Configure Managed Identity in Azure Databricks
Applies to: Kyvos Enterprise Kyvos Cloud (SaaS on AWS) Kyvos AWS Marketplace
Kyvos Azure Marketplace  Kyvos GCP Marketplace Kyvos Single Node Installation (Kyvos SNI)
To use Azure Active Directory (AAD) Token authentication for Managed Identity in Databricks, you need to assign a Managed Identity to a workspace using the account console.
Account admins or Workspace admins can add Managed Identity to Azure Databricks account using the Databricks Workspace Account console.
Note
Ensure that the Azure Databricks Workspace is a Premium Databricks Workspace with Unity Catalog enabled
To add a Managed Identity to a workspace using the workspace admin console, do the following:
As a workspace admin, log in to the Azure Databricks workspace.
Use the sidebar persona-switcher to select Data Science & Engineering.
Click Settings and select Admin Console.
On the Service principals tab, click Add service principal.
To add a new Managed Identity, click the drop-down arrow in the search box and then click + Add new service principal. Paste the Application (client) ID for the Managed Identity and enter a display name.
Assign cluster-level permissions to Managed Identity
Cluster access control must be enabled, and you must have Can Manage permission for the cluster.
Click Compute in the sidebar.
Click the name of the cluster you want to modify.
Click Permissions at the top of the page. In the Permission settings for dialog, you can select Managed Identity (created in Step 5 above) from the Add Users and Groups drop-down and assign the Can Manage permission.
Click Done.
Copyright Kyvos, Inc. All rights reserved.