Skip to content

Commit fc27530

Browse files
committed
Format and acrolinx updates
1 parent be549da commit fc27530

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/synapse-analytics/security/synapse-workspace-synapse-rbac.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: Azure Synapse role-based access control
33
description: An article that explains role-based access control in Azure Synapse Analytics
44
author: meenalsri
55
ms.service: azure-synapse-analytics
6-
ms.topic: conceptual
6+
ms.topic: concept-article
77
ms.subservice: security
8-
ms.date: 3/07/2022
8+
ms.date: 02/18/2025
99
ms.author: mesrivas
1010
ms.reviewer: whhender, wiassaf
1111
---
@@ -19,7 +19,7 @@ Synapse RBAC is used to manage who can:
1919
- Publish code artifacts and list or access published code artifacts,
2020
- Execute code on Apaches Spark pools and Integration runtimes,
2121
- Access linked (data) services protected by credentials
22-
- Monitor or cancel job execution, review job output, and execution logs.
22+
- Monitor or cancel job execution, review job output, and execution logs.
2323

2424
>[!Note]
2525
>While Synapse RBAC is used to manage access to published SQL scripts, it provides only limited access control to serverless and dedicated SQL pools. Access to SQL pools is primarily controlled using SQL security.
@@ -30,10 +30,10 @@ Here are some examples of what you can do with Synapse RBAC:
3030
- Allow a user to publish changes made to Apache Spark notebooks and jobs to the live service.
3131
- Allow a user to run and cancel notebooks and spark jobs on a specific Apache Spark pool.
3232
- Allow a user to use specific credentials so they can run pipelines secured by the workspace system identity and access data in linked services secured with credentials.
33-
- Allow an administrator to manage, monitor, and cancel job execution on specific Spark Pools.
33+
- Allow an administrator to manage, monitor, and cancel job execution on specific Spark Pools.
3434

3535
## How Synapse RBAC works
36-
Like Azure RBAC, Synapse RBAC works by creating role assignments. A role assignment consists of three elements: a security principal, a role definition, and a scope.
36+
Like Azure RBAC, Synapse RBAC works by creating role assignments. A role assignment consists of three elements: a security principal, a role definition, and a scope.
3737

3838
### Security Principals
3939

@@ -47,13 +47,13 @@ Synapse provides built-in roles that define collections of actions that match th
4747
- Administrators can get full access to create and configure a workspace
4848
- Developers can create, update and debug SQL scripts, notebooks, pipelines, and dataflows, but not be able to publish or execute this code on production compute resources/data
4949
- Operators can monitor and manage system status, application execution and review logs, without access to code or the outputs from execution.
50-
- Security staff can manage and configure endpoints without having access to code, compute resources or data.
50+
- Security staff can manage and configure endpoints without having access to code, compute resources, or data.
5151

5252
[Learn more](./synapse-workspace-synapse-rbac-roles.md) about the built-in Synapse roles.
5353

5454
### Scopes
5555

56-
A _scope_ defines the resources or artifacts that the access applies to. Azure Synapse supports hierarchical scopes. Permissions granted at a higher-level scope are inherited by objects at a lower level. In Synapse RBAC, the top-level scope is a workspace. Assigning a role with workspace scope grants permissions to all applicable objects in the workspace.
56+
A _scope_ defines the resources or artifacts that the access applies to. Azure Synapse supports hierarchical scopes. Permissions granted at a higher-level scope are inherited by objects at a lower level. In Synapse RBAC, the top-level scope is a workspace. Assigning a role with workspace scope grants permissions to all applicable objects in the workspace.
5757

5858
Current supported scopes within a workspace are:
5959

@@ -62,23 +62,23 @@ Current supported scopes within a workspace are:
6262
- linked service
6363
- credential
6464

65-
Access to code artifacts is granted with workspace scope. Granting access to collections of artifacts within a workspace will be supported in a later release.
65+
Access to code artifacts is granted with workspace scope. Granting access to collections of artifacts within a workspace will be supported in a later release.
6666

6767
## Resolving role assignments to determine permissions
6868

6969
A role assignment grants a principal the permissions defined by the role at the specified scope.
7070

71-
Synapse RBAC is an additive model like Azure RBAC. Multiple roles may be assigned to a single principal and at different scopes. When computing the permissions of a security principal, the system considers all roles assigned to the principal and to groups that directly or indirectly include the principal. It also considers the scope of each assignment in determining the permissions that apply.
71+
Synapse RBAC is an additive model like Azure RBAC. Multiple roles may be assigned to a single principal and at different scopes. When computing the permissions of a security principal, the system considers all roles assigned to the principal and to groups that directly or indirectly include the principal. It also considers the scope of each assignment in determining the permissions that apply.
7272

7373
## Enforcing assigned permissions
7474

7575
In Synapse Studio, specific buttons or options may be grayed out or a permissions error may be returned when attempting an action if you don't have the required permissions.
7676

77-
If a button or option is disabled, hovering over the button or option shows a tooltip with the required permission. Contact a Synapse Administrator to assign a role that grants the required permission. You can see the roles that provide specific actions, see [Synapse RBAC Roles](./synapse-workspace-synapse-rbac-roles.md).
77+
If a button or option is disabled, hovering over the button or option shows a tooltip with the required permission. Contact a Synapse Administrator to assign a role that grants the required permission. You can see the roles that provide specific actions, see [Synapse RBAC Roles](./synapse-workspace-synapse-rbac-roles.md).
7878

7979
## Who can assign Synapse RBAC roles?
8080

81-
Synapse Administrators can assign Synapse RBAC roles. A Synapse Administrator at the workspace level can grant access at any scope. A Synapse Administrator at a lower-level scope can only grant access at that scope.
81+
Synapse Administrators can assign Synapse RBAC roles. A Synapse Administrator at the workspace level can grant access at any scope. A Synapse Administrator at a lower-level scope can only grant access at that scope.
8282

8383
When a new workspace is created, the creator is automatically given the Synapse Administrator role at workspace scope.
8484

@@ -88,10 +88,10 @@ To help you regain access to a workspace in the event that no Synapse Administra
8888

8989
Synapse RBAC is managed from within Synapse Studio using the access control tools in the **Manage** hub.
9090

91-
## Next steps
91+
## Related content
9292

9393
Understand the built-in [Synapse RBAC roles](./synapse-workspace-synapse-rbac-roles.md).
9494

9595
Learn [how to review Synapse RBAC role assignments](./how-to-review-synapse-rbac-role-assignments.md) for a workspace.
9696

97-
Learn [how to assign Synapse RBAC roles](./how-to-manage-synapse-rbac-role-assignments.md)
97+
Learn [how to assign Synapse RBAC roles](./how-to-manage-synapse-rbac-role-assignments.md).

0 commit comments

Comments
 (0)