Picture this: your data science team is ready to launch a new model, but they hit a permissions wall. Someone needs to provision access to a Domino Data Lab workspace, map users, verify identities, and then revoke it a week later. It’s supposed to take minutes. Instead, it takes a ticket queue. That’s where bringing Active Directory into Domino Data Lab changes the story.
Active Directory is the backbone of enterprise identity, the single source of truth for who’s allowed to touch what. Domino Data Lab is the enterprise hub for model development, orchestration, and deployment. Together they let teams move fast without blowing past compliance checks. Integrating them means one login governs your notebooks, clusters, and model APIs, which makes auditors and engineers equally happy.
When you connect Active Directory to Domino Data Lab, you’re essentially mapping identities and groups to workspace permissions. Through LDAP or SAML (often wrapped in Okta or Azure AD), Domino queries Active Directory to confirm who the user is and what role they hold. That handshake defines every downstream permission: who can spin up projects, read datasets, or deploy a job. The logic is simple, but the effect is huge — consistent identity at scale.
To keep it clean, treat group membership as the control plane. Developers belong to data scientist or admin roles in Active Directory. Those propagate automatically into Domino Data Lab, so no one has to micromanage access lists. Rotate passwords and tokens in line with your corporate policies. If you’re using AWS or GCP, extend the same RBAC pattern to IAM roles. One identity, verified everywhere.
Quick Answer: To integrate Active Directory with Domino Data Lab, link Domino’s authentication layer to your organization’s directory via SAML or LDAP. Map AD groups to Domino roles, and enforce single sign-on. This maintains consistent permissions and simplifies provisioning across teams.