Who Goes There? Enterprise Auth and Identity Management on Databricks Apps
Overview
| Experience | In Person |
|---|---|
| Track | Application Development |
| Industry | Communications, Media & Entertainment |
| Technologies | Databricks Apps |
| Skill Level | Intermediate |
For an application to move from a prototype to a core business asset, it must meet the highest standards of enterprise security and compliance. This session explores the advanced security architecture of Databricks Apps, demonstrating how it inherits and extends the robust governance of the Data Intelligence Platform.
We will move beyond basic access to explore sophisticated identity management patterns, including On-Behalf-Of (OBO) authentication for user-scoped actions and secure compute resource delegation. You will also learn how the platform is hardening the application lifecycle with features like automated secret rotation and dedicated network namespaces to ensure total isolation. Whether you are handling sensitive PII or building internal tools for thousands of users, this session provides the blueprint for building apps that are secure by design, fully audited, and ready for the most regulated environments.
Session Speakers
Wenxin Liu
/Specialist Solutions Architect
Databricks