SSO to Databricks with OneLogin
This article shows how to configure OneLogin as the identity provider for single sign-on (SSO) in your Databricks account. OneLogin supports both OpenID Connect (OIDC) and SAML 2.0. To sync users and groups from OneLogin, see Sync users and groups from your identity provider.
Warning
To prevent getting locked out of Databricks during single sign-on testing, Databricks recommends keeping the account console open in a different browser window. You can also configure emergency access with security keys to prevent lockout. See Emergency access to prevent lockouts.
Enable OneLogin SSO using OIDC
As an account owner or account admin, log in to the account console and click the Settings icon in the sidebar.
Click the Authentication tab.
Next to Authentication, click Manage.
Choose Single sign-on with my identity provider.
Click Continue.
Under Identity protocol, select OpenID Connect.
On the Authentication tab, make note of the Databricks Redirect URL value.
In a new browser tab, log in to OneLogin.
Click Administration.
Click Applications.
Click Add App.
Search for
OpenId Connect
and select the OpenId Connect (OIDC) app.Enter a name and click Save.
In the Configuration tab, Databricks Redirect URL from step 4. You can choose to configure the other settings or you can leave them to their default values.
In the SSO tab, copy the copy the client ID, client secret, and issuer URL values.
Client ID is the unique identifier for the Databricks application you created in OneLogin.
Client secret is a secret or password generated for the Databricks application that you created. It is used to authorize Databricks with your identity provider.
Issuer URL is the URL where you can find OneLogin’s OpenID Configuration Document. That OpenID Configuration Document must found be in
{issuer-url}/.well-known/openid-configuration
.Remove the
/.well-known/openid-configuration
ending from the URL. You can specify query parameters by appending them to the issuer URL, for example{issuer-url}?appid=123
.
Return to the Databricks account console Authentication tab and enter values you copied from the identity provider application to the Client ID, Client secret, and OpenID issuer URL fields.
Optionally, enter a Username claim if you want to use a claim other than
email
as users’ Databricks usernames. See your identity provider’s documentation for specific information on claim values.Click Save.
Click Test SSO to validate that your SSO configuration is working properly.
Click Enable SSO to enable single sign-on for your account.
Test account console login with SSO.
Configure unified login
Unified login allows you to use the account console SSO configuration in your Databricks workspaces. If your account was created after June 21, 2023, unified login is enabled on your account by default for all workspaces, new and existing, and it cannot be disabled. To configure unified login, see Enable unified login.
Enable OneLogin SSO using SAML
Follow these steps to create a OneLogin SAML application for use with Databricks account console.
As an account owner or account admin, log in to the account console and click the Settings icon in the sidebar.
Click the Authentication tab.
Next to Authentication, click Manage.
Choose Single sign-on with my identity provider.
Click Continue.
Under Identity protocol, select SAML 2.0.
On the Authentication tab, make note of the Databricks Redirect URL value.
In a new browser tab, log in to OneLogin.
Click Administration.
Click Applications.
Click Add App.
Search for SAML Custom Connector (Advanced) and click the result by OneLogin, Inc.
Set Display Name to Databricks.
Click Save. The application’s Info tab loads.
Click Configuration.
In Gather required information, set each of the following fields to the Databricks SAML URL:
Audience
Recipient
ACS (Consumer) URL Validator
ACS (Consumer) URL
Single Logout URL
Login URL
Set SAML signature element to Both.
Click Parameters.
Set Credentials are to Configured by admins and shared by all users.
Click Email. Set the value to email and enable Include in SAML Assertion.
Click the SSO tab.
Copy the following values:
x.509 certificate
Issuer URL
SAML 2.0 endpoint (HTTP)
Verify that SAML signature element is set to Response or Both.
Verify that Encrypt assertion is disabled.
Configure Databricks in the Databricks account console SSO page.
Set the SSO type drop-down to SAML 2.0.
Set Single Sign-On URL to the OneLogin SAML 2.0 endpoint.
Set Identity Provider Entity ID to the OneLogin Issuer URL.
Set x.509 Certificate to the OneLogin x.509 certificate, including the markers for the beginning and ending of the certificate.
Click Save.
Click Test SSO to validate that your SSO configuration is working properly.
Click Enable SSO to enable single sign-on for your account.
Test account console login with SSO.
Configure unified login
Unified login allows you to use the account console SSO configuration in your Databricks workspaces. If your account was created after June 21, 2023, unified login is enabled on your account by default for all workspaces, new and existing, and it cannot be disabled. To configure unified login, see Enable unified login.