Voiced by Amazon Polly |
In this article, we will discuss how to secure your fabric data warehouse. Warehouse access and user permissions are controlled by a combination of granular SQL permissions and Microsoft Fabric permissions once linked. At the very least, you should have authorization to read Microsoft Fabric, which is necessary for warehouse connectivity. You can grant permissions for each Warehouse within a workspace to utilize Microsoft Fabric. It’s feasible to provide SQL permissions to a user via Microsoft Fabric item permissions, thus removing the need to grant access within SQL directly.
Customized Cloud Solutions to Drive your Business Success
- Cloud Migration
- Devops
- AIML & IoT
Workspace Role
Within a fabric workspace, workspace roles are used to facilitate cooperation among development teams. The user’s actions are determined by their assigned role, which applies to every object in the workspace.
Workspace roles offer the following functionalities to each Warehouse and SQL analytics endpoint in the workspace:
- The Admin Role gives the user full read/write capabilities as well as the capacity to control specific user SQL permissions. Additionally, it Allows the user to see workspace-scoped sessions and monitor connections and requests in DMVs via TSQL and KILL sessions.
- Member Role gives the user full read/write capabilities as well as the capacity to control specific user SQL permissions.
- The contributor role enables the user to configure granular user SQL rights and receive complete read/write permissions.
- Viewer roll enables read-only and connects user access to all Warehouse and SQL analytics endpoints in the workspace.
Item Permission:
Item rights can be explicitly granted to specific Warehouses, as opposed to workspace roles, which apply to every item inside a workspace. The user will be granted access to that particular Warehouse. Enabling sharing for the Warehouse’s downstream consumption is the main goal of these rights.
SQL Granular Control:
A user can be easily granted granular access to the entire Warehouse with the help of workspace roles and item permissions. Nonetheless, there are situations when a user needs more specific access. Standard T-SQL constructs can be used to grant users specific permissions to accomplish this. For SQL analytics endpoint and Warehouse:
- Security can be managed using GRANT, REVOKE, and DENY T-SQL syntax at the object level.
- SQL roles, including both custom and pre-defined database roles, can be assigned to users.
- User can view their permission using the sys.fn_my_permissions function.
Example:
• Database scoped permissions:
SELECT * FROM sys.fn_my_permissions(NULL, 'Database');
• Schema scoped permissions:
SELECT * FROM sys.fn_my_permissions('', 'Schema');
Schema scoped permissions:
SELECT * FROM sys.fn_my_permissions('.', 'Object');
Get your new hires billable within 1-60 days. Experience our Capability Development Framework today.
- Cloud Training
- Customized Training
- Experiential Learning
About CloudThat
Established in 2012, CloudThat is a leading Cloud Training and Cloud Consulting services provider in India, USA, Asia, Europe, and Africa. Being a pioneer in the cloud domain, CloudThat has special expertise in catering to mid-market and enterprise clients from all the major cloud service providers like AWS, Microsoft, GCP, VMware, Databricks, HP, and more. Uniquely positioned to be a single source for both training and consulting for cloud technologies like Cloud Migration, Data Platforms, DevOps, IoT, and the latest technologies like AI/ML, it is a top-tier partner with AWS and Microsoft, winning more than 8 awards combined in 11 years. Recently, it was recognized as the ‘Think Big’ partner from AWS and won the Microsoft Superstars FY 2023 award in Asia & India. Leveraging its position as a leader in the market, CloudThat has trained 650k+ professionals in 500+ cloud certifications and delivered 300+ consulting projects for 100+ corporates in 28+ countries.
WRITTEN BY Pankaj Choudhary
Click to Comment