Databricks: Managing Access to Groups
Last updated
Last updated
In this tutorial, you'll learn how to configure to automate access requests to a Databricks Group by attaching Group Members. This use case models Role-Based Access Control (RBAC) for Databricks.
We will be using the Databricks Starter Kit as a base and replace configuration stubs for our use case.
Make sure you have:
A Databricks account
Make sure you setup:
A Databricks Starter Kit by following Get a Starter Kit
A Connection to a repo by following Connect a Repo
Grant Kits rely on your GitHub account and repository name to output access changes, which we'll set through Terraform local variables. Update the locals
block in main.tf
with your account_name
and repo_name
Workflow defines who should approve an access request.
Let's update the reviewers
block by adding yourself as the reviewer by switching replace-me@example.com
with the email address you use to sign into Abbey.
Now you'll need to link Databricks with Abbey.
You'll need to log into your Databricks account to get your database, role, user(s), table schema, and table name.
First, add your Databricks-related secrets to your repo:
DATABRICKS_HOST
DATABRICKS_TOKEN
You can find this information in your Databricks account.
To deploy your Starter Kit, follow instructions from Deploy Your Grant Kit.
🎉 Congratulations! Abbey is now managing permissions to your Databricks Group for you. 🎉
You can now start requesting and approving access by following the Request Access and Approve or Deny Access Requests guides.
Abbey strives to help you automate and secure access management without being intrusive.
To that end, this Pull Request contains native Terraform HCL code using normal open source Terraform Provider libraries. It represents the permissions change. In this case, it's just a simple creation of a new Terraform Resource.
To learn more about what Resources you can configure, try one of our Tutorials.
For more information on how Abbey works, visit the Key Concepts or Grant Kits page.