A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://docs.databricks.com/aws/en/security/auth/api-access-permissions below:

Manage personal access token permissions

Manage personal access token permissions

This article describes the how to configure permissions for Databricks personal access tokens. To learn how to use credentials to authenticate to Databricks, see Authorizing access to Databricks resources. To monitor and revoke personal access tokens, see Monitor and revoke personal access tokens.

Personal access token permissions​

Workspace admins can set permissions on personal access tokens to control which users, service principals, and groups can create and use tokens. Before you can use token access control, a Databricks workspace admin must enable personal access tokens for the workspace. See Enable or disable personal access token authentication for the workspace.

A workspace user can have one of the following token permissions:

Databricks personal access token permissions are available only in the Premium plan or above.

This table lists the permissions required for each token-related task:

Manage token permissions using the admin settings page​

This section describes how to manage permissions using the workspace UI. You can also use the Permissions API or Databricks Terraform provider.

  1. Go to the settings page.

  2. Click the Advanced tab.

  3. Next to Personal Access Tokens, click the Permissions button to open the token permissions editor.

  4. Search for and select the user, service principal, or group and choose the permission to assign.

    If the users group has the CAN USE permission and you want to apply more fine-grained access for non-admin users, remove the CAN USE permission from the users group by clicking the X next to the permission drop-down menu in the users row.

  5. Click + Add.

  6. Click Save.

    warning

    After you save your changes, any users who previously had either the CAN USE or CAN MANAGE permission and no longer have either permission are denied access to personal access token authentication and their active tokens are immediately deleted (revoked). Deleted tokens cannot be retrieved.


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4