Databricks managed MCP servers expose Unity Catalog functions, Genie spaces, SQL, and vector search directly from a Databricks workspace. Register each endpoint you need as a separate MCP server in TrueFoundry.Documentation Index
Fetch the complete documentation index at: https://www.truefoundry.com/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
- A TrueFoundry account with permission to add MCP servers.
- A Databricks workspace with managed MCP servers enabled.
- Workspace permissions for the Databricks resources you plan to expose.
Find the Databricks MCP URL
In Databricks, open Agents > MCP Servers. Use the URL for the server type you need:| Server type | URL format |
|---|---|
| Unity Catalog functions | https://<workspace-hostname>/api/2.0/mcp/functions/{catalog}/{schema} |
| System AI Python interpreter | https://<workspace-hostname>/api/2.0/mcp/functions/system/ai |
| Genie space | https://<workspace-hostname>/api/2.0/mcp/genie/{genie_space_id} |
| Databricks SQL | https://<workspace-hostname>/api/2.0/mcp/sql |
| Vector search | https://<workspace-hostname>/api/2.0/mcp/vector-search/{catalog}/{schema}/{index_name} |
Choose Authentication
OAuth
For production, register an OAuth app from the Databricks account console under Settings > App Connections. Use a confidential client, choose scopes such asall-apis, genie, or unity-catalog, and copy the Client ID and Client Secret.
In TrueFoundry, add a remote MCP server with OAuth2 Authorization Code and the Databricks MCP URL. Paste the Databricks OAuth client credentials when prompted and save the server. Users should open the server’s Tools section and click Connect Now; after OAuth succeeds, Databricks tools appear and can be tried from the Agent Playground.
Personal Access Token
For a shared service-account setup, create a Databricks personal access token from User Settings > Developer > Access tokens. In TrueFoundry, register the Databricks MCP URL with API Key or bearer-token style shared credentials and send the token asAuthorization: Bearer <token>.