounts, stale permissions, and unauthorized access.
Rationaleβ
Syncing users and groups from Microsoft Entra ID centralizes access control, enforces the least privilege principle by automatically revoking unnecessary access, reduces administrative overhead by eliminating manual user management, and ensures auditability and compliance with industry regulations.
Impactβ
SCIM provisioning requires role mapping to avoid misconfigured user privileges.
Auditβ
From Azure Portalβ
Verify SCIM provisioning is enabled:
-
Go to
Microsoft Entra ID
. -
Under
Manage
, clickEnterprise applications
. -
Click the name of the Azure Databricks SCIM application.
-
Under
Provisioning
, confirm that SCIM provisioning is enabled and running.Check user sync status in Azure Portal:
-
Under
Provisioning Logs
, verify the last successful sync and any failed entries.Check user sync status in Databricks:
-
Go to
Admin Console > Identity and Access Management
. -
Confirm that Users and Groups match those assigned in Microsoft Entra ID.
Ensure role-based access control (RBAC) mapping is correct:
-
Verify that users are assigned appropriate Databricks roles (e.g. Admin, User, Contributor).
-
Confirm that groups are mapped to workspace access roles.
Default Valueβ
By default, Azure Databricks does not sync users and groups from Microsoft Entra ID.