Skip to main content

Add Users — SCIM

You'll configure SCIM to automatically sync users from your identity provider into Databricks in ~15 min.

Prereqs: Account Console, account-admin privileges, identity provider admin access

What you'll build

An automated sync between your identity provider (Entra ID, Okta, or OneLogin) and the Databricks account. Users and their attributes sync on a schedule, so you never need to add them manually again.

Prerequisites

  • Account-admin access to the Databricks account console.
  • Admin access to your identity provider (Entra ID, Okta, or OneLogin).

Steps

1. Choose your identity provider

Follow the guide that matches your IdP:

Identity providerGuide
Microsoft Entra ID (Azure AD)Configure SCIM provisioning for Entra ID
OktaConfigure SCIM provisioning for Okta
OneLoginConfigure SCIM provisioning for OneLogin
tip

On Azure, a newer automatic sync feature is available: Sync users and groups automatically from Microsoft Entra ID. This replaces manual SCIM configuration for Azure deployments.

2. Configure the SCIM connector

Follow the selected guide to create a SCIM application in your IdP, generate a SCIM token from the Databricks account console, and configure the sync.

Select your cloud provider at the top-right of the Databricks docs page if the instructions differ by cloud.

3. Run the initial sync

Trigger the first sync from your IdP. Verify the users appear in the Databricks account console under User management > Users.

4. (Optional) Enable all IdP users

If you want every user in your identity provider to have Databricks access without manual assignment: Enable all identity provider users to access Databricks.

Verify

  1. In the Databricks account console, navigate to User management > Users.
  2. Confirm the synced users appear with the correct email addresses and display names.
  3. In your IdP, verify the SCIM application shows a successful provisioning status.

Troubleshoot

Users not appearing after sync

Check the SCIM application logs in your IdP for provisioning errors. Common causes: expired SCIM token, incorrect account console URL in the IdP configuration, or the user is not assigned to the SCIM application in the IdP.

Duplicate users after enabling SCIM

If users were added manually before SCIM was configured, the SCIM sync may create duplicates. Match on email address in the IdP connector settings to merge existing accounts.

Next