Connect
Optimize
Secure
Announcing StackOne Defender: leading open-source prompt injection guard for your agent • Read More →
Production-ready Databricks MCP server with 26 extensible actions — plus built-in authentication, security, and optimized execution.
Coverage
Create, read, update, and delete across Databricks — and extend your agent's capabilities with custom actions.
Authentication
Per-user OAuth in one call. Your Databricks MCP server gets session-scoped tokens with zero credentials stored on your infra.
Agent Auth →Security
Every Databricks tool response scanned for prompt injection in milliseconds — 88.7% accuracy, all running on CPU.
Prompt Injection Defense →Performance
Free up to 96% of your agent's context window to enhance reasoning and reduce cost, on every Databricks call.
Tools Discovery →A Databricks MCP server lets AI agents read and write Databricks data through the Model Context Protocol — Anthropic's open standard for connecting LLMs to external tools. StackOne's Databricks MCP server ships with 26 pre-built actions, fully extensible via the Connector Builder — plus managed authentication, prompt injection defense, and optimized agent context. Connect it from MCP clients like Claude Desktop, Claude Code, Cursor, Goose, and VS Code, or from agent frameworks like OpenAI Agents SDK, LangChain, and Vercel AI SDK.
Every action from Databricks's API, ready for your agent. Create, read, update, and delete — scoped to exactly what you need.
Create a new group in the Databricks account
Get all groups in the Databricks account
Retrieve a specific group by ID
Update an existing group's attributes
Remove a group from the Databricks account
Add a user or service principal to a group
Remove a user or service principal from a group
Return the authenticated identity and auth type for the current Databricks connection via the SCIM /Me endpoint. Maps to the StackOne IAM unified credentials schema. auth_type is "oauth" for OAuth connections, "api_key" for SCIM Token connections.
List all groups in the connected Databricks account via the Account SCIM API, mapped to the StackOne IAM unified group schema. Returns group id, display name, and type ("group"). Uses index-based SCIM 2.0 pagination (100 per page).
Retrieve a single Databricks account group by its SCIM group ID, mapped to the StackOne IAM unified group schema. Optionally pass expand=["users"] to inline the group's members. Returns group id, display name, type, and timestamps.
Return the Databricks account as a single IAM organization record. Each connection targets exactly one Databricks account (identified by the Account ID configured during connection setup). Returns one record with the account ID as id/remote_id.
Retrieve the Databricks account as a single IAM organization. Each connection targets exactly one account — pass the id returned by unified_list_organizations.
Return the two stable account-level IAM roles (account_admin / user) synthesized from Databricks SCIM roles[].value field on user records. The role set is static and closed, matching role IDs embedded in IamUser.roles[] on this connector.
Retrieve a single synthesized Databricks IAM role by its stable key. Only "account_admin" and "user" are valid — the role namespace is closed because Databricks has no general-purpose roles API.
List all users in the connected Databricks account via the Account SCIM API, mapped to the StackOne IAM unified user schema. Returns identity, status (enabled/disabled), email, name, and group membership. Uses index-based SCIM 2.0 pagination (100 per page).
Retrieve a single Databricks account user by their SCIM user ID, mapped to the StackOne IAM unified user schema. Optionally pass expand=["groups"] to inline the user's group memberships. Returns identity, status, email, name, and synthesized roles.
Create a new service principal in the Databricks account
Get all service principals in the Databricks account
Retrieve a specific service principal by ID
Update an existing service principal's attributes
Remove a service principal from the Databricks account
Create a new user in the Databricks account
Get all users in the Databricks account
Retrieve a specific user by ID
Update an existing user's attributes
Remove a user from the Databricks account
One endpoint. Any framework. Your agent is talking to Databricks in under 10 lines of code.
MCP Clients
Agent Frameworks
{
"mcpServers": {
"stackone": {
"command": "npx",
"args": [
"-y",
"mcp-remote@latest",
"https://api.stackone.com/mcp?x-account-id=<account_id>",
"--header",
"Authorization: Basic <YOUR_BASE64_TOKEN>"
]
}
}
}Anthropic's code_execution processes data already in context. Custom MCP code mode keeps raw tool responses in a sandbox. 14K tokens vs 500.
11 min
Benchmarking BM25, TF-IDF, and hybrid search for MCP tool discovery across 916 tools. The 80/20 TF-IDF/BM25 hybrid hits 21% Top-1 accuracy in under 1ms.
10 min
MCP tools that read emails, CRM records, and tickets are indirect prompt injection vectors. Here's how we built a two-tier defense that scans tool results in ~11ms.
12 min
origin_owner_id.All the tools you need to build and scale AI agent integrations, with best-in-class connectivity, execution, and security.