From the course: Advanced Microsoft Fabric Implementation and Governance

Unlock the full course today

Join today to access over 24,400 courses taught by industry experts.

Integrating Azure security and Fabric data security

Integrating Azure security and Fabric data security

From the course: Advanced Microsoft Fabric Implementation and Governance

Integrating Azure security and Fabric data security

- [Instructor] Security permissions are similar for both Data Warehouses and Lakehouses. Permission to the data can be granted via a workspace, and you can grant access to a specific data lake or warehouse, individually, without workspace access. We can grant access within SQL management tools to objects like tables or views or stored procedures, and users can be denied access to specific columns, or we could implement role-level security or any combination of those. In addition, we could choose to mask personally identifiable data such as IDs or addresses to create user groups that contain a combination of these different items. Since the Lakehouse security is also file-based, there are some additional security methods available, including OneLake security methods which use role-based access security known as RBAC to limit users' access to the underlying data. Any RBAC is only possible for people with workspace viewer access, and this applies to Lakehouses, not warehouses. You can…

Contents