All posts

How to configure Azure Active Directory Domino Data Lab for secure, repeatable access

A new engineer joins your data science team. They try to sign in to Domino Data Lab. Ten minutes later, they are still stuck waiting for admin approval, a token, or worse, the “where’s my access?” message on Slack. Azure Active Directory can fix that, if you wire it in properly. Azure Active Directory (AAD) manages identity for everything in your Microsoft ecosystem. Domino Data Lab runs the heavy compute your data and ML teams need to train, test, and deploy models. The two tools handle distin

Free White Paper

Active Directory + VNC Secure Access: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

A new engineer joins your data science team. They try to sign in to Domino Data Lab. Ten minutes later, they are still stuck waiting for admin approval, a token, or worse, the “where’s my access?” message on Slack. Azure Active Directory can fix that, if you wire it in properly.

Azure Active Directory (AAD) manages identity for everything in your Microsoft ecosystem. Domino Data Lab runs the heavy compute your data and ML teams need to train, test, and deploy models. The two tools handle distinct jobs, but together they form a clean, auditable workflow where people log in once and everything else just works.

When you integrate Azure Active Directory with Domino Data Lab, users authenticate through AAD and inherit the right level of privilege inside Domino. They never touch static credentials or random AWS keys again. Admins map AAD roles to Domino’s workspaces through standard OIDC claims or SCIM provisioning. Domino queries AAD for group membership, aligns it with project roles, and enforces them at runtime. From the engineer’s point of view, it feels absurdly simple—open Domino, click “Sign in with Microsoft,” start coding.

The best practice is to align Domino’s RBAC directly with AAD groups. That keeps your permissions human-readable: “ml-engineers,” “data-scientists,” “ops.” Rotate AAD tokens regularly and limit refresh lifetimes to reduce exposure. If you use Key Vault for secrets, store Domino’s client credentials there and let managed identities do the rest. The fewer passwords in plaintext, the better you sleep.

In short:
Integrating Azure Active Directory with Domino Data Lab creates a single identity boundary across analytics, compute, and infrastructure. It improves compliance, cuts manual onboarding, and keeps audit trails consistent.

Continue reading? Get the full guide.

Active Directory + VNC Secure Access: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Benefits of this setup:

  • Unified login across data science infrastructure
  • Faster onboarding and role changes
  • Centralized policy management through AAD conditional access
  • Full auditability for SOC 2 and ISO 27001 reviewers
  • No more shadow accounts or rogue tokens
  • Easier offboarding when people move teams

For developers, the real win is speed. No waiting on credentials, no switching profiles mid-debug. Notebook sessions pick up the same AAD context as the web UI. That means faster iteration and fewer “permission denied” errors that derail experiments.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. They connect identity providers like Azure Active Directory to downstream tools like Domino Data Lab so your engineers can move fast without skipping security reviews.

How do I connect Azure AD to Domino Data Lab?
Grant Domino an enterprise application in Azure, configure OIDC with the provided client ID and secret, then map Azure groups to Domino roles. Users sign in through the Microsoft identity flow, and Domino validates claims on each session.

AI workloads add another angle. As models start calling APIs and external data sources, your AAD integration ensures even automated agents act under known identities. You can audit an AI assistant’s actions the same way you do a human’s.

Secure identity, clean logs, fewer tickets. That is the real power of Azure Active Directory Domino Data Lab integration.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts