Add Service principal (Azure AD Application) to Databricks
- Create a group "protecto_group" in databricks. 
- Add service principal which was created in step 1 with the display name "protecto_user". Reference link: Adding Service Principal to databricks. 
- Add "protecto_user" to the "protecto_group 
List of accesses needed in Databricks:
- Grant "SELECT", "USAGE", “READ_METADATA” privilege for all catalogs, databases (or schemas) and tables for "protecto_group". 
- Create medium sized sql warehouse for Protecto and give "can manage" permission for "protecto_group". 
- Grant “can manage” permission to “protecto_group” in all SQL warehouses on which the Protecto application needs to analyze. This is required to retrieve access logs (audit logs). 
Last updated
