How to integrate ACL to Azure Databricks based Azure AD groups - azure-active-directory

I have few tables created in Databricks workspace and I want to give read access to these tables for certain members.
Currently we can create groups in Databricks Workspace and provide SQL Workspace access, Cluster Creation permission.
Is it possible that I can add an Azure AD security group as a user in Databricks and control access to it rather than creating groups in databricks workspace?

You can't add AAD group as a user of the workspace - you just need to sync necessary AAD groups and users from them into the Databricks workspace. You can do that using one of the tools:
Azure Databricks SCIM Connector that will sync groups & users automatically
Combine user & group resources of the Databricks Terraform Provider with Azure AD Terraform provider - with it you can easily pull groups & users from AAD, and apply these data to create users & groups in Databricks.
Use Databricks SCIM REST API to provision users - you'll need to script it.
P.S. It's also usually not recommended to give users cluster creation permissions, otherwise the costs will be out of the control. Instead, just create shared clusters, and SQL endpoints. Or at least create a cluster policy with predefined rules about cluster size, etc.

Related

Add user properties to Azure Active Directory for SCIM provisioning (HiBob)

I'm trying to setup a user lifecycle flow that will allow me to create an Azure Active Directory user (Member, not Guest) when an employee is created in our HRIS tool (HiBob). There is a pre-existing integration which is enabled and allows us to get basic information (name, location, etc.).
In the HRIS system we also store some more unique data that I would like to be added to the users AAD profile (maybe an emergency contact for example) that we can then use to provision other applications (like Slack).
My issue is trying to create these custom property fields. I have read about Azure B2C as well as directory schema, custom security extensions and using MS Graph. None of these seem to be totally relevant to my situation.
FYI we are fully cloud, so Azure AD Connect is also not an option.
To store custom data in Azure AD objects such as users you can leverage Azure AD Directory Extensions in tandem with Azure AD Provisioning trough SCIM.

How to create account for PowerBI or other application to grant access using AAD

I am currently using AAD groups to give access to my azure sql database.
Some i give DB role based, some database contained for schema specific access.
Now i have few accountID for PowerBI, Denodo and multiple other application access. Currently these are created as SQL logins..
Is there a way i replace them somehow to use the AAD groups for them as well. If so, can you pl help me with step by step document/artifact.
Thanks

Can you sync different AD domains under one Azure AD domain?

My problem is that we have 2 On-Premises Active Directory domains:
mycompany.com
mycompany-dev.com
Some people are present in both of these AD-s. I want to sync them with Azure Active Directory so that they are all represented once, and all have the #mycompany.com suffix (instead of #mycompany.onmicrosoft.com). I also don't want some users to have #mycompany-dev.com in their azure AD account login name, so I want to do some sort of mapping I guess.
Is this possible with Azure AD Connect, or do I have to implement a synchronization method manually?
You can sync multiple on-premises domain to Azure AD. Kindly check the link and you will get a detailed information about different topologies supported

We are trying to make Snowflake work AD SSO Logon using Azure AD SSO. How does Active Directory SSO work?

They are trying to migrate Oracle database into snowflake. THey are going to convert all existing oracle accounts to snowflake accounts. Now, if AD LDAP logon is enabled, does new users have to only be created in LDAP end, and will those be able to be tagged to accounts while conencting to snowflake? say currently there are 10 oracle accounts which was converted into 10 snowflake acccounts. If LDAP is enabled, can multiple employee IDs be added to use one of 10 snowflake account, by creating LDAP account.
Sorry if I sound dumb. I am not too experienced i LDAP/AD/admin work
You usually have one Azure AD and need configure every snowflake account to use it.
Which employee can access which snowflake account is controlled on the snowflake side, where you need to create a database user.
Say "Martina" needs access to Snowflake Account A and B. You need her in the Azure AD, as well as create her user in Account A and B.
You can find more details how to do this here:
https://docs.snowflake.com/en/user-guide/admin-security-fed-auth-configure-snowflake.html

Is it possible to do Role-Group based Authorization without Azure Active directory Premium

When RBAC was introduced in Azure Active directory, roles can be granted to users or collection of users (groups).We followed this blog post and added that functionality for our apps when it first got introduced. But now, we have to go for active directory premium to assign roles to groups and get roles in bearer token.Going with Azure Active directory is not a feasible solution for us as premium is gonna cost us $6 user/ month and we have lot of groups and each group has lot of users. Looking at the costs our IT team is not willing to go for this package. I was just wondering if there an alternative approach for mapping roles to groups. Or this is only doable using premium.
Using Azure Active Directory (Azure AD) with an Azure AD Premium or Azure AD Basic license, you can use groups to assign access to a SaaS application that's integrated with Azure AD( refer here about detail).
So if you want to manage the roles using the group, we need at least the Azure AD Basic license. If you were using the free edition, we can only assign the roles to the users one by one.
Instead using the role manage the access for the application, we can also use the group which also supports for the Azure AD free edition. You can check the code sample about authorization in a web app using Azure AD groups & group claims from here.

Resources