Skip to content

bhavink/applied-ai-governance

Repository files navigation

Applied AI Governance

The tools will change. The principles won't. Govern the invariants.

Your business needs an AI platform where users get governed answers from live data, knowledge workers search across institutional memory, and agents orchestrate complex workflows, all while partners and customers access the same capabilities through their own identity providers without platform accounts. This repository shows you how to build and govern that platform on Databricks.

Start here: Governance Framework defines the seven pillars, design principles, and adaptability model.


Pillars

Pillar Path Contents
Identity & Access Control identity/ AuthN (IdP delegation), AuthZ (OBO, M2M, Federation), proxy architecture, OAuth scopes, cloud auth, SPs
Data Governance data-governance/ Row filters, column masks, ABAC, group gotchas, best practices, Genie multi-team patterns
Tool & API Governance tool-governance/ AI Gateway patterns, MCP governance, agent governance, UC HTTP Connections
Prompt Security prompt-security/ Attack surfaces (9), hardening patterns, threat intel log, defense-in-depth
Observability & Audit observability/ Two-layer model, system tables, MLflow tracing patterns, audit correlation

Network, developer guardrails, and policy/compliance pillars are defined in the Governance Framework and will be added as content is built and validated.


Quick Start

  1. Authentication: AuthN is delegated to IdPs (brief overview + official doc links)
  2. Authorization: The three token patterns, UC governance, OAuth scopes, service principals
  3. UC Governance: Row filters, column masks, ABAC, Genie patterns

Presentations

# Deck Audience Topic
01 AI Governance — The Complete Picture Exec One auth layer, three token paths, six enforcement layers, resource auth matrix, decision trees, prerequisites checklists
02 Identity & Authorization by Resource Type Technical Serving Endpoints, Genie, UC Functions, Vector Search, UC HTTP Connections, Tables, Lakebase — auth model, identity flow, and gotchas for each
03 AI Orchestration & Tool Governance Technical Agent Bricks, MCP servers, UC Connections, token federation, AI Gateway, observability — end-to-end orchestration governance

Implementation Guides:

# Guide Topic
IG Federation Token Exchange — Implementation Blueprint 12 prerequisites, 7-step flow, Auth0 / Okta / Entra ID walkthroughs, error catalog, smoke tests

Previous versions (identity-governance-overview, identity-patterns, federation-deep-dive, uc-governance, orchestration, ai-gateway-patterns-v2, uc-connections) are archived in the presentations directory.

Browse all decks: Presentations


Common Questions

Q: Which authentication pattern should I use? A: See the decision table in Authorization.

Q: How do I enforce per-user data access? A: Use OBO + UC row filters. See UC Authorization.

Q: How do I secure a Genie Space for multiple teams? A: See the Genie patterns section in UC Governance.

Q: My custom MCP server always shows the SP identity, not the user. Why? A: This is the two-proxy problem. See Authorization.

Q: How do I give external users governed access to Databricks AI tools? A: Use Federation Exchange. See Federation.

Q: How do I govern which agents can call external APIs? A: Use UC HTTP Connections with GRANT USE CONNECTION. See UC Connections.

Q: Can an agent access a user's personal Google Drive or Gmail? A: Yes, using OAuth U2M Per User connections. Each user authenticates separately. See UC Connections.


Related Databricks Documentation


Last updated: 2026-04-13

About

Production-ready authentication, authorization, and governance patterns for AI applications on Databricks

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages