From the course: Advanced Microsoft Fabric Implementation and Governance
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
Implementing database security
From the course: Advanced Microsoft Fabric Implementation and Governance
Implementing database security
- [Instructor] Data warehouses and lakehouses use similar methods to traditional databases to secure data. You can create or implement roles to allow users access to the data. You can run SQL commands to grant access on various objects to those roles. Grant, revoke and deny will work the same way as they do in a traditional SQL Server database. Row-level security is created using a security policy you create with the command create security policy. Remember, only users with item read permissions on the lakehouses set to read-only will be able to get this access. Let's create a security policy on a table to restrict the ability for some users to access a column within that table. This should always be specified, not for individual users, but for enter security groups, unlike what we'll be doing in this example. So, to restrict access to a table, we're going to be writing some T-SQL. Remember, I got this particular database from Fabric when I looked at the gear here for my lakehouse…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Data warehouse or lakehouse2m 10s
-
(Locked)
Integrating Azure security and Fabric data security2m 32s
-
(Locked)
Implementing database security2m 31s
-
(Locked)
Data masking4m 16s
-
(Locked)
Improving query performance for lakehouses and warehouses3m 12s
-
(Locked)
Challenge: Implement data masking56s
-
(Locked)
Solution: Demonstrating data masking2m 15s
-
(Locked)
-
-
-