Grant Databricks permissions Private Preview
Once you've enabled Context Engineering Studio, you need to grant the Atlan service principal the Databricks permissions required to connect, deploy Metric Views, and execute queries on your behalf. You only need to complete this step once per Databricks workspace. Subsequent context repositories on the same workspace don't require additional grants.
Prerequisites
Before you begin, make sure:
- You have an existing Databricks connection in Atlan configured with Service Principal + OAuth M2M credentials. See Add a Databricks connection.
- You know the Atlan service principal name. Confirm with your Atlan representative if unsure: applying grants to the wrong principal is the most common setup mistake.
- You have access to the target Unity Catalog schema and the Databricks workspace and account admin consoles.
- Partner-powered AI is enabled at both the account and workspace levels. Per Databricks's Genie setup requirements, without this Genie is unavailable even to users who hold the SQL entitlement. An account administrator enables it.
- A pro or serverless SQL warehouse is available and runs Databricks Runtime 17.3 or later (required for Metric Views).
- Permissions may already be applied. In a Databricks SQL editor, run
SHOW GRANTS ON SCHEMA <target_catalog>.<target_schema>;and filter for your service principal. IfCREATE TABLE,SELECT, andMODIFYare listed and the service principal hasCAN USEon the pro or serverless SQL warehouse, skip this guide and go to Build.
Apply grants
- Step by step
- All grants at once
-
Grant Unity Catalog access to enable CES to create Metric Views and read source data for simulations. Run the following in a Databricks SQL editor.
-- Catalog and schema access
GRANT USE CATALOG ON CATALOG <target_catalog> TO `<atlan_service_principal>`;
GRANT USE SCHEMA ON SCHEMA <target_catalog>.<target_schema> TO `<atlan_service_principal>`;
-- Required to create Metric Views in the target schema
GRANT CREATE TABLE ON SCHEMA <target_catalog>.<target_schema> TO `<atlan_service_principal>`;
-- Required for Metric View creation and simulation
GRANT SELECT ON ALL TABLES IN SCHEMA <target_catalog>.<target_schema> TO `<atlan_service_principal>`;
-- Required to sync Atlan descriptions into Unity Catalog comments
GRANT MODIFY ON ALL TABLES IN SCHEMA <target_catalog>.<target_schema> TO `<atlan_service_principal>`;In Unity Catalog,
CREATE TABLEis the privilege required to create Metric Views. There's no separateCREATE VIEWprivilege. If your source tables live in a different catalog or schema from the deployment target, grantUSE CATALOG,USE SCHEMA, andSELECTon those source locations too. -
Grant SQL warehouse access to enable CES to run simulations. In the Databricks workspace, navigate to SQL Warehouses, select your target pro or serverless warehouse, open the Permissions tab, and add the Atlan service principal with CAN USE.
noteGenie requires a pro or serverless SQL warehouse running Databricks Runtime 17.3 or later to support Metric Views.
-
Grant Genie Space management access to enable CES to create and configure Genie Spaces. In the Databricks account and workspace admin consoles:
- Confirm partner-powered AI is enabled at both the account and workspace levels.
- Add the service principal to the workspace as a workspace member.
- Enable the Databricks SQL workspace entitlement for the service principal.
Run the following in a Databricks SQL editor. Before running, replace:
<atlan_service_principal>with your Atlan service principal name<target_catalog>with your target catalog<target_schema>with your target schema (where Metric Views are deployed)<source_catalog>and<source_schema>with the catalog and schema where your source data tables live (often different from the deployment target)
-- Context Engineering Studio: Databricks Permissions Setup
-- 1. Catalog and schema access (deployment target)
GRANT USE CATALOG ON CATALOG <target_catalog> TO `<atlan_service_principal>`;
GRANT USE SCHEMA ON SCHEMA <target_catalog>.<target_schema> TO `<atlan_service_principal>`;
-- 2. CREATE TABLE (required for Metric View creation)
GRANT CREATE TABLE ON SCHEMA <target_catalog>.<target_schema> TO `<atlan_service_principal>`;
-- 3. SELECT on deployment schema tables
GRANT SELECT ON ALL TABLES IN SCHEMA <target_catalog>.<target_schema> TO `<atlan_service_principal>`;
-- 4. MODIFY for Unity Catalog comment sync
GRANT MODIFY ON ALL TABLES IN SCHEMA <target_catalog>.<target_schema> TO `<atlan_service_principal>`;
-- 5. SELECT on source schemas (if source data lives in a different location)
-- Repeat for each source schema in your context repository
GRANT USE CATALOG ON CATALOG <source_catalog> TO `<atlan_service_principal>`;
GRANT USE SCHEMA ON SCHEMA <source_catalog>.<source_schema> TO `<atlan_service_principal>`;
GRANT SELECT ON ALL TABLES IN SCHEMA <source_catalog>.<source_schema> TO `<atlan_service_principal>`;
GRANT SELECT ON FUTURE TABLES IN SCHEMA <source_catalog>.<source_schema> TO `<atlan_service_principal>`;
After running the SQL, complete the remaining steps in the Databricks workspace and account admin consoles: grant CAN USE on the SQL warehouse, enable partner-powered AI at account and workspace level, add the service principal as a workspace member, and enable the Databricks SQL workspace entitlement.
Verify permissions
CES doesn't run an automated preflight check for Databricks. Verify grants manually before building:
- Run
SHOW GRANTS ON SCHEMA <target_catalog>.<target_schema>;and confirmUSE CATALOG,USE SCHEMA,CREATE TABLE,SELECT, andMODIFYappear for the service principal. - In SQL Warehouses, confirm the service principal has
CAN USEon the target warehouse. - Confirm the service principal is a workspace member with the Databricks SQL entitlement.
- Open the Databricks connection in Atlan and confirm that catalog browsing works. This tests the OAuth M2M credentials CES uses at build and deploy time.
If any permission is missing, deployment surfaces an error from Databricks. Resolve and retry.
Next steps
- Build your context repository: describe a domain, select assets, and generate a semantic model.