Skip to main content

Access and authentication

Partner integrations require secure connectivity and proper authentication to access Databricks resources. This page covers the networking architecture, OAuth authentication methods, and best practices for production implementations.

Networking

Across all Cloud Service Providers (CSPs), the Databricks platform is architected with a control plane and a compute plane. This section explains how Databricks organizes control planes, compute planes, and workspaces so you can design secure connectivity and authentication flows from your application.

There are two compute planes:

  1. Serverless compute plane and storage - hosted by Databricks as a fully managed service within Databricks' AWS/Azure/GCP account
  2. Classic compute plane and storage - deployed within a customer's AWS/Azure/GCP account but managed by Databricks' control plane.

Databricks Architecture

The control plane is deployed to Databricks' front-end VPC. And the control plane's web app supports two core Databricks services:

  1. Databricks account console - account-level administrative UI where account admins configure and manage resources, SSO, OAuth, identities, audit logging, and policies across the entire Databricks account. There is a unique account console URL for each cloud:

  2. Databricks workspace consoles - a workspace is a container for resources, including compute endpoints (e.g., clusters, warehouses, lakebase instances), notebooks, jobs, pipelines, repos, and secrets.

    Multiple workspaces can be instantiated from the account console, and each workspace has a unique, per-tenant (per-workspace) URL that can be customer-defined.

    The workspace URL is commonly (but not always) formatted as follows:

    • AWS: https://<instance-name>.cloud.databricks.com
    • Azure: https://adb-<workspace-id>.<random-number>.azuredatabricks.net
    • GCP: https://<workspace-id>.<number>.gcp.databricks.com

    SCIM API access: Workspace admins can manage identities at both the workspace and account levels, calling SCIM endpoints through the {workspace-domain}. Using the SCIM API, workspace admins can list, create, update, and manage users, service principals, and groups, including promoting account-level identities into a workspace. For additional details, refer to the Databricks documentation on managing users using the API, managing service principals in the account using the API, and API examples for managing groups.

    Workspace users and service principals with only User privileges have read-only SCIM access. They can list and retrieve users, service principals, and groups at both the workspace and account level when calling SCIM endpoints through the {workspace-domain}.

Full details around Databricks network architecture can be found in Databricks public documentation.

Documentation: AWS | Azure | GCP

Authentication and authorization to Databricks

Thorough guidance around authentication and authorization to Databricks APIs, connectors, drivers, and SDKs can be found in Databricks public documentation for AWS, Azure, and GCP. In addition, please refer to the integration requirements, which outline how Databricks terminology maps to common industry terms.

Authentication best practices

A well-architected integration leverages Account-wide token federation for a User Interactive Flow to provide seamless SSO, and Workload identity federation for a Client Credentials Flow to provide secretless machine identities for authorization when interacting with Databricks. In addition, it's important to take into consideration how Databricks supports token federation and workload identity federation:

Account-wide token federation

  • Databricks inherits the access token TTL from the IdP.
  • Databricks does not issue a refresh token, and you must refresh the token at the IdP before expiry.

Workload identity federation

  • Databricks inherits the "exp" claim from the IdP token.
  • The token TTL defaults to 1 hour but is configurable between 1 and 24 hours, should the IdP support it.

For a deeper explanation, consult the Databricks documentation on Authenticate access to Databricks using OAuth token federation.

Other supported authentication methods

The following authentication methods are supported for scenarios where token federation or workload identity federation isn't feasible. Each has specific tradeoffs to consider.

Databricks also supports using:

  • Account-wide Token Federation for a Client Credentials flow
  • Databricks built-in OIDC endpoint for a User Interactive flow and a Client Credentials flow
  • Personal Access Token when used as an additional option to OAuth

Account-wide Token Federation for a Client Credentials flow

Both Account-wide Token Federation and Workload Identity Federation are supported for a Client Credential flow, but Workload Identity Federation is recommended because it enables per-workload isolation with a 1:1 mapping between each external workload identity and a Databricks Service Principal. This 1:1 mapping typically provides tighter security boundaries, simpler rotation, and more precise access control compared to the global nature of account-wide federation.

Databricks built-in OIDC endpoint

Databricks provides a built-in OIDC-compliant authorization service when federation isn't feasible. Databricks' authorization service can be used to obtain short-lived access tokens for both users and service principals in a consistent way across all supported clouds. Additionally, long-lived refresh tokens can be obtained for U2M-based flows.

For a deeper explanation and implementation guidance, consult the following Databricks documentation:

For step-by-step partner implementation guides, see:

Token time-to-live details

For secret, access token, and refresh token time-to-live details, consult the following Databricks documentation:

Authentication method comparison

MethodStatusUse CaseConsiderationsDocumentation
Workload Identity FederationRecommendedM2M / Service PrincipalPer-workload isolation, 1:1 SP mapping, tightest securityOAuth Token Federation
Account-wide Token Federation (U2M)RecommendedUser interactiveSeamless SSO, IdP manages token refreshOAuth Token Federation
Account-wide Token Federation (M2M)SupportedM2M / Service PrincipalBroad account-level trust, less isolation than WIFOAuth Token Federation
Databricks OIDC (U2M)SupportedUser interactiveWhen federation not feasible, short-lived tokens with refreshOAuth U2M
Databricks OIDC (M2M)SupportedM2M / Service PrincipalWhen federation not feasible, consistent across cloudsOAuth M2M
Personal Access TokensLimitedAdditional option onlyLong-lived, harder to govern, not sufficient alone for validationPATs

What's next