azure-osdu
Queries OSDU users and entitlements via the OSDU Entitlements API. Use when listing OSDU users, checking roles (Viewer, Editor, Admin, Ops), resolving GUIDs to names, or troubleshooting OSDU access.
When & Why to Use This Skill
The Azure OSDU Entitlements skill streamlines identity and access management within the OSDU (Open Subsurface Data Universe) ecosystem. It automates complex interactions with the OSDU Entitlements API, allowing administrators to audit user roles, manage group memberships, and resolve technical GUIDs into human-readable names, significantly reducing the operational overhead of maintaining secure data partitions.
Use Cases
- User Access Auditing: Generate comprehensive reports of all users and their assigned roles (Viewer, Editor, Admin, Ops) across specific OSDU data partitions for compliance checks.
- Identity Resolution & Troubleshooting: Automatically map OSDU GUIDs to Azure AD display names and emails to quickly identify users and diagnose 'Access Denied' errors.
- Automated User Onboarding/Offboarding: Efficiently add or remove users from specific functional groups or promote members to 'OWNER' status using streamlined command-line operations.
- Safety-First Group Management: Prevent administrative lockouts using 'Last-Owner Protection' which blocks the accidental removal of a group's final administrator.
- Bulk Permission Processing: Utilize parallel GUID resolution and JSON output modes to integrate OSDU entitlement data into larger automation workflows or security dashboards.
| name | azure-osdu |
|---|---|
| description | Queries OSDU users and entitlements via the OSDU Entitlements API. Use when listing OSDU users, checking roles (Viewer, Editor, Admin, Ops), resolving GUIDs to names, or troubleshooting OSDU access. |
OSDU Entitlements Operations
Reference documentation for querying OSDU users and entitlements via the OSDU Entitlements API.
Prerequisites
Verify environment variables are set before any operation:
echo "AI_OSDU_HOST: ${AI_OSDU_HOST:-NOT SET}"
echo "AI_OSDU_DATA_PARTITION: ${AI_OSDU_DATA_PARTITION:-NOT SET}"
echo "AI_OSDU_CLIENT: ${AI_OSDU_CLIENT:-NOT SET}"
echo "AI_OSDU_SECRET: ${AI_OSDU_SECRET:+SET}"
echo "AI_OSDU_TENANT_ID: ${AI_OSDU_TENANT_ID:-NOT SET}"
Test configuration and authentication:
uv run .claude/skills/azure-osdu/scripts/osdu_manage.py check
Quick Reference
List Users and Roles
# List all OSDU users with their roles
uv run .claude/skills/azure-osdu/scripts/osdu_users.py
# JSON output for processing
uv run .claude/skills/azure-osdu/scripts/osdu_users.py --json
# Filter to specific role
uv run .claude/skills/azure-osdu/scripts/osdu_users.py --role Admin
# Skip GUID resolution (faster)
uv run .claude/skills/azure-osdu/scripts/osdu_users.py --no-resolve
Manage User Roles
# Add user as Viewer
uv run .claude/skills/azure-osdu/scripts/osdu_manage.py add \
--user "user@example.com" --role Viewer
# Add user as Editor with OWNER rights
uv run .claude/skills/azure-osdu/scripts/osdu_manage.py add \
--user "user@example.com" --role Editor --as-owner
# Remove from specific role
uv run .claude/skills/azure-osdu/scripts/osdu_manage.py remove \
--user "user@example.com" --role Viewer
# Remove from all roles
uv run .claude/skills/azure-osdu/scripts/osdu_manage.py remove \
--user "user@example.com" --all-roles
Owner Management
Users in OSDU groups have one of two membership types:
- OWNER: Can add/remove members from the group (management capability)
- MEMBER: Has access granted by the group (no management capability)
# Change user from MEMBER to OWNER (promote)
uv run .claude/skills/azure-osdu/scripts/osdu_manage.py update \
--user "user@example.com" --role Editor --to OWNER
# Change user from OWNER to MEMBER (demote)
uv run .claude/skills/azure-osdu/scripts/osdu_manage.py update \
--user "user@example.com" --role Editor --to MEMBER
# Remove an OWNER (blocked by default if last owner)
uv run .claude/skills/azure-osdu/scripts/osdu_manage.py remove \
--user "owner@example.com" --role Admin
# Force removal of last OWNER (use with caution!)
uv run .claude/skills/azure-osdu/scripts/osdu_manage.py remove \
--user "owner@example.com" --role Admin --force
Last-Owner Protection: By default, the script prevents removing or demoting the last OWNER of a group to avoid orphaning it. Use --force to override this protection when necessary.
GUID Resolution
OSDU stores users as GUIDs. The osdu_users.py script automatically resolves GUIDs to human-readable names via Azure AD.
How It Works
- Check cache - Session-scoped cache prevents repeated lookups
- Try user - Look up in Azure AD users
- Try service principal - Check Azure AD service principals (prefixed with
[SP]) - Try application - Check Azure AD applications (prefixed with
[App])
Requirements
- Azure CLI authenticated:
az login - Permission to read Azure AD objects
Performance
GUID Resolution Performance:
- With
--no-resolve: ~2 seconds (fast) - With resolution: ~20-30 seconds (parallel resolution of ~150 GUIDs)
The script uses parallel GUID resolution with 10 concurrent workers to minimize lookup time.
Use --no-resolve flag when:
- Processing large user lists
- Cross-referencing with Azure AD (you already have names from tenant)
- Running in
/auditworkflows (names come from tenant lookup) - Azure CLI not available
- Speed is more important than readability
# Fast mode without GUID resolution
uv run .claude/skills/azure-osdu/scripts/osdu_users.py --no-resolve
# For audit workflows, always use --no-resolve with --json
uv run .claude/skills/azure-osdu/scripts/osdu_users.py --json --no-resolve
Role Groups
| Role | Group Pattern | Access Level |
|---|---|---|
| Viewer | users.datalake.viewers@{partition}.{domain} |
Read-only |
| Editor | users.datalake.editors@{partition}.{domain} |
Read-write |
| Admin | users.datalake.admins@{partition}.{domain} |
Administrative |
| Ops | users.datalake.ops@{partition}.{domain} |
Operations |
| Root | users.data.root@{partition}.{domain} |
Superuser |
Output Formats
| Format | Flag | Use Case |
|---|---|---|
| Table | (default) | Human readable with colors |
| JSON | --json |
Automation and processing |
JSON Output Structure
{
"success": true,
"host": "osdu.energy.azure.com",
"partition": "opendes",
"total_users": 5,
"users": [
{
"email": "user@example.com",
"display_name": "John Doe",
"is_root": false,
"roles": {"Viewer": "MEMBER", "Editor": "OWNER"}
}
]
}
Environment Variables
| Variable | Required | Description |
|---|---|---|
AI_OSDU_HOST |
Yes | OSDU instance hostname |
AI_OSDU_DATA_PARTITION |
Yes | Data partition ID |
AI_OSDU_CLIENT |
Yes | App registration client ID |
AI_OSDU_SECRET |
Yes | App registration secret |
AI_OSDU_TENANT_ID |
Yes | Azure AD tenant ID |
AI_OSDU_DOMAIN |
No | Entitlements domain (default: dataservices.energy) |
Error Handling
| Error | Cause | Solution |
|---|---|---|
| 401 Unauthorized | Invalid/expired token | Check AI_OSDU_SECRET, re-authenticate |
| 403 Forbidden | Missing API permissions | Add Entitlements API permissions in OSDU |
| 404 Not Found | Group/user not found | Verify group name format and partition ID |
| 409 Conflict | User already in group | User is already a member (not an error) |
| Last owner | Removing/demoting last OWNER | Add another OWNER first, or use --force |
| Missing env vars | Not configured | Set required AI_OSDU_* environment variables |
| GUID not resolved | Azure AD issue | Check az login, try --no-resolve |
Best Practices
- Verify environment - Run
checkcommand before operations - Start with Viewer - Assign least privilege, escalate as needed
- Use email addresses - Easier to track than GUIDs
- Use --no-resolve for bulk - Faster for large user lists
- Check Azure CLI auth - GUID resolution requires
az login
Reference Files
- reference/entitlements.md - Full API reference
- reference/troubleshooting.md - Detailed error solutions
- scripts/osdu_users.py - User listing script
- scripts/osdu_manage.py - User management script