From the course: Advanced Microsoft Fabric Implementation and Governance
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
Integrating Azure security and Fabric data security
From the course: Advanced Microsoft Fabric Implementation and Governance
Integrating Azure security and Fabric data security
- [Instructor] Security permissions are similar for both Data Warehouses and Lakehouses. Permission to the data can be granted via a workspace, and you can grant access to a specific data lake or warehouse, individually, without workspace access. We can grant access within SQL management tools to objects like tables or views or stored procedures, and users can be denied access to specific columns, or we could implement role-level security or any combination of those. In addition, we could choose to mask personally identifiable data such as IDs or addresses to create user groups that contain a combination of these different items. Since the Lakehouse security is also file-based, there are some additional security methods available, including OneLake security methods which use role-based access security known as RBAC to limit users' access to the underlying data. Any RBAC is only possible for people with workspace viewer access, and this applies to Lakehouses, not warehouses. You can…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Data warehouse or lakehouse2m 10s
-
(Locked)
Integrating Azure security and Fabric data security2m 32s
-
(Locked)
Implementing database security2m 31s
-
(Locked)
Data masking4m 16s
-
(Locked)
Improving query performance for lakehouses and warehouses3m 12s
-
(Locked)
Challenge: Implement data masking56s
-
(Locked)
Solution: Demonstrating data masking2m 15s
-
(Locked)
-
-
-