Table of Contents


  1. Preface
  2. Introduction to Data Engineering Streaming
  3. Data Engineering Streaming Administration
  4. Sources in a Streaming Mapping
  5. Targets in a Streaming Mapping
  6. Streaming Mappings
  7. Window Transformation
  8. Appendix A: Connections
  9. Appendix B: Monitoring REST API Reference
  10. Appendix C: Sample Files

Security for the Databricks Environment

Security for the Databricks Environment

The Data Integration Service uses token-based authentication to provide access to the Databricks environment.
The Databricks administrator creates a token user and generates tokens for the user. The Databricks cluster configuration contains the token ID required for authentication.
If the token has an expiration date, verify that you get a new token from the Databricks administrator before it expires.
For more information about security and authentication for the Databricks environment, see the
Data Engineering Administrator Guide


We’d like to hear from you!