How can I prohibit ordinary users to execute notebooks of shared folder in Azure Databricks?

Power BI Test User 2 0 Reputation points
2025-02-25T04:03:49.2733333+00:00

Hello,

How can I prohibit ordinary users to create, modify, and execute notebooks of shared folder in Azure Databricks?

For security reasons, I want to prevent ordinary users from accidentally sharing the results of SELECT sensitive data in the Shared folder.

Azure Databricks
Azure Databricks
An Apache Spark-based analytics platform optimized for Azure.
2,345 questions
{count} votes

1 answer

Sort by: Most helpful
  1. J N S S Kasyap 270 Reputation points Microsoft Vendor
    2025-02-25T05:00:18.06+00:00

    Hi @Power BI Test User 2

    Thank you for posting your query!

    To prohibit ordinary users from creating, modifying, and executing notebooks in a shared folder in Azure Databricks, you can use Access Control Lists (ACLs) to manage permissions. Here are the few options you can consider:

    In Azure Databricks, you can use access control lists (ACLs) to configure permission to access workspace objects such as notebooks and SQL Warehouses. All workspace admin users can manage access control lists, as can users who have been given delegated permissions to manage access control lists. For more information on access control lists, see Access control lists.

    Unity Catalog in Azure Databricks offers centralized data governance with fine-grained access control, enabling secure management of data assets, sensitive data, and notebooks across workspaces while ensuring compliance and auditing capabilities. This allows you to manage permissions on data objects more effectively.
    But to implement Access controls or Unity Catalog requires the **Premium plan
    Implement role-based access control (RBAC) through Microsoft Entra ID to manage user permissions at a broader level. This can help restrict access to the Databricks workspace itself

    Databricks also supports personal access tokens (PATs), Manage and monitor personal access tokens to ensure that only authorized users can access the Databricks workspace. Regularly review and revoke tokens that are no longer needed To monitor and manage PATs, see Monitor and revoke personal access tokens and Manage personal access token permissions.

    For more information you can refer below articles:

    https://learn.microsoft.com/en-us/azure/databricks/security/auth/
    https://learn.microsoft.com/en-us/azure/databricks/security/auth/access-control/
    https://learn.microsoft.com/en-us/azure/databricks/data-governance/
    https://kb.databricks.com/security/restricting-sensitive-data-in-the-workspace**
    Hope this helps. Do let us know if you any further queries.


    If this answers your query, do click Accept Answer and Yes for was this answer helpful. And, if you have any further query do let us know.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.