Advanced Configuration for Access Management for Databricks all-purpose compute clusters with Object-Level Access Control (OLAC)¶
JWT Auth Configuration¶
By default, Privacera uses the Databricks login user for authorization. However, we also support JWT (JSON Web Token) integration, which utilizes the user/group information from the JWT payload instead of the Databricks login user.
Here are the steps to configure JWT token integration
Use Service Principal id for Authorization¶
By default, Privacera uses display name for Service Principal, If you want to use Service Principal Id then below configuration:
-
SSH to the instance where Privacera Manager is installed.
-
Run the following command to navigate to the /config directory and open Dataserver yml
- Modify/ADD the following properties:
Bash - Once the properties are configured, Run Privacera Manager setup and install actions Refer this
- In PrivaceraCloud, go to Settings -> Applications -> S3 -> S3
- Click on Access Management -> Advanced
- Under Add New Custom Properties put below properties
Bash
Ignore S3 Objects from Privacera Access Check¶
By default, the Dataserver is used to perform access control on all objects. However, if you want to ignore certain objects or entire buckets from Privacera Access Check and access them directly through the IAM role attached to the Databricks cluster, you can use the spark.hadoop.privacera.olac.ignore.paths
property.
The property needs to be included in the Databricks cluster configuration.
Note
- The property accepts a comma-separated list of paths to be excluded from Privacera Access Check.
- Paths to be ignored support all S3 file protocols, such as
s3://
,s3a://
, ands3n://
. - Ensure that the attached IAM role has the necessary permissions to access the specified paths..
- The property supports the wildcard character
*
in both the bucket name and object path.
Encrypt Sensitive Data in Signer Request and Response Payload¶
- SSH into the instance where Privacera Manager is installed.
- Run the following command to navigate to the
/config
directory.Bash - Run the following command to open the
vars.databricks.plugin.yml
file to be edited.Bash - Update the following property to redact sensitive data in debug logs at the root level:
- Once the properties are configured, update your Privacera Manager platform instance by following the Quickstart guide.
- Prev topic: Setup
- Next topic: Troubleshooting