Tuesday, June 10, 2025
HomeBig DataIntroducing next-level identification safety at Databricks

Introducing next-level identification safety at Databricks

The way forward for identification safety is passwordless, context-aware, and frictionless—and we’re persevering with to construct towards that future at Databricks. We’ve launched new capabilities throughout the Databricks Knowledge Intelligence Platform to assist prospects strengthen authentication, automate identification provisioning, and allow safe programmatic entry, making it simpler to implement trendy, scalable identification and entry controls.

As a reminder, Databricks-managed passwords reached end-of-life on July 10, 2024, and are now not supported within the UI or through API authentication. To additional help a passwordless future, we’re additionally saying the Normal Availability of Databricks-managed Multi-Issue Authentication (MFA).

As extra prospects depend on Databricks to democratize knowledge and AI entry, securing programmatic entry is extra necessary than ever. To scale back long-term API token danger, we’ve launched a number of new controls:

  • Automated revocation of Private Entry Tokens (PATs) which might be inactive for 90 days
  • A most lifetime of two years for newly created PATs, so credentials now not persist indefinitely by default
  • Normal Availability of the Entry Tokens Report, giving admins deeper visibility into token utilization and danger

These updates align with the course of evolving trade requirements, together with NIST, PCI DSS, and ISO, that are shifting away from password complexity towards smarter, extra adaptive identification frameworks.

Right here’s a deeper dive into what’s new and the way to take advantage of it.

Simplify your SSO administration with unified login on AWS

We’re transferring all prospects to unified loginthe place SSO doesn’t should be configured on particular person workspaces. Unified login immediately brings single sign-on (SSO) to all Databricks workspaces in your account.

Unified login enables you to handle one account-level SSO configuration. Meaning much less overhead for admins, constant entry insurance policies for customers, and a stronger general safety posture. Mixed with SSO emergency entry utilizing MFAunified login additionally offers a safe fallback for directors, making certain centralized management with out sacrificing flexibility.

Unified login is already utilized in hundreds of manufacturing workspaces, and prospects ought to plan their migration to it now. As of December 2024, all new account-level SSO setups are routinely opted into unified login by default. This streamlines rollout and makes it easy for brand spanking new customers to start out utilizing options like AI/BI dashboard sharing, Genie Areas, and Apps with no further configuration wanted. We advocate you progress all workspaces to Unified Login ASAP.

Unified Login gif

Finest practices for enabling unified login

To make use of a single account-level SSO setup in your account, guarantee your identification supplier’s (IdP) configuration permits all of your workspace customers to authenticate to the Databricks account. When full, you may confidently decide in any outdated workspaces to reuse account-level SSO with unified login. Lastly, take away outdated workspace-specific IdP tiles to keep away from confusion.

Be safe by default with Databricks-managed multi-factor authentication (MFA)

SSO stays the perfect apply for centralized identification administration. Enabling MFA on the Id Supplier (IdP) aligns together with your firm’s safety insurance policies and ensures a constant, policy-compliant strategy throughout your complete consumer base.

We’re excited to introduce Databricks-managed MFAnow Typically Obtainable for all AWS accounts that haven’t but configured single sign-on (SSO). This new function permits admins to implement multi-factor authentication (MFA) for all customers, enhancing safety throughout your group. With help for common authenticator apps and passkeysestablishing MFA is fast and simple. Admins can allow it via the Account Console.

Databricks managed MFA UI

Rapidly provision new customers on Azure Databricks with Automated Id Administration

Automated Id Administrationnow in Public Preview for Microsoft Entra ID, permits safe, real-time entry administration by natively integrating with customers, teams, and repair principals in Entra ID,  no connector apps or handbook sync required. Better of all, it additionally respects nested teams and teams containing service principals, making certain constant entry management throughout advanced identification hierarchies.

Considered one of our key use instances is simplifying the sharing of AI/BI Dashboards or Databricks Appsthe place practitioners can share with any consumer within the group, no matter whether or not they’re in a workspace. This permits dashboard house owners to share AI/BI dashboards or apps with any Entra ID identification—even these not but in Databricks—for seamless, safe collaboration. New customers are routinely provisioned solely when shared content material is accessed, and so they inherit solely the precise permissions granted, making certain they see and use solely what they’re entitled to. It saves time for admins and makes it simpler for organizations to increase knowledge insights throughout their groups. See our launch weblog for the small print.

Automatic identity management

Monitor and handle private entry tokens with new admin instruments

Take management of private entry tokens (PATs) with new token monitoring instruments, now in Public Preview throughout AWS, Azureand GCP. Whereas we advocate utilizing OAuth entry tokens as a substitute of PATs for improved safety, these monitoring instruments assist scale back danger and enhance entry hygiene by giving admins full visibility into energetic PATs, implementing time-to-live (TTL) limits, and enabling fast revocation of compromised or unused tokens.

Admins can now entry this data via a brand new Token Report tab within the Databricks Admin Console. From there, account admins can discover energetic tokens belonging to particular customers or workspaces. You should utilize it to seek out older tokens that have been set to by no means expire or these which might be nonetheless energetic however haven’t been actively utilized in a month. We particularly advocate searching for private entry tokens belonging to workspace admins and revoking them in the event that they aren’t wanted.

new token report tab UI

Safe programmatic entry with OAuth Token Federation

To assist prospects safe API-based entry, we’re excited to announce added help for OAuth token federation, which is able to quickly be typically out there throughout AWS, Azureand GCP. Token federation permits purposes to authenticate to Databricks utilizing tokens out of your trusted IdP, eliminating the necessity to retailer Databricks secrets and techniques like static tokens or passwords.

You may configure token federation at two ranges:

  1. Account-wide: Permits token federation for all customers and repair principals in your account. For security-conscious organizations that wish to implement constant controls throughout all workloads
  2. Particular person service principal degree (also referred to as workload identification federation): For implementing fine-grained management over particular purposes

OAuth Token Federation is particularly highly effective for patrons managing numerous service principals. For instance, in the event you’re utilizing 100+ service principals for GitHub Actions, you may migrate them to token federation and get rid of the necessity to retailer and rotate over 100 long-lived Databricks-managed secrets and techniques.

Account admins can configure an account-level federation coverage utilizing the Databricks CLI model 0.239.0 and above, or the Databricks account-wide and service principal token federation REST APIs.

How we strengthen authentication at Databricks

Along with new product capabilities, we lead by instance in our company setting as nicely. At Databricks, along with our centralized single sign-on, we’ve carried out:

  • {Hardware}-based multi-factor authentication through FIDO2 units
  • Context-aware authentication that includes gadget belief, geolocation and behavioral patterns
  • Automated response to a breached password detection from our risk intelligence sources
  • Transferring from quarterly to annual compelled password adjustments to encourage higher passwords
  • Least privilege dataset-level authorization so {that a} consumer who wants entry to a non-standard desk may be approved for simply that desk as a substitute of a complete different function.

In mixture, this offers our staff with easy entry to assets whereas sustaining a powerful safety posture.

Your identification safety modernization journey on Databricks begins right here

Whether or not you’re simply getting began with MFA or able to undertake full automation, Databricks has the instruments and integrations to help you each step of the way in which.

To scale back your safety danger and take full benefit of those capabilities, we advocate the next greatest practices:

  • Allow SSO on the account degree
  • Require MFA for all customers
  • Use OAuth federation for API entry
  • Monitor authentication logs for uncommon exercise

If you happen to’re able to dive in shortly, our identification greatest apply guides on AWS, Azure and GCP are an excellent place to start out.

Be part of the Id and Entry Administration product and engineering staff on the Knowledge + AI Summit, June 9–12 on the Moscone Middle in San Francisco! Get a primary take a look at the newest improvements in knowledge and AI governance and take a look at our identification and entry administration periods:

Register now to safe your spot!

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments