Configure Simba JDBC driver using Azure AD

Access Databricks with a Simba JDBC driver using an Azure user account and Azure AD authentication.

Written by arvind.ravish

Last published at: December 7th, 2022

This article describes how to access Azure Databricks with a Simba JDBC driver using Azure AD authentication.

This can be useful if you want to use an Azure AD user account to connect to Azure Databricks.



Power BI has native support for Azure AD authentication with Azure Databricks. Review the Power BI documentation for more information.

Create a service principal

Create a service principal in Azure AD. The service principal obtains an access token for the user.

  1. Open the Azure Portal.
  2. Open the Azure Active Directory service.
  3. Click App registrations in the left menu.
  4. Click New registration.
  5. Complete the form and click Register.

Your service principal has been successfully created.

Configure service principal permissions

  1. Open the service principal you created.
  2. Click API permissions in the left menu.
  3. Click Add a permission.
  4. Click Azure Rights Management Services.
  5. Click Delegated permissions.
  6. Select user_impersonation.
  7. Click Add permissions.
  8. The user_impersonation permission is now assigned to your service principal.


If Grant admin consent is not enabled, you may encounter an error later on in the process.

Update service principal manifest

  1. Click Manifest in the left menu.
  2. Look for the line containing the "allowPublicClient" property.
  3. Set the value to true.
  4. Click Save.

Download and configure the JDBC driver

  1. Download the Databricks JDBC Driver.
  2. Configure the JDBC driver as detailed in the documentation.

Obtain the Azure AD token

Use the sample code to obtain the Azure AD token for the user.

Replace the variables with values that are appropriate for your account.


from adal import AuthenticationContext

authority_host_url = """
# Application ID of Azure Databricks
azure_databricks_resource_id = "2ff814a6-3304-4ab8-85cb-cd0e6f879c1d"

# Required user input
user_parameters = {
   "tenant" : "<tenantId>",
   "client_id" : "<clientId>",
   "username" : "<>",
   "password" : <password>

# configure AuthenticationContext
# authority URL and tenant ID are used
authority_url = authority_host_url + user_parameters['tenant']
context = AuthenticationContext(authority_url)

# API call to get the token
token_response = context.acquire_token_with_username_password(

access_token = token_response['accessToken']
refresh_token = token_response['refreshToken']

Pass the Azure AD token to the JDBC driver

Now that you have the user’s Azure AD token, you can pass it to the JDBC driver using Auth_AccessToken in the JDBC URL as detailed in the Building the connection URL for the Databricks driver documentation.

This sample code demonstrates how to pass the Azure AD token.


# Install jaydebeapi pypi module (used for demo)

import jaydebeapi
import pandas as pd

import os os.environ["CLASSPATH"] = "<path to downloaded Simba Spark JDBC/ODBC driver>"

# JDBC connection string

  conn=jaydebeapi.connect("com.simba.spark.jdbc.Driver", url)
  cursor = conn.cursor()

  # Execute SQL query
  sql="select * from <tablename>"
  results = cursor.fetchall()
  column_names = [x[0] for x in cursor.description]
  pdf = pd.DataFrame(results, columns=column_names)

 # Uncomment the following two lines if this code is running in the Databricks Connect IDE or within a workspace notebook.
 # df = spark.createDataFrame(pdf)

        if cursor is not None:

Was this article helpful?