From the course: Advanced Microsoft Fabric Implementation and Governance

Unlock the full course today

Join today to access over 24,400 courses taught by industry experts.

Implementing database security

Implementing database security

- [Instructor] Data warehouses and lakehouses use similar methods to traditional databases to secure data. You can create or implement roles to allow users access to the data. You can run SQL commands to grant access on various objects to those roles. Grant, revoke and deny will work the same way as they do in a traditional SQL Server database. Row-level security is created using a security policy you create with the command create security policy. Remember, only users with item read permissions on the lakehouses set to read-only will be able to get this access. Let's create a security policy on a table to restrict the ability for some users to access a column within that table. This should always be specified, not for individual users, but for enter security groups, unlike what we'll be doing in this example. So, to restrict access to a table, we're going to be writing some T-SQL. Remember, I got this particular database from Fabric when I looked at the gear here for my lakehouse…

Contents