able-furniture-61387
05/21/2025, 10:44 AMearly-magician-18981
05/21/2025, 3:42 PMable-furniture-61387
05/21/2025, 5:26 PMaccess_token_strategy: jwt
client_id: XXXXXXXXXXXXXX
client_name: Databricks
client_secret_expires_at: 0
client_uri: ""
created_at: 2025-05-20T05:23:12Z
grant_types:
- authorization_code
- urn:ietf:params:oauth:grant-type:jwt-bearer
- client_credentials
jwks: {}
logo_uri: ""
metadata: {}
owner: ""
policy_uri: ""
redirect_uris:
- <https://accounts.cloud.databricks.com/oidc/consume>
response_types:
- code
- token
- id_token
scope: openid profile groups email name offline_access offline
skip_consent: true
skip_logout_consent: false
subject_type: public
token_endpoint_auth_method: client_secret_basic
tos_uri: ""
updated_at: 2025-05-20T09:08:15.187441Z
userinfo_signed_response_alg: none
AdditionalProperties:
device_authorization_grant_access_token_lifespan: null
device_authorization_grant_id_token_lifespan: null
device_authorization_grant_refresh_token_lifespan: null
early-magician-18981
05/21/2025, 5:45 PMable-furniture-61387
05/22/2025, 10:50 AMearly-magician-18981
05/22/2025, 2:49 PMable-furniture-61387
05/22/2025, 2:51 PMI did some quick research, and couldn't find much information around it! This means that either its quite new (their APIs are not standardised as IdP) and/or Databricks doesn't support it.
Generally, such errors happen due to first one. We had in the past similar behaviour with IdP like AWS Cognito.
I would say, it might make sense to ask the question in databricks community as the first line to check if can get an intel.
In the meantime, if we find something then will let you know.We already did. We can give a try to the db community, but I wasnt giving it much chances thats why a tried here first 🙂
able-furniture-61387
05/22/2025, 2:51 PMable-furniture-61387
05/22/2025, 2:52 PMearly-magician-18981
05/22/2025, 3:05 PMearly-magician-18981
05/22/2025, 3:06 PMearly-magician-18981
05/22/2025, 3:06 PMearly-magician-18981
05/22/2025, 3:11 PMsub
claim by default which may not have a username the are expecting. You could use something like this to see what is in your access_token as well: https://oauthdebugger.com/ but typically the default is that in the id_token the username claim has the actual username you want databricks to use, see: https://www.ory.sh/docs/oauth2-oidc/openid-connect-claims-scope-customearly-magician-18981
05/22/2025, 3:12 PMable-furniture-61387
05/22/2025, 3:21 PMable-furniture-61387
05/22/2025, 3:21 PMable-furniture-61387
05/22/2025, 3:22 PMable-furniture-61387
05/22/2025, 3:23 PMable-furniture-61387
05/22/2025, 3:24 PMable-furniture-61387
05/22/2025, 3:24 PMearly-magician-18981
05/22/2025, 3:48 PMable-furniture-61387
05/28/2025, 9:15 AMearly-magician-18981
05/28/2025, 2:00 PMable-furniture-61387
05/28/2025, 2:13 PMearly-magician-18981
05/28/2025, 3:00 PMable-furniture-61387
05/28/2025, 3:17 PMearly-magician-18981
05/28/2025, 4:01 PMable-furniture-61387
05/30/2025, 9:21 AM