Access control lists

This article describes details about the permissions available for the different workspace objects.

Note

Access control requires the Premium plan.

Access control settings are disabled by default on workspaces that are upgraded from the Standard plan to the Premium plan. Once an access control setting is enabled, it can not be disabled. For more information, see Access controls lists can be enabled on upgraded workspaces.

Access control lists overview

In Azure Databricks, you can use access control lists (ACLs) to configure permission to access workspace level objects. Workspace admins have the CAN MANAGE permission on all objects in their workspace, which gives them the ability to manage permissions on all objects in their workspaces. Users automatically have the CAN MANAGE permission for objects that they create.

For an example of how to map typical personas to workspace-level permissions, see the Proposal for Getting Started With Databricks Groups and Permissions.

Manage access control lists with folders

You can manage workspace object permissions by adding objects to folders. Objects in a folder inherit all permissions settings of that folder. For example, a user that has the CAN RUN permission on a folder has CAN RUN permission on the alerts in that folder.

If you grant a user access to an object inside the folder, they can view the parent folder's name, even if they do not have permissions on the parent folder. For example, a notebook named test1.py is in a folder named Workflows. If you grant a user CAN READ on test1.py and no permissions on Workflows, the user can see that the parent folder is named Workflows. The user cannot view or access any other objects in the Workflows folder unless they have been granted permissions on them.

To learn about organizing objects into folders, see Workspace browser.

AI/BI dashboard ACLs

Ability NO PERMISSIONS CAN VIEW/CAN RUN CAN EDIT CAN MANAGE
View dashboard and results x x x
Interact with widgets x x x
Refresh the dashboard x x x
Edit dashboard x x
Clone dashboard x x x
Publish dashboard snapshot x x
Modify permissions x
Delete dashboard x

Alerts ACLs

Ability NO PERMISSIONS CAN RUN CAN MANAGE
See in alert list x x
View alert and result x x
Manually trigger alert run x x
Subscribe to notifications x x
Edit alert x
Modify permissions x
Delete alert x

Compute ACLs

Important

Users with CAN ATTACH TO permissions can view the service account keys in the log4j file. Use caution when granting this permission level.

Ability NO PERMISSIONS CAN ATTACH TO CAN RESTART CAN MANAGE
Attach notebook to compute x x x
View Spark UI x x x
View compute metrics x x x
Terminate compute x x
Start and restart compute x x
View driver logs x (see note)
Edit compute x
Attach library to compute x
Resize compute x
Modify permissions x

Note

Secrets are not redacted from a cluster's Spark driver log stdout and stderr streams. To protect sensitive data, by default, Spark driver logs are viewable only by users with CAN MANAGE permission on job, single user access mode, and shared access mode clusters. To allow users with CAN ATTACH TO or CAN RESTART permission to view the logs on these clusters, set the following Spark configuration property in the cluster configuration: spark.databricks.acl.needAdminPermissionToViewLogs false.

On No Isolation Shared access mode clusters, the Spark driver logs can be viewed by users with CAN ATTACH TO or CAN MANAGE permission. To limit who can read the logs to only users with the CAN MANAGE permission, set spark.databricks.acl.needAdminPermissionToViewLogs to true.

See Spark configuration to learn how to add Spark properties to a cluster configuration.

Legacy dashboard ACLs

Ability NO PERMISSIONS CAN VIEW CAN RUN CAN EDIT CAN MANAGE
See in dashboard list x x x x
View dashboard and results x x x x
Refresh query results in the dashboard (or choose different parameters) x x x
Edit dashboard x x
Modify permissions x
Delete dashboard x

Editing a legacy dashboard requires the Run as viewer sharing setting. See Refresh behavior and execution context.

Delta Live Tables pipeline ACLs

Ability NO PERMISSIONS CAN VIEW CAN RUN CAN MANAGE IS OWNER
View pipeline details and list pipeline x x x x
View Spark UI and driver logs x x x x
Start and stop a pipeline update x x x
Stop pipeline clusters directly x x x
Edit pipeline settings x x
Delete the pipeline x x
Purge runs and experiments x x
Modify permissions x x

Feature tables ACLs

This table describes how to control access to feature tables in workspaces that are not enabled for Unity Catalog. If your workspace is enabled for Unity Catalog, use Unity Catalog privileges instead.

Note

Ability CAN VIEW METADATA CAN EDIT METADATA CAN MANAGE
Read feature table X X X
Search feature table X X X
Publish feature table to online store X X X
Write features to feature table X X
Update description of feature table X X
Modify permissions X
Delete feature table X

File ACLs

Ability NO PERMISSIONS CAN READ CAN RUN CAN EDIT CAN MANAGE
Read file x x x x
Comment x x x x
Attach and detach file x x x
Run file interactively x x x
Edit file x x
Modify permissions x

Folder ACLs

Ability NO PERMISSIONS CAN READ CAN EDIT CAN RUN CAN MANAGE
List objects in folder x x x x x
View objects in folder x x x x
Clone and export items x x x
Run objects in the folder x x
Create, import, and delete items x
Move and rename items x
Modify permissions x

Genie space ACLs

Ability NO PERMISSIONS CAN VIEW/CAN RUN CAN EDIT CAN MANAGE
See in Genie space list x x x x
Ask Genie questions x x x
Provide response feedback x x x
Add or edit Genie instructions x x
Add or edit sample questions x x
Add or remove included tables x x
Monitor a space x
Modify permissions x
Delete space x
View other users' conversations x

Git folder ACLs

Ability NO PERMISSIONS CAN READ CAN RUN CAN EDIT CAN MANAGE
List assets in a folder x x x x x
View assets in a folder x x x x
Clone and export assets x x x x
Run executable assets in folder x x x
Edit and rename assets in a folder x x
Create a branch in a folder x
Pull or push a branch into a folder x
Create, import, delete, and move assets x
Modify permissions x

Job ACLs

Ability NO PERMISSIONS CAN VIEW CAN MANAGE RUN IS OWNER CAN MANAGE
View job details and settings x x x x
View results x x x x
View Spark UI, logs of a job run x x x
Run now x x x
Cancel run x x x
Edit job settings x x
Delete job x x
Modify permissions x x

MLflow experiment ACLs

Ability NO PERMISSIONS CAN READ CAN EDIT CAN MANAGE
View run info search compare runs x x x
View, list, and download run artifacts x x x
Create, delete, and restore runs x x
Log run params, metrics, tags x x
Log run artifacts x x
Edit experiment tags x x
Purge runs and experiments x
Modify permissions x

MLflow model ACLs

This table describes how to control access to registered models in workspaces that are not enabled for Unity Catalog. If your workspace is enabled for Unity Catalog, use Unity Catalog privileges instead.

Ability NO PERMISSIONS CAN READ CAN EDIT CAN MANAGE STAGING VERSIONS CAN MANAGE PRODUCTION VERSIONS CAN MANAGE
View model details, versions, stage transition requests, activities, and artifact download URIs x x x x x
Request a model version stage transition x x x x x
Add a version to a model x x x x
Update model and version description x x x x
Add or edit tags x x x x
Transition model version between stages x x x
Approve a transition request x x x
Cancel a transition request x
Rename model x
Modify permissions x
Delete model and model versions x

Notebook ACLs

Ability NO PERMISSIONS CAN READ CAN RUN CAN EDIT CAN MANAGE
View cells x x x x
Comment x x x x
Run via %run or notebook workflows x x x x
Attach and detach notebooks x x x
Run commands x x x
Edit cells x x
Modify permissions x

Pool ACLs

Ability NO PERMISSIONS CAN ATTACH TO CAN MANAGE
Attach cluster to pool x x
Delete pool x
Edit pool x
Modify permissions x

Query ACLs

Ability NO PERMISSIONS CAN VIEW CAN RUN CAN EDIT CAN MANAGE
View own queries x x x x
See in query list x x x x
View query text x x x x
View query result x x x x
Refresh query result (or choose different parameters) x x x
Include the query in a dashboard x x x
Edit query text x x
Change SQL warehouse or data source x
Modify permissions x
Delete query x

Secret ACLs

Ability READ WRITE MANAGE
Read the secret scope x x x
List secrets in the scope x x x
Write to the secret scope x x
Modify permissions x

Serving endpoint ACLs

Ability NO PERMISSIONS CAN VIEW CAN QUERY CAN MANAGE
Get endpoint x x x
List endpoint x x x
Query endpoint x x
Update endpoint config x
Delete endpoint x
Modify permissions x

SQL warehouse ACLs

Ability NO PERMISSIONS CAN USE CAN MONITOR IS OWNER CAN MANAGE
Start the warehouse x x x x
View warehouse details x x x x
View warehouse queries x x x
Run queries x x x x
View warehouse monitoring tab x x x
Stop the warehouse x x
Delete the warehouse x x
Edit the warehouse x x
Modify permissions x x