What is Databricks Partner Connect?

Partner Connect lets you create trial accounts with select Azure Databricks technology partners and connect your Azure Databricks workspace to partner solutions from the Azure Databricks UI. This allows you to try partner solutions using your data in the Databricks lakehouse, then adopt the solutions that best meet your business needs.

Partner Connect provides a simpler alternative to manual partner connections by provisioning the required Azure Databricks resources on your behalf, then passing resource details to the partner. Required resources might include a Databricks SQL warehouse (formerly Databricks SQL endpoint), a service principal, and a personal access token.

Not all Azure Databricks partner solutions are featured in Partner Connect. For a list of partners that are featured in Partner Connect, with links to their connection guides, see Azure Databricks Partner Connect partners.

Tip

If you have an existing partner account, Databricks recommends that you follow the steps to connect to the partner solution manually in the appropriate connection guide. This is because the connection experience in Partner Connect is optimized for new partner accounts.

Note

Some partner solutions allow you to connect using Databricks SQL warehouses or Azure Databricks clusters, but not both. For details, see the partner’s connection guide.

Important

Partner Connect isn’t available in Azure China regions, Azure Government regions, or workspaces with FedRAMP compliance.

Requirements

To connect your Azure Databricks workspace to a partner solution using Partner Connect, you must meet the following requirements:

  • Your Azure Databricks account must be on the Premium plan. This is because Partner Connect uses Databricks SQL, which is available only on this plan. To view your Azure Databricks account details, see Manage your subscription.
  • To create new connections to partner solutions, you must first sign in to your workspace as an Azure Databricks workspace admin. For information about Azure Databricks workspace admins, see Manage users.
  • For all other Partner Connect tasks, you must first sign in to your workspace as an Azure Databricks workspace admin or an Azure Databricks user who has at least the Workspace access entitlement. If you are working with SQL warehouses, the Databricks SQL access entitlement. For more information, see Manage users.

Quickstart: Connect to a partner solution using Partner Connect

  1. Make sure your Azure Databricks account, workspace, and the signed-in user all meet the requirements for Partner Connect.

  2. In the sidebar, click Partner Connect button Partner Connect.

  3. Click the tile for the partner that you want to connect your workspace to. If the tile has a check mark icon, stop here, as your workspace is already connected. Otherwise, follow the on-screen directions to finish creating the connection.

    Note

    Partner solutions that use a locally-installed application instead of a web-based one (such as Power BI Desktop and Tableau Desktop) do not display a check mark icon in their tile in Partner Connect, even after you connect your workspace to them.

  4. To work with your new connection, see the concluding or Next steps section of the corresponding partner connection guide.

Common tasks required to create and manage partner connections

This section describes common tasks you might need to complete to create and manage partner connections using Partner Connect.

Allow users to access partner-generated databases and tables

Partner solutions in the Data Ingestion category in Partner Connect can create databases and tables in your workspace. These databases and tables are owned by the partner solution’s associated Azure Databricks service principal in your workspace.

By default, these databases and tables can be accessed only by the service principal and by workspace admins. To allow other users in your workspace to access these databases and tables, use the SQL GRANT statement. To get access details for an existing database or table, use the SQL SHOW GRANTS statement.

Create an access token

Azure Databricks partner solutions require you to provide the partner with either an Azure Databricks personal access token or a Microsoft Entra ID token, depending on the types of tokens that the partner supports. The partner uses this token to authenticate with your Azure Databricks workspace.

For cloud-based partner solutions in Partner Connect (such as Fivetran, Labelbox, Prophecy, and Rivery), Partner Connect automatically creates an Azure Databricks personal access token (along with an Azure Databricks service principal that is associated with that token) and then shares the token’s value with the partner. (Partner Connect does not create Microsoft Entra ID service principals nor Microsoft Entra ID tokens and does not share Microsoft Entra ID token values with partners.) You cannot access the personal access token’s value that Partner Connect creates. If for any reason the personal access token expires or the personal access token’s value is no longer shared with the partner, you must create a replacement personal access token for the Azure Databricks service principal; to do this, see Manage service principals and personal access tokens. To share the replacement personal access token with the partner, see the partner’s documentation.

Only Azure Databricks workspace administrators can generate replacement personal access tokens for Azure Databricks service principals. If you cannot generate a replacement personal access token, contact your administrator. See also Manage service principals.

For desktop-based partner solutions in Partner Connect (such as Power BI and Tableau), you must create the token and then share the token’s value with the partner. To create the token:

To set up the partner solution so that it shares the new token with the partner, follow the on-screen instructions in Partner Connect or see the partner’s documentation.

Important

When you create the token and share the token’s value with the partner, the partner can take whatever actions that the related entity (such as your Azure Databricks user or a Microsoft Entra ID service principal) can normally take within your Azure Databricks workspace. Do not share token values with partners whom you do not trust.

Note

As a security best practice, when you authenticate with automated tools, systems, scripts, and apps, Databricks recommends that you use personal access tokens belonging to service principals instead of workspace users. To create tokens for service principals, see Manage tokens for a service principal.

Azure Databricks workspace administrators can disable token generation. If you cannot generate a token, contact your administrator. See also Monitor and revoke personal access tokens.

Allow a SQL warehouse to access external data

To allow a Databricks SQL warehouse to access data outside of Azure Databricks, see Enable data access configuration.