Databricks
Create an integration to manage access to Databricks resources
Apono enables you to automate and control access to Databricks by dynamically managing group memberships through just-in-time access flows. This ensures that data analysts, data scientists, and engineers receive only the temporary, task-based access they need to work with sensitive datasets.
With Apono’s Databricks integration, you can streamline access requests, approvals, and lifecycle management for Databricks groups:
Enable self-service access requests by controlling resource access through Databricks group memberships
Enforce zero standing privileges by automatically revoking expired access
Discover and manage permissions across Databricks groups
Prerequisites
Apono connector
On-prem connection serving as a bridge between a Databricks instance and Apono:
Learn how to update an existing AWS, Azure, GCP, or Kubernetes connector.
Databricks account management URL
Accounts Management URL Example: https://aacounts.cloud.databricks.com
Databricks account ID
Unique identifier for the Databricks account Follow these steps:
In your account management console, click your profile icon.
Copy the Account ID under your email.
Service principal
Account for the Apono integration with admin privileges Follow these steps:
In your account management console, click your workspace > Manage account. A new page opens.
From the side navigation, click User management. The User management page opens.
On the Service principals tab, click Add service principal. The Add service principal popup window appears.
Enter the New service principal display name.
Click Add service principal. The principal is created and added to the list of principals.
Click the name of the principal.
On the Roles tab, click the Account Admin toggle to ON.
Grant principal access:
On the Permissions tab, click Grant accesss. The Grant access to others pop-up window appears.
From the User, Group or Service Principal dropdown menu, select the principal.
From the Permission dropdown menu, select Service Principal: Manager.
Click Save.
Databricks credentials
Client ID and secret used to securely authenticate the service principal Follow these steps:
On the Credentials & secrets tab of the service principal, click Generate secret. The Generate OAuth secret popup window opens.
Enter the Lifetime (days) duration of the secret.
Click Generate. The Generate OAuth secret popup window is replaced by the Generate secret popup window.
Copy the Secret and Client ID.
Create your secret based on your secret and client ID key:
"client_id": "<DATABRICKS_CLIENT_ID>",
"client_secret": "<DATABRICKS_SECRET>"
Integrate Databricks

You can also use the steps below to integrate with Apono using Terraform.
In step 10, instead of clicking Confirm, follow the Are you integrating with Apono using Terraform? guidance.
Follow these steps to complete the integration:
On the Catalog tab, click Databricks. The Connect Integration page appears.
Under Discovery, click Next. The Apono connector section expands.
From the dropdown menu, select a connector. Choosing a connector links Apono to all the services available on the account where the connector is located.
Click Next. The Integration Config section expands.
Define the Integration Config settings.
SettingDescriptionIntegration Name
Unique, alphanumeric, user-friendly name used to identify this integration when constructing an access flow
Databricks Accounts URL
Accounts Management URL
Example: https://aacounts.cloud.databricks.com
Account Id
Unique identifier for the Databricks account
Click Next. The Secret Store section expands.
Click Next. The Get more with Apono section expands.
Define the Get more with Apono settings.
SettingDescriptionCustom Access Details
(Optional) Instructions explaining how to access this integration's resources Upon accessing an integration, a message with these instructions will be displayed to end users in the User Portal. The message may include up to 400 characters. To view the message as it appears to end users, click Preview.
Integration Owner
(Optional) Fallback approver if no resource owner is found Follow these steps to define one or several integration owners:
From the Attribute dropdown menu, select User or Group under the relevant identity provider (IdP) platform.
From the Value dropdown menu, select one or multiple users or groups.
NOTE: When Resource Owner is defined, an Integration Owner must be defined.
Resource Owner
(Optional) Group or role responsible for managing access approvals or rejections for the resource Follow these steps to define one or several resource owners:
Enter a Key name. This value is the name of the tag created in your cloud environment.
From the Attribute dropdown menu, select an attribute under the IdP platform to which the key name is associated. Apono will use the value associated with the key (tag) to identify the resource owner. When you update the membership of the group or role in your IdP platform, this change is also reflected in Apono.
NOTE: When this setting is defined, an Integration Owner must also be defined.
Click Confirm.
Now that you have completed this integration, you can create access flows that manage Databricks group memberships to control access to resources.
Last updated
Was this helpful?
