Skip to main content

Manage entitlements

This page describes how to manage entitlements for users, service principals, and groups.

Entitlements overview

An entitlement is a property that allows a user, service principal, or group to interact with Databricks in a specified way. Entitlements are assigned to users at the workspace level. Entitlements are available only in the Premium plan or above.

Access entitlements

Each access entitlement grants a user access to a specific set of features in the workspace:

The table below shows which capabilities are granted with each access entitlement:

Capability

Consumer access

Databricks SQL access

Workspace access

Read/run dashboards and Genie spaces

Query SQL warehouses using BI tools

Read/write Databricks SQL objects

Read/write Data Science & Engineering objects

Read/write Databricks Mosaic AI objects

To access a Databricks workspace, a user must have at least one access entitlement.

Consumer access vs account users

The previous table summarizes access entitlements in a workspace. The following table compares the capabilities available to workspace users with Consumer access to account users who do not have workspace membership.

Capability

Consumer access to a workspace

Account user without workspace membership

View dashboards using embedded credentials

View dashboards and Genie spaces using viewer credentials

View objects using row- and column-level security

Access to limited consumer workspace UI

Query SQL warehouses using BI tools

Compute entitlements

The Allow unrestricted cluster creation and Allow pool creation entitlements control the ability to provision compute resources in a workspace. Workspace admins receive these entitlements by default, and they cannot be removed. Non-admin users are not granted them unless explicitly assigned.

  • Allow unrestricted cluster creation grants users or service principals permission to create unrestricted clusters.

  • Allow pool creation enables instance pool creation. It can only be granted to groups.

    This entitlement appears in the admin settings UI only if a group already has it. You can remove it using the UI for any group except the admins group, where it cannot be removed. To assign it to a group, use the API. See Manage entitlements using the API.

Default entitlements

Some entitlements are granted automatically to specific users and groups:

  • Workspace admins are always granted the following entitlements, and they cannot be removed:

    • Workspace access
    • Allow unrestricted cluster creation
    • Allow pool creation

    Admins are also granted Databricks SQL access by default, but it can be removed. However, because admins retain entitlement management permissions, they can reassign it to themselves at any time.

  • Workspace users are granted Workspace access and Databricks SQL access by default through their membership in the users group. All workspace users and service principals are automatically added to this group.

    The default entitlements on the users group affect how you assign or restrict entitlements. To provide the Consumer access experience, you must remove the default entitlements from the users group (and the account users group, if applicable) and assign entitlements individually to specific users, service principals, or groups. See Clone a workspace group to a new account group.

Manage entitlements using the workspace admin settings page

Workspace admins can manage entitlements for users, service principals, and groups using the workspace admin settings page.

  1. As a workspace admin, log in to the Databricks workspace.
  2. Click your username in the top bar and select Settings.
  3. Click the Identity and access tab.
  4. Depending on what you want to manage, click Manage next to Users, Service principals, or Groups.
  5. Select the user, service principal, or group you want to update.
  6. For users and groups, click the Entitlements tab. For service principals, entitlement checkboxes are shown directly.
  7. To grant an entitlement, select the toggle next to the entitlement.

To remove an entitlement, deselect the toggle.

If an entitlement is inherited from a group, the toggle appears selected but is grayed out. To remove an inherited entitlement, either:

  • Remove the user or service principal from the group that has the entitlement, or
  • Remove the entitlement from the group itself.

Removing a group entitlement affects all members of that group unless they are granted the entitlement individually or through another group.

Manage entitlements using the API

You can manage entitlements for users, service principals, and groups using the following APIs:

The table below lists each entitlement and its corresponding API name:

Entitlement name

Entitlement API name

Workspace access

workspace-access

Databricks SQL access

databricks-sql-access

Allow unrestricted cluster creation

allow-cluster-create

Allow pool creation

allow-instance-pool-create

For example, to assign the allow-instance-pool-create entitlement to a group using the API:

Bash
curl --netrc -X PATCH \
https://<databricks-instance>/api/2.0/preview/scim/v2/Groups/<group-id> \
--header 'Content-type: application/scim+json' \
--data @update-group.json \
| jq .

update-group.json:

JSON
{
"schemas": ["urn:ietf:params:scim:api:messages:2.0:PatchOp"],
"Operations": [
{
"op": "add",
"path": "entitlements",
"value": [
{
"value": "allow-instance-pool-create"
}
]
}
]
}