Share via


Manage users, service principals, and groups

Databricks provides centralized identity management for users, groups, and service principals across your account and workspaces. Identity management in Azure Databricks enables you to control who can access your workspaces, data, and compute resources, with flexible options for syncing identities from your identity provider.

For an opinionated perspective on how to best configure identity in Azure Databricks, see Identity best practices.

To manage access for users, service principals, and groups, see Authentication and access control.

Azure Databricks identities

Databricks supports three types of identities for authentication and access control:

Identity type Description
Users User identities recognized by Azure Databricks and represented by email addresses.
Service principals Identities for use with jobs, automated tools, and systems such as scripts, apps, and CI/CD platforms.
Groups A collection of identities used by admins to manage group access to workspaces, data, and other securable objects. All Databricks identities can be assigned as members of groups.

A Azure Databricks account can have a maximum of 10,000 combined users and service principals, along with up to 5,000 groups. Each workspace also can have a maximum of 10,000 combined users and service principals as members, along with up to 5,000 groups.

Who can manage identities in Azure Databricks?

To manage identities in Azure Databricks, you must have one of the following roles:

Role Capabilities
Account admins
  • Add, update, and delete users, service principals, and groups in the account.
  • Assign admin roles and grant users access to workspaces.
  • Automatically have group manager role on all groups and service principal manager role on all service principals in the account.
Workspace admins
  • Add users, service principals, and groups to the Azure Databricks account.
  • Cannot update or delete users or service principals in the account.
  • Grant users, service principals, and groups access to their workspaces.
  • Manage legacy workspace-local groups.
  • Automatically have group manager role on groups they create and service principal manager role on service principals they create.
Group managers
  • Manage group membership and delete groups.
  • Assign the group manager role to other users.
Service principal managers
  • Add, update, and remove roles on service principals.

To establish your first account admin, see Establish your first account admin.

Identity management workflows

Note

Most workspaces are enabled for identity federation by default. Identity federation allows you to manage identities centrally at the account level and assign them to workspaces. This page assumes your workspace has identity federation enabled. If you have a legacy workspace without identity federation, see Legacy workspaces without identity federation.

Identity federation

Databricks began to enable new workspaces for identity federation and Unity Catalog automatically on November 9, 2023. Workspaces enabled for identity federation by default cannot disabled it. For more information, see Automatic enablement of Unity Catalog.

In an identity federated workspace, when you add a user, service principal, or group in workspace admin settings, you can select from identities that exist in your account. In a non-identity federated workspace, you do not have the option to add users, service principals, or groups from your account.

Add user identity federation

To check if your workspace has identity federation enabled, look for Identity federation: Enabled on the workspace page in the account console. To enable identity federation for an older workspace, an account admin must enable the workspace for Unity Catalog by assigning a Unity Catalog metastore. See Enable a workspace for Unity Catalog.

Sync identities from your identity provider

Databricks recommends syncing identities from Microsoft Entra ID to Azure Databricks using automatic identity management. Automatic identity management is enabled by default for accounts created after August 1, 2025.

Using automatic identity management, you can directly search for Microsoft Entra ID users, service principals, and groups in workspace admin settings and add them to your workspace and to the Azure Databricks account. Databricks uses Microsoft Entra ID as the source of record, so any changes to users or group memberships are respected in Azure Databricks. For detailed instructions, see Sync users and groups automatically from Microsoft Entra ID.

Assign identities to workspaces

To enable a user, service principal, or group to work in an Azure Databricks workspace, an account admin or workspace admin assigns them to the workspace. You can assign workspace access to any user, service principal, or group that exists in the account.

Workspace admins can also add a new user, service principal, or group directly to a workspace. This action automatically adds the identity to the account and assigns it to that workspace.

Account-level identity diagram

For detailed instructions, see:

Share dashboards with account users

Users can share published dashboards with other users in the Azure Databricks account, even if those users are not members of their workspace. Using automatic identity management, users can share dashboards with any user in Microsoft Entra ID, which adds the user to the Azure Databricks account upon login. Users in the Azure Databricks account who are not members of any workspace are the equivalent of view-only users in other tools. They can view objects that have been shared with them, but they cannot modify objects. Users in a Azure Databricks account do not have any default access to a workspace, data, or compute resources. For more information, see User and group management.

Authentication

Single sign-on (SSO)

Single sign-on (SSO) in the form of Microsoft Entra ID-backed login is available in Azure Databricks for all customers by default for both the account console and workspaces. See Single sign-on using Microsoft Entra ID.

Just-in-time provisioning

You can configure just-in-time (JIT) provisioning to automatically create new user accounts from Microsoft Entra ID upon their first login. See Automatically provision users (JIT).

Access control

Admins can assign roles, entitlements, and permissions to users, service principals, and groups to control access to workspaces, data, and other securable objects. For more information, see Access control overview.

Legacy workspaces without identity federation

For workspaces that aren't enabled for identity federation, workspace admins manage workspace users, service principals, and groups entirely within the scope of the workspace. Users and service principals added to non-identity federated workspaces are automatically added to the account. If the workspace user shares a username (that is, an email address) with an account user or admin that already exists, those users are merged into a single identity. Groups added to non-identity federated workspaces are legacy workspace-local groups that are not added to the account.

To enable identity federation for a legacy workspace, see Identity federation.

Additional resources