SSO to Databricks with Microsoft Entra ID

This article shows how to configure Microsoft Entra ID as the identity provider for single sign-on (SSO) in your Databricks account. Microsoft Entra ID supports both OpenID Connect (OIDC) and SAML 2.0. To sync users and groups from Microsoft Entra ID, see Sync users and groups from your identity provider.

Warning

To prevent getting locked out of Databricks during single sign-on testing, Databricks recommends keeping the account console open in a different browser window. You can also configure emergency access with security keys to prevent lockout. See Emergency access to prevent lockouts.

Enable Microsoft Entra ID SSO using OIDC

  1. As an account owner or account admin, log in to the account console and click the Settings icon in the sidebar.

  2. Click the Authentication tab.

  3. Next to Authentication, click Manage.

  4. Choose Single sign-on with my identity provider.

  5. Click Continue.

  6. Under Identity protocol, select OpenID Connect.

  7. On the Authentication tab, make note of the Databricks Redirect URL value.

  8. In another browser tab, create a Microsoft Entra ID application:

    1. Log in to the Azure portal as an administrator.

    2. In the Azure services pane, click Microsoft Entra ID, in the left pane, click App registrations.

    3. Click New registration.

    4. Enter a name.

    5. Under Supported account types choose: Accounts in this organizational directory only.

    6. Under Redirect URI, choose web and paste the Databricks Redirect URL value.

    7. Click Register.

  9. Gather the required information from the Microsoft Entra ID application:

    1. Under Essentials, copy the Application (client) ID.

    2. Click Endpoints.

    3. Copy the URL under OpenID Connect metadata document

    4. In the left pane, click Certificates & secrets.

    5. Click + New client secret.

    6. Enter a description and choose an expiration.

    7. Click Add.

    8. Copy the secret value.

  10. Return to the Databricks account console Authentication page and enter values you copied from the identity provider application to the Client ID, Client secret, and OpenID issuer URL fields. Remove the /.well-known/openid-configuration ending from the URL.

    You can specify query parameters by appending them to the issuer URL, for example {issuer-url}?appid=123.

  11. Optionally, enter the name of a claim in the Username claim if you want to use a claim other than email as users’ Databricks usernames. For more information, see Customize a claim to use for your account’s usernames.

    Single sign-on tab when all values have been entered
  12. Click Save.

  13. Click Test SSO to validate that your SSO configuration is working properly.

  14. Click Enable SSO to enable single sign-on for your account.

  15. Test account console login with SSO.

  16. Configure unified login

    Unified login allows you to use the account console SSO configuration in your Databricks workspaces. If your account was created after June 21, 2023, unified login is enabled on your account by default for all workspaces, new and existing, and it cannot be disabled. To configure unified login, see Enable unified login.

Enable Microsoft Entra ID SSO using SAML

Follow these steps to create a non-gallery Azure portal SAML application for use with Databricks account console.

  1. As an account owner or account admin, log in to the account console and click the Settings icon in the sidebar.

  2. Click the Authentication tab.

  3. Next to Authentication, click Manage.

  4. Choose Single sign-on with my identity provider.

  5. Click Continue.

  6. Under Identity protocol, select SAML 2.0.

  7. On the Authentication tab, make note of the Databricks Redirect URL value.

    Configure SAML SSO.
  8. In another browser tab, create a Microsoft Entra ID application:

    1. Log in to Azure portal as an administrator.

    2. In the Azure services pane, click Microsoft Entra ID, in the left pane, click Enterprise applications. The All applications pane opens and displays a random sample of the applications in your Microsoft Entra ID tenant.

    3. Click New application.

    4. Click Create your own application.

    5. Enter a name.

    6. Under What are you looking to do with your application? choose Integrate any other application you don’t find in the gallery.

  9. Configure the Microsoft Entra ID application:

    1. Click Properties.

    2. Set Assignment required to No. Databricks recommends this option, which allows all users to sign in to the Databricks account. Users must have access to this SAML application to log into your Databricks account using SSO.

    3. In the application’s properties pane, click Set up single sign on.

    4. Click SAML to configure the application for SAML authentication. The SAML properties pane appears.

    5. Next to Basic SAML configuration, click Edit.

    6. Set Entity ID to the Databricks SAML URL you got from the Databricks SSO configuration page.

    7. Set Reply URL to the Databricks SAML URL you got from the Databricks SSO configuration page.

    8. Next to SAML Signing Certificate, click Edit.

    9. In the Signing Option drop-down list, select Sign SAML response and assertion.

    10. In Attributes & Claims, click Edit.

    11. Set the Unique User Identifier (Name ID) field to user.mail.

    12. Under SAML Certificates, next to Certificate (Base64), click Download. The certificate is downloaded locally as a file with the .cer extension.

    13. Open the .cer file in a text editor and copy the file contents. The file is the entire x.509 certificate for the Microsoft Entra ID SAML application.

      Important

      • Do not open it using the macOS keychain, which is the default application for that file type in macOS.

      • The certificate is sensitive data. Use caution about where to download it. Delete it from local storage as soon as possible.

    14. In the Azure portal, under Set up Microsoft Entra ID SAML Toolkit, copy and save the Login URL and Microsoft Entra ID Identifier.

  10. Configure Databricks in the Databricks account console SSO page.

    1. Set Single Sign-On URL to the Microsoft Entra ID field that was called Login URL.

    2. Set Identity Provider Entity ID to the Microsoft Entra ID field that was called Microsoft Entra ID Identifier.

    3. Set x.509 Certificate to the Microsoft Entra ID x.509 certificate, including the markers for the beginning and end of the certificate.

    4. Click Save.

    5. Click Test SSO to validate that your SSO configuration is working properly.

    6. Click Enable SSO to enable single sign-on for your account.

    7. Test account console login with SSO.

  11. Configure unified login

    Unified login allows you to use the account console SSO configuration in your Databricks workspaces. If your account was created after June 21, 2023, unified login is enabled on your account by default for all workspaces, new and existing, and it cannot be disabled. To configure unified login, see Enable unified login.

Customize a claim to use for your account’s usernames

By default, usernames in Databricks are represented as a user’s email address. If you would like to assign usernames using a different value, you can configure a new claim in your Microsoft Entra account.

  1. In your Microsoft Entra account, open your application’s Overview page.

  2. Click Manage, then Manifest.

  3. Locate the acceptMappedClaims key and change the value to true.

  4. Click Save then return to the application’s Overview page.

  5. Click Manage then Authentication.

  6. Under Attributes & Claims, click Edit.

  7. Click Add new claim then enter a Name for the claim. This is the name you will enter in the Username claim field of your Databricks SSO configuration.

  8. Under Source attribute, select the desired Entra ID attribute for the claim.

  9. Click Save.