Skip to main content

Manage users, service principals, and groups

Databricks provides centralized identity management for users, groups, and service principals across your account and workspaces. Identity management in Databricks enables you to control who can access your workspaces, data, and compute resources, with flexible options for syncing identities from your identity provider.

For an opinionated perspective on how to best configure identity in Databricks, see Identity best practices.

To manage access for users, service principals, and groups, see Authentication and access control.

Databricks identities

Databricks supports three types of identities for authentication and access control:

Identity type

Description

Users

User identities recognized by Databricks and represented by email addresses.

Service principals

Identities for use with jobs, automated tools, and systems such as scripts, apps, and CI/CD platforms.

Groups

A collection of identities used by admins to manage group access to workspaces, data, and other securable objects. All Databricks identities can be assigned as members of groups.

A Databricks account can have a maximum of 10,000 combined users and service principals, along with up to 5,000 groups. Each workspace also can have a maximum of 10,000 combined users and service principals as members, along with up to 5,000 groups.

Who can manage identities in Databricks?

To manage identities in Databricks, you must have one of the following roles:

Role

Capabilities

Account admins

  • Add, update, and delete users, service principals, and groups in the account.
  • Assign admin roles and grant users access to workspaces.
  • Automatically have group manager role on all groups and service principal manager role on all service principals in the account.

Workspace admins

  • Add users, service principals, and groups to the Databricks account.
  • Cannot update or delete users or service principals in the account.
  • Grant users, service principals, and groups access to their workspaces.
  • Manage legacy workspace-local groups.
  • Automatically have group manager role on groups they create and service principal manager role on service principals they create.

Group managers

  • Manage group membership and delete groups.
  • Assign the group manager role to other users.

Service principal managers

  • Add, update, and remove roles on service principals.

Identity management workflows

note

Most workspaces are enabled for identity federation by default. Identity federation allows you to manage identities centrally at the account level and assign them to workspaces. This page assumes your workspace has identity federation enabled. If you have a legacy workspace without identity federation, see Legacy workspaces without identity federation.

Identity federation

Databricks began to enable new workspaces for identity federation and Unity Catalog automatically on November 8, 2023. Workspaces enabled for identity federation by default cannot disabled it. For more information, see Automatic enablement of Unity Catalog.

In an identity federated workspace, when you add a user, service principal, or group in workspace admin settings, you can select from identities that exist in your account. In a non-identity federated workspace, you do not have the option to add users, service principals, or groups from your account.

Add user identity federation

To check if your workspace has identity federation enabled, look for Identity federation: Enabled on the workspace page in the account console. To enable identity federation for an older workspace, an account admin must enable the workspace for Unity Catalog by assigning a Unity Catalog metastore. See Enable a workspace for Unity Catalog.

Sync identities from your identity provider

Databricks recommends using SCIM provisioning to sync all users and groups automatically from your identity provider to your Databricks account. Users in a Databricks account do not have any default access to a workspace, data, or compute resources. Account admins and workspace admins can assign account users to workspaces. Workspace admins can also add a new user directly to a workspace, which both automatically adds the user to the account and assigns them to that workspace. For detailed instructions, see Sync users and groups from your identity provider using SCIM.

Assign identities to workspaces

To enable a user, service principal, or group to work in a Databricks workspace, an account admin or workspace admin assigns them to the workspace. You can assign workspace access to any user, service principal, or group that exists in the account.

Workspace admins can also add a new user, service principal, or group directly to a workspace. This action automatically adds the identity to the account and assigns it to that workspace.

Account-level identity diagram

For detailed instructions, see:

Share dashboards with account users

Users can share published dashboards with other users in the Databricks account, even if those users are not members of their workspace. Users in the Databricks account who are not members of any workspace are the equivalent of view-only users in other tools. They can view objects that have been shared with them, but they cannot modify objects. For more information, see User and group management.

Authentication

Single sign-on (SSO)

Single sign-on (SSO) enables you to authenticate your users using a third-party identity provider like Okta. To enable SSO, see Configure SSO in Databricks.

Just-in-time provisioning

When SSO is configured, you can configure just-in-time (JIT) provisioning to automatically create new user accounts from your identity provider upon their first login. See Automatically provision users (JIT).

Access control

Admins can assign roles, entitlements, and permissions to users, service principals, and groups to control access to workspaces, data, and other securable objects. For more information, see Access control overview.

Legacy workspaces without identity federation

For workspaces that aren't enabled for identity federation, workspace admins manage workspace users, service principals, and groups entirely within the scope of the workspace. Users and service principals added to non-identity federated workspaces are automatically added to the account. If the workspace user shares a username (that is, an email address) with an account user or admin that already exists, those users are merged into a single identity. Groups added to non-identity federated workspaces are legacy workspace-local groups that are not added to the account.

To enable identity federation for a legacy workspace, see Identity federation.

Additional resources