Table of Contents

Search

  1. Preface
  2. Introduction to Data Engineering Streaming
  3. Data Engineering Streaming Administration
  4. Sources in a Streaming Mapping
  5. Targets in a Streaming Mapping
  6. Streaming Mappings
  7. Window Transformation
  8. Appendix A: Connections
  9. Appendix B: Monitoring REST API Reference
  10. Appendix C: Sample Files

Security for the Databricks Environment

Security for the Databricks Environment

The Data Integration Service uses token-based authentication to provide access to the Databricks environment.
The Databricks administrator creates a token user and generates tokens for the user. The Databricks cluster configuration contains the token ID required for authentication.
If the token has an expiration date, verify that you get a new token from the Databricks administrator before it expires.
For more information about security and authentication for the Databricks environment, see the
Data Engineering Administrator Guide
.