Skip to content

Commit 3959b1f

Browse files
authored
Merge pull request #295136 from whhender/February-Freshness-2025
February freshness 2025 - part 1
2 parents 849d174 + 42d62a1 commit 3959b1f

File tree

6 files changed

+41
-41
lines changed

6 files changed

+41
-41
lines changed

articles/synapse-analytics/security/how-to-manage-synapse-rbac-role-assignments.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: meenalsri
55
ms.service: azure-synapse-analytics
66
ms.topic: how-to
77
ms.subservice: security
8-
ms.date: 3/7/2022
8+
ms.date: 02/18/2025
99
ms.author: mesrivas
1010
ms.reviewer: whhender, wiassaf
1111
---
@@ -20,23 +20,23 @@ This article shows how to add and delete Synapse RBAC role assignments.
2020
>- To manage Synapse RBAC role assignments you need to have the Synapse Administrator role on the workspace or at a lower-level scope that includes the objects you want to manage. If you are a Synapse Administrator on the workspace you can grant access to all objects in the workspace.
2121
>- **Guest users** from a different AD tenant can also see and manage role assignments after being assigned the Synapse Administrator role.
2222
>- To help you regain access to a workspace in the event that no Synapse Administrators are assigned or available to you, users with permissions to manage **Azure RBAC** role assignments on the workspace can also manage **Synapse RBAC** role assignments, allowing the addition of Synapse Administrator or other Synapse role assignments.
23-
>- Access to SQL pools is managed using SQL permissions. With the exception of the Synapse Administrator and Synapse SQL Administrator roles, Synapse RBAC roles do not grant access to SQL pools.
23+
>- Access to SQL pools is managed using SQL permissions. With the exception of the Synapse Administrator and Synapse SQL Administrator roles, Synapse RBAC roles do not grant access to SQL pools.
2424
2525
>[!important]
2626
>- Changes made to Synapse RBAC role assignments may take 2-5 minutes to take effect.
27-
>- If you are managing Synapse RBAC permissions by modifying membership of security groups, then changes to membership are managed using Microsoft Entra ID. Changes to group memberships may take 10-15 minutes or longer to take effect.
27+
>- If you are managing Synapse RBAC permissions by modifying membership of security groups, then changes to membership are managed using Microsoft Entra ID. Changes to group memberships may take 10-15 minutes or longer to take effect.
2828
2929
## Open Synapse Studio
3030

3131
To assign a role to a user, group, service principal, or managed identity, first [open the Synapse Studio](https://web.azuresynapse.net/) and log into your workspace.
3232

33-
![Log in to workspace](./media/common/login-workspace.png)
34-
35-
Once you've opened your workspace, expand the **Security** section on the left and select **Access control**.
33+
![Log in to workspace](./media/common/login-workspace.png)
34+
35+
In your workspace, expand the **Security** section on the left and select **Access control**.
3636

3737
![Select Access Control in Security section on left](./media/how-to-manage-synapse-rbac-role-assignments/left-nav-security-access-control.png)
3838

39-
The Access control screen lists current role assignments. You can filter the list by principal name or email, and selectively filter the object types, roles, or scopes included. From this screen, you can add or remove role assignments.
39+
The Access control screen lists current role assignments. You can filter the list by principal name or email, and selectively filter the object types, roles, or scopes included. From this screen, you can add or remove role assignments.
4040

4141
## Add a Synapse role assignment
4242

@@ -48,32 +48,32 @@ On the Add role assignment tab, you can create role assignments at workspace sco
4848

4949
## Add workspace-scoped role assignment
5050

51-
First, select **Workspace** as the scope, then select the **Synapse RBAC role**. Select the **principal(s)** to be assigned the role, then create the role assignment(s).
51+
First, select **Workspace** as the scope, then select the **Synapse RBAC role**. Select the **principal(s)** to be assigned the role, then create the role assignment(s).
5252

5353
![Add workspace role assignment - select role](./media/how-to-manage-synapse-rbac-role-assignments/access-control-workspace-role-assignment.png)
5454

5555
The assigned role will apply for all applicable objects in the workspace.
5656

5757
## Add workspace item-scoped role assignment
5858

59-
To assign a role at a finer-grained scope, select **Workspace item** as the scope, then select the scoping **Item type**.
59+
To assign a role at a finer-grained scope, select **Workspace item** as the scope, then select the scoping **Item type**.
6060

6161
![Add workspace item role assignment - select item type](./media/how-to-manage-synapse-rbac-role-assignments/access-control-add-workspace-item-assignment-select-item-type.png)
6262

63-
Select the specific **item** to be used as the scope, then select the **role** to be assigned from the drop-down. The drop-down lists only those roles that are valid for the selected item type. [Learn more](./synapse-workspace-synapse-rbac.md).
63+
Select the specific **item** to be used as the scope, then select the **role** to be assigned from the drop-down. The drop-down lists only those roles that are valid for the selected item type. [Learn more](./synapse-workspace-synapse-rbac.md).
6464

6565
![Add workspace item role assignment - select role](./media/how-to-manage-synapse-rbac-role-assignments/access-control-add-workspace-item-assignment-select-role.png)
6666

67-
Then **select the principal(s)** to which the role is to be assigned. You can iteratively select multiple principals. Select **Apply** to create the role assignment(s).
67+
Then **select the principal(s)** to which the role is to be assigned. You can iteratively select multiple principals. Select **Apply** to create the role assignment(s).
6868

6969
## Remove a Synapse RBAC role assignment
7070

71-
To revoke Synapse RBAC access, you remove the appropriate role assignments. On the Access control screen, use the filters to locate the role assignment(s) to be removed. Check the role assignments and then select **Remove access**.
71+
To revoke Synapse RBAC access, you remove the appropriate role assignments. On the Access control screen, use the filters to locate the role assignment(s) to be removed. Check the role assignments and then select **Remove access**.
7272

7373
![Delete a role assignment to remove access](./media/how-to-manage-synapse-rbac-role-assignments/access-control-remove-access.png)
7474

75-
Remember that changes to role assignments will take 2-5 minutes to take effect.
75+
Remember that changes to role assignments will take 2-5 minutes to take effect.
7676

77-
## Next steps
77+
## Related content
7878

79-
[Understand the Synapse RBAC roles required to perform common tasks](./synapse-workspace-understand-what-role-you-need.md)
79+
[Understand the Synapse RBAC roles required to perform common tasks](./synapse-workspace-understand-what-role-you-need.md).
-9.15 KB
Loading
Loading

articles/synapse-analytics/security/synapse-workspace-synapse-rbac.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: Azure Synapse role-based access control
33
description: An article that explains role-based access control in Azure Synapse Analytics
44
author: meenalsri
55
ms.service: azure-synapse-analytics
6-
ms.topic: conceptual
6+
ms.topic: concept-article
77
ms.subservice: security
8-
ms.date: 3/07/2022
8+
ms.date: 02/18/2025
99
ms.author: mesrivas
1010
ms.reviewer: whhender, wiassaf
1111
---
@@ -19,7 +19,7 @@ Synapse RBAC is used to manage who can:
1919
- Publish code artifacts and list or access published code artifacts,
2020
- Execute code on Apaches Spark pools and Integration runtimes,
2121
- Access linked (data) services protected by credentials
22-
- Monitor or cancel job execution, review job output, and execution logs.
22+
- Monitor or cancel job execution, review job output, and execution logs.
2323

2424
>[!Note]
2525
>While Synapse RBAC is used to manage access to published SQL scripts, it provides only limited access control to serverless and dedicated SQL pools. Access to SQL pools is primarily controlled using SQL security.
@@ -30,10 +30,10 @@ Here are some examples of what you can do with Synapse RBAC:
3030
- Allow a user to publish changes made to Apache Spark notebooks and jobs to the live service.
3131
- Allow a user to run and cancel notebooks and spark jobs on a specific Apache Spark pool.
3232
- Allow a user to use specific credentials so they can run pipelines secured by the workspace system identity and access data in linked services secured with credentials.
33-
- Allow an administrator to manage, monitor, and cancel job execution on specific Spark Pools.
33+
- Allow an administrator to manage, monitor, and cancel job execution on specific Spark Pools.
3434

3535
## How Synapse RBAC works
36-
Like Azure RBAC, Synapse RBAC works by creating role assignments. A role assignment consists of three elements: a security principal, a role definition, and a scope.
36+
Like Azure RBAC, Synapse RBAC works by creating role assignments. A role assignment consists of three elements: a security principal, a role definition, and a scope.
3737

3838
### Security Principals
3939

@@ -47,13 +47,13 @@ Synapse provides built-in roles that define collections of actions that match th
4747
- Administrators can get full access to create and configure a workspace
4848
- Developers can create, update and debug SQL scripts, notebooks, pipelines, and dataflows, but not be able to publish or execute this code on production compute resources/data
4949
- Operators can monitor and manage system status, application execution and review logs, without access to code or the outputs from execution.
50-
- Security staff can manage and configure endpoints without having access to code, compute resources or data.
50+
- Security staff can manage and configure endpoints without having access to code, compute resources, or data.
5151

5252
[Learn more](./synapse-workspace-synapse-rbac-roles.md) about the built-in Synapse roles.
5353

5454
### Scopes
5555

56-
A _scope_ defines the resources or artifacts that the access applies to. Azure Synapse supports hierarchical scopes. Permissions granted at a higher-level scope are inherited by objects at a lower level. In Synapse RBAC, the top-level scope is a workspace. Assigning a role with workspace scope grants permissions to all applicable objects in the workspace.
56+
A _scope_ defines the resources or artifacts that the access applies to. Azure Synapse supports hierarchical scopes. Permissions granted at a higher-level scope are inherited by objects at a lower level. In Synapse RBAC, the top-level scope is a workspace. Assigning a role with workspace scope grants permissions to all applicable objects in the workspace.
5757

5858
Current supported scopes within a workspace are:
5959

@@ -62,23 +62,23 @@ Current supported scopes within a workspace are:
6262
- linked service
6363
- credential
6464

65-
Access to code artifacts is granted with workspace scope. Granting access to collections of artifacts within a workspace will be supported in a later release.
65+
Access to code artifacts is granted with workspace scope. Granting access to collections of artifacts within a workspace will be supported in a later release.
6666

6767
## Resolving role assignments to determine permissions
6868

6969
A role assignment grants a principal the permissions defined by the role at the specified scope.
7070

71-
Synapse RBAC is an additive model like Azure RBAC. Multiple roles may be assigned to a single principal and at different scopes. When computing the permissions of a security principal, the system considers all roles assigned to the principal and to groups that directly or indirectly include the principal. It also considers the scope of each assignment in determining the permissions that apply.
71+
Synapse RBAC is an additive model like Azure RBAC. Multiple roles may be assigned to a single principal and at different scopes. When computing the permissions of a security principal, the system considers all roles assigned to the principal and to groups that directly or indirectly include the principal. It also considers the scope of each assignment in determining the permissions that apply.
7272

7373
## Enforcing assigned permissions
7474

7575
In Synapse Studio, specific buttons or options may be grayed out or a permissions error may be returned when attempting an action if you don't have the required permissions.
7676

77-
If a button or option is disabled, hovering over the button or option shows a tooltip with the required permission. Contact a Synapse Administrator to assign a role that grants the required permission. You can see the roles that provide specific actions, see [Synapse RBAC Roles](./synapse-workspace-synapse-rbac-roles.md).
77+
If a button or option is disabled, hovering over the button or option shows a tooltip with the required permission. Contact a Synapse Administrator to assign a role that grants the required permission. You can see the roles that provide specific actions, see [Synapse RBAC Roles](./synapse-workspace-synapse-rbac-roles.md).
7878

7979
## Who can assign Synapse RBAC roles?
8080

81-
Synapse Administrators can assign Synapse RBAC roles. A Synapse Administrator at the workspace level can grant access at any scope. A Synapse Administrator at a lower-level scope can only grant access at that scope.
81+
Synapse Administrators can assign Synapse RBAC roles. A Synapse Administrator at the workspace level can grant access at any scope. A Synapse Administrator at a lower-level scope can only grant access at that scope.
8282

8383
When a new workspace is created, the creator is automatically given the Synapse Administrator role at workspace scope.
8484

@@ -88,10 +88,10 @@ To help you regain access to a workspace in the event that no Synapse Administra
8888

8989
Synapse RBAC is managed from within Synapse Studio using the access control tools in the **Manage** hub.
9090

91-
## Next steps
91+
## Related content
9292

9393
Understand the built-in [Synapse RBAC roles](./synapse-workspace-synapse-rbac-roles.md).
9494

9595
Learn [how to review Synapse RBAC role assignments](./how-to-review-synapse-rbac-role-assignments.md) for a workspace.
9696

97-
Learn [how to assign Synapse RBAC roles](./how-to-manage-synapse-rbac-role-assignments.md)
97+
Learn [how to assign Synapse RBAC roles](./how-to-manage-synapse-rbac-role-assignments.md).

articles/synapse-analytics/sql-data-warehouse/sql-data-warehouse-table-constraints.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ description: Table constraints support using dedicated SQL pool in Azure Synapse
44
author: mstehrani
55
ms.author: emtehran
66
ms.reviewer: nibruno; wiassaf
7-
ms.date: 09/05/2019
7+
ms.date: 02/21/2025
88
ms.service: azure-synapse-analytics
99
ms.subservice: sql-dw
10-
ms.topic: conceptual
10+
ms.topic: concept-article
1111
ms.custom:
1212
- azure-synapse
1313
---
@@ -19,23 +19,23 @@ Learn about table constraints in dedicated SQL pool, including primary key, fore
1919
## Table constraints
2020

2121
Dedicated SQL pool supports these table constraints:
22-
- PRIMARY KEY is only supported when NONCLUSTERED and NOT ENFORCED are both used.
22+
- PRIMARY KEY is only supported when NONCLUSTERED and NOT ENFORCED are both used.
2323
- UNIQUE constraint is only supported when NOT ENFORCED is used.
2424

2525
For syntax, check [ALTER TABLE](/sql/t-sql/statements/alter-table-transact-sql) and [CREATE TABLE](/sql/t-sql/statements/create-table-azure-sql-data-warehouse).
2626

27-
FOREIGN KEY constraint is not supported in dedicated SQL pool.
27+
FOREIGN KEY constraint isn't supported in dedicated SQL pool.
2828

2929

3030
## Remarks
3131

32-
Having primary key and/or unique key allows dedicated SQL pool engine to generate an optimal execution plan for a query. All values in a primary key column or a unique constraint column should be unique.
32+
Having primary key and/or unique key allows dedicated SQL pool engine to generate an optimal execution plan for a query. All values in a primary key column or a unique constraint column should be unique.
3333

3434
> [!IMPORTANT]
3535
> After creating a table with primary key or unique constraint in dedicated SQL pool, users need to make sure all values in those columns are unique.
3636
> A violation of that may cause the query to return inaccurate result.
3737
38-
This example shows how a query may return inaccurate result if the primary key or unique constraint column includes duplicate values.
38+
This example shows how a query may return inaccurate result if the primary key or unique constraint column includes duplicate values.
3939

4040
```sql
4141
-- Create table t1
@@ -48,7 +48,7 @@ INSERT INTO t1 VALUES (2, 200)
4848
INSERT INTO t1 VALUES (3, 300)
4949
INSERT INTO t1 VALUES (4, 400)
5050

51-
-- Run this query. No primary key or unique constraint. 4 rows returned. Correct result.
51+
-- Run this query. No primary key or unique constraint. 4 rows returned. Correct result.
5252
SELECT a1, COUNT(*) AS total FROM t1 GROUP BY a1
5353

5454
/*
@@ -65,7 +65,7 @@ a1 total
6565
-- Add unique constraint
6666
ALTER TABLE t1 ADD CONSTRAINT unique_t1_a1 unique (a1) NOT ENFORCED
6767

68-
-- Re-run this query. 5 rows returned. Incorrect result.
68+
-- Re-run this query. 5 rows returned. Incorrect result.
6969
SELECT a1, count(*) AS total FROM t1 GROUP BY a1
7070

7171
/*
@@ -86,7 +86,7 @@ ALTER TABLE t1 DROP CONSTRAINT unique_t1_a1
8686
-- Add primary key constraint
8787
ALTER TABLE t1 add CONSTRAINT PK_t1_a1 PRIMARY KEY NONCLUSTERED (a1) NOT ENFORCED
8888

89-
-- Re-run this query. 5 rows returned. Incorrect result.
89+
-- Re-run this query. 5 rows returned. Incorrect result.
9090
SELECT a1, COUNT(*) AS total FROM t1 GROUP BY a1
9191

9292
/*
@@ -122,7 +122,7 @@ a1 b1
122122
-- Add unique constraint
123123
ALTER TABLE t1 add CONSTRAINT unique_t1_a1 UNIQUE (a1) NOT ENFORCED
124124

125-
-- Re-run this query. 5 rows returned. Correct result.
125+
-- Re-run this query. 5 rows returned. Correct result.
126126
SELECT a1, COUNT(*) as total FROM t1 GROUP BY a1
127127

128128
/*
@@ -143,7 +143,7 @@ ALTER TABLE t1 DROP CONSTRAINT unique_t1_a1
143143
-- Add primary key constraint
144144
ALTER TABLE t1 ADD CONSTRAINT PK_t1_a1 PRIMARY KEY NONCLUSTERED (a1) NOT ENFORCED
145145

146-
-- Re-run this query. 5 rows returned. Correct result.
146+
-- Re-run this query. 5 rows returned. Correct result.
147147
SELECT a1, COUNT(*) AS total FROM t1 GROUP BY a1
148148

149149
/*
@@ -174,6 +174,6 @@ Create a dedicated SQL pool table with a unique constraint:
174174
CREATE TABLE t6 (c1 INT UNIQUE NOT ENFORCED, c2 INT);
175175
```
176176

177-
## Next steps
177+
## Related content
178178

179179
After creating the tables for your dedicated SQL pool, the next step is to load data into the table. For a loading tutorial, see [Loading data to dedicated SQL pool](load-data-wideworldimportersdw.md).

articles/synapse-analytics/sql/best-practices-dedicated-sql-pool.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Best practices for dedicated SQL pools
33
description: Recommendations and best practices you should know as you work with dedicated SQL pools.
44
author: WilliamDAssafMSFT
55
ms.author: wiassaf
6-
ms.date: 09/22/2022
6+
ms.date: 02/18/2025
77
ms.service: azure-synapse-analytics
88
ms.subservice: sql
99
ms.topic: concept-article

0 commit comments

Comments
 (0)