Remediation
From Azure Portalβ
Enable provisioning in Azure Portal:
-
Go to
Microsoft Entra ID
. -
Under
Manage
, clickEnterprise applications
. -
Click the name of the Azure Databricks SCIM application.
-
Under
Provisioning
, selectAutomatic
and enter the SCIM endpoint and API token from Databricks.Enable provisioning in Databricks:
-
Navigate to
Admin Console > Identity and Access Management
. -
Enable SCIM provisioning and generate an API token.
Configure role assignments:
-
Ensure groups from Entra ID are mapped to appropriate Databricks roles.
-
Restrict administrative privileges to designated security groups.
Regularly monitor sync logs:
-
Periodically review sync logs in Microsoft Entra ID and Databricks Admin Console.
-
Configure Azure Monitor alerts for provisioning failures.
Disable manual user creation in Databricks:
-
Ensure that all user management is controlled via SCIM sync from Entra ID.
-
Disable personal access token usage for authentication.
From Azure CLIβ
Enable SCIM User and Group Provisioning in Azure Databricks:
az ad app update --id <databricks-app-id> --set provisioning.provisioningMode=Automatic