Voiced by Amazon Polly |
In this article, we will discuss how to secure your fabric data warehouse. Warehouse access and user permissions are controlled by a combination of granular SQL permissions and Microsoft Fabric permissions once linked. At the very least, you should have authorization to read Microsoft Fabric, which is necessary for warehouse connectivity. You can grant permissions for each Warehouse within a workspace to utilize Microsoft Fabric. It’s feasible to provide SQL permissions to a user via Microsoft Fabric item permissions, thus removing the need to grant access within SQL directly.
Freedom Month Sale — Upgrade Your Skills, Save Big!
- Up to 80% OFF AWS Courses
- Up to 30% OFF Microsoft Certs
Workspace Role
Within a fabric workspace, workspace roles are used to facilitate cooperation among development teams. The user’s actions are determined by their assigned role, which applies to every object in the workspace.
Workspace roles offer the following functionalities to each Warehouse and SQL analytics endpoint in the workspace:
- The Admin Role gives the user full read/write capabilities as well as the capacity to control specific user SQL permissions. Additionally, it Allows the user to see workspace-scoped sessions and monitor connections and requests in DMVs via TSQL and KILL sessions.
- Member Role gives the user full read/write capabilities as well as the capacity to control specific user SQL permissions.
- The contributor role enables the user to configure granular user SQL rights and receive complete read/write permissions.
- Viewer roll enables read-only and connects user access to all Warehouse and SQL analytics endpoints in the workspace.
Item Permission:
Item rights can be explicitly granted to specific Warehouses, as opposed to workspace roles, which apply to every item inside a workspace. The user will be granted access to that particular Warehouse. Enabling sharing for the Warehouse’s downstream consumption is the main goal of these rights.
SQL Granular Control:
A user can be easily granted granular access to the entire Warehouse with the help of workspace roles and item permissions. Nonetheless, there are situations when a user needs more specific access. Standard T-SQL constructs can be used to grant users specific permissions to accomplish this. For SQL analytics endpoint and Warehouse:
- Security can be managed using GRANT, REVOKE, and DENY T-SQL syntax at the object level.
- SQL roles, including both custom and pre-defined database roles, can be assigned to users.
- User can view their permission using the sys.fn_my_permissions function.
Example:
• Database scoped permissions:
SELECT * FROM sys.fn_my_permissions(NULL, 'Database');
• Schema scoped permissions:
SELECT * FROM sys.fn_my_permissions('', 'Schema');
Schema scoped permissions:
SELECT * FROM sys.fn_my_permissions('.', 'Object');
Freedom Month Sale — Discounts That Set You Free!
- Up to 80% OFF AWS Courses
- Up to 30% OFF Microsoft Certs
About CloudThat
CloudThat is an award-winning company and the first in India to offer cloud training and consulting services worldwide. As a Microsoft Solutions Partner, AWS Advanced Tier Training Partner, and Google Cloud Platform Partner, CloudThat has empowered over 850,000 professionals through 600+ cloud certifications winning global recognition for its training excellence including 20 MCT Trainers in Microsoft’s Global Top 100 and an impressive 12 awards in the last 8 years. CloudThat specializes in Cloud Migration, Data Platforms, DevOps, IoT, and cutting-edge technologies like Gen AI & AI/ML. It has delivered over 500 consulting projects for 250+ organizations in 30+ countries as it continues to empower professionals and enterprises to thrive in the digital-first world.

WRITTEN BY Pankaj Choudhary
Comments