Skip to content

Commit e4edba4

Browse files
authored
Merge pull request #50276 from theresa-i/secure-data-access-updates
Module refresh
2 parents 4586e2b + db72fb2 commit e4edba4

10 files changed

+7
-7
lines changed

learn-pr/wwl-data-ai/secure-data-access-in-fabric/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
Security in Microsoft Fabric is optimized for securing data for specific use cases. Different users need the ability to perform various actions in Fabric to fulfill their job responsibilities. Fabric facilitates this by allowing you to grant users access to specific data workloads through workspace and item permissions, compute permissions, and OneLake data access roles (Preview).
1+
Security in Microsoft Fabric is optimized for securing data for specific use cases. Different users need the ability to perform various actions in Fabric to fulfill their job responsibilities. Fabric facilitates this by allowing you to grant users access to specific data workloads through workspace and item permissions, compute permissions, and OneLake data access roles (preview).
22

33
## Secure data by use case
44

learn-pr/wwl-data-ai/secure-data-access-in-fabric/includes/2-understand-fabric-security-model.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,4 +22,4 @@ Within each data item, *granular engine permissions* such as Read, ReadData, or
2222

2323
Compute or granular permissions can be applied within a specific compute engine in Fabric, like the SQL Endpoint or semantic model.
2424

25-
Fabric data items store their data in OneLake. Access to data in the lakehouse can be restricted to specific files or folders using the role-based-access control (RBAC) feature called *OneLake data access controls (preview)*.
25+
Fabric data items store their data in OneLake. Access to data in the lakehouse can be restricted to specific files or folders using the role-based-access control (RBAC) feature called OneLake data access controls (preview).

learn-pr/wwl-data-ai/secure-data-access-in-fabric/includes/3-configure-workspace-and-item-permissions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To meet the access requirements for the new data engineer, you can assign them t
2727

2828
Users can be added to workspace roles from the **Manage access** button from within a workspace. Add a user by entering the user's name and selecting the workspace role to assign them in the **Add people** dialogue.
2929

30-
![Screenshot of clicking the manage access button.](../media/manage-access.png)
30+
:::image type="content" source="../media/manage-access.png" alt-text="Screenshot of clicking the manage access button." lightbox="../media/manage-access.png":::
3131

3232
## Configure item permissions
3333

@@ -39,11 +39,11 @@ Since the engineer no longer needs to view all items in the workspace, the **Con
3939

4040
An item can be shared and item permissions can be configured by selecting on the ellipsis (...) next to a Fabric item in a workspace and then selecting **Manage permissions**.
4141

42-
![Screenshot of configuring item permissions.](../media/manage-item-permissions.png)
42+
:::image type="content" source="../media/manage-item-permissions.png" alt-text="Screenshot of configuring item permissions. " lightbox="../media/manage-item-permissions.png":::
4343

4444
In the **Grant people access** window that appears after selecting **Manage permissions**, if you add the user and don't select any of the checkboxes under **Additional permissions**, the user will have read access to the lakehouse metadata. The user won't have access to the underlying data in the lakehouse. To grant the engineer the ability to read data and not just metadata, **Read all SQL endpoint data** or **Read all Apache Spark** can be selected.
4545

46-
![Screenshot of grant people lakehouse read all access.](../media/grant-people-access-lakehouse.png)
46+
:::image type="content" source="../media/grant-people-access-lakehouse.png" alt-text="Screenshot of grant people lakehouse read all access." lightbox="../media/grant-people-access-lakehouse.png":::
4747

4848
> [!Tip]
4949
> Each Fabric data item has its own security model. To learn more about permissions that can be granted when a lakehouse or other Fabric data item is shared see:

learn-pr/wwl-data-ai/secure-data-access-in-fabric/includes/4-apply-granular-permissions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,5 +65,5 @@ Granular permissions can be applied to warehouses using the SQL analytics endpoi
6565

6666
A user's role in a workspace implicitly grants them permission on the semantic models in a workspace. Semantic models allow for security to be defined using DAX. More granular permission can be applied using row-level security (RLS). To learn more about the managing RLS or permissions on the semantic model see:
6767

68-
[Semantic model permissions](/power-bi/connect-data/service-datasets-permissions?azure-portal=true)
69-
[Row-level security (RLS) with Power BI](/fabric/security/service-admin-row-level-security?azure-portal=true)
68+
- [Semantic model permissions](/power-bi/connect-data/service-datasets-permissions?azure-portal=true)
69+
- [Row-level security (RLS) with Power BI](/fabric/security/service-admin-row-level-security?azure-portal=true)
18.2 KB
Loading
14 KB
Loading
-13.1 KB
Loading
-54.6 KB
Loading
11.7 KB
Loading
13.3 KB
Loading

0 commit comments

Comments
 (0)