Authentication
Prophecy integrates with identity providers to let you log in using your external credentials. When accessing execution infrastructure (including Spark, schedulers, storage, and other cloud resources), Prophecy securely passes your identity in compliance with your existing authorization mechanisms.
We currently support the following options for Prophecy login:
Method | Description |
---|---|
Prophecy Managed | Use credentials managed directly by Prophecy. |
LDAP | Authenticate via LDAP, integrating with your organization's directory services. |
SAML | Leverage SAML to log in with identity providers such as Google, Okta, Azure Active Directory, and others. |
Azure Active Directory | Use Microsoft's cloud-based identity and access management service for authentication. |
Log in using your Google account credentials. |
Only cluster admins on self-hosted environments have permission to view and edit SSO settings.
If you require some other authentication mechanism, please reach out to our team.
What's next
To learn more about with authentication with Prophecy, see the following pages:
📄️ Security
Configure Keytab files and Proxy User settings
📄️ Active Directory with LDAP
Authentication using Active Directory with LDAP
📄️ Authentication
Prophecy support for identity providers for authentication and authorization
📄️ Azure Active Directory
Authentication using Azure Active Directory
📄️ SAML Using AzureAD with SCIM
SAML authentication using AzureAD with SCIM
📄️ SAML Using Okta
SAML authentication using OKTA
📄️ Databricks OAuth
Prophecy Databricks OAuth integration