From the course: Implementing Data Engineering Solutions Using Microsoft Fabric (DP-700) Cert Prep by Microsoft Press

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Configuring access controls for items

Configuring access controls for items

Configuring access controls for items. Now when we're looking at configuring security for individual items that are in workspaces, what we're actually looking to do is isolate permissions for specific items. As I said in the previous lesson, workspace permissions give you access to all items in the workspace. with varying different degrees of permissions dependent on the workspace role. What we're looking to do is set specific item permissions to allow users to view, modify and possibly manage and share individual items. So for example, if you don't give a user access to a workspace, you provide permissions by sharing an item with a user and this will then give that user access. If you share an item, it automatically grants the user the read permission for that item. And we'll see that later on in an example. And if we are giving users read permissions, then if they do have any access permissions on reports that are linked to the item, for example a lake house or a warehouse, they'll…

Contents