Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Applies to: (tick) Kyvos Enterprise  (error) Kyvos Cloud (SaaS on AWS) (error) Kyvos AWS Marketplace

(error) Kyvos Azure Marketplace   (error) Kyvos GCP Marketplace (error) Kyvos Single Node Installation (Kyvos SNI)


To use Azure Active Directory (AAD) Token authentication for Managed Identity in Databricks, you need to assign a Managed Identity to a workspace using the account console.

Account admins or Workspace admins can add Managed Identity to Azure Databricks account using the Databricks Workspace Account console.

Note

Ensure that the Azure Databricks Workspace is a Premium Databricks Workspace with Unity Catalog enabled

To add a Managed Identity to a workspace using the workspace admin console, do the following:

  1. As a workspace admin, log in to the Azure Databricks workspace.

  2. Use the sidebar persona-switcher to select Data Science & Engineering.

  3. Click Settings and select Admin Console.

  4. On the Service principals tab, click Add service principal.

  5. To add a new Managed Identity, click the drop-down arrow in the search box and then click + Add new service principal. Paste the Application (client) ID for the Managed Identity and enter a display name.

Assign cluster-level permissions to Managed Identity


Cluster access control must be enabled, and you must have Can Manage permission for the cluster.

  1. Click Compute in the sidebar.

  2. Click the name of the cluster you want to modify.

  3. Click Permissions at the top of the page. In the Permission settings for dialog, you can select Managed Identity (created in Step 5 above) from the Add Users and Groups drop-down and assign the Can Manage permission.

  4. Click Done.

  • No labels