This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Manage table roles

1 - Manage table security roles

Learn how to use management commands to view, add, and remove security roles on a table level.

Principals are granted access to resources through a role-based access control model, where their assigned security roles determine their resource access.

In this article, you’ll learn how to use management commands to view existing security roles as well as add and remove security roles on the table level.

Permissions

You must have at least Table Admin permissions to run these commands.

Table level security roles

The following table shows the possible security roles on the table level and describes the permissions granted for each role.

RolePermissions
adminsView, modify, and remove the table and table entities.
ingestorsIngest data to the table without access to query.

Show existing security roles

Before you add or remove principals, you can use the .show command to see a table with all of the principals and roles that are already set on the table.

Syntax

To show all roles:

.show table TableName principals

To show your roles:

.show table TableName principal roles

Parameters

NameTypeRequiredDescription
TableNamestring✔️The name of the table for which to list principals.

Example

The following command lists all security principals that have access to the StormEvents table.

.show table StormEvents principals

Example output

RolePrincipalTypePrincipalDisplayNamePrincipalObjectIdPrincipalFQN
Table StormEvents AdminMicrosoft Entra userAbbi Atkinscd709aed-a26c-e3953dec735eaaduser=abbiatkins@fabrikam.com

Add and drop security roles

This section provides syntax, parameters, and examples for adding and removing principals.

Syntax

Action table TableName Role ( Principal [, Principal…] ) [skip-results] [ Description ]

Parameters

NameTypeRequiredDescription
Actionstring✔️The command .add, .drop, or .set.
.add adds the specified principals, .drop removes the specified principals, and .set adds the specified principals and removes all previous ones.
TableNamestring✔️The name of the table for which to add principals.
Rolestring✔️The role to assign to the principal. For tables, this can be admins or ingestors.
Principalstring✔️One or more principals. For guidance on how to specify these principals, see Referencing security principals.
skip-resultsstringIf provided, the command won’t return the updated list of table principals.
DescriptionstringText to describe the change that will be displayed when using the .show command.

Examples

In the following examples, you’ll see how to add security roles, remove security roles, and add and remove security roles in the same command.

Add security roles with .add

The following example adds a principal to the admins role on the StormEvents table.

.add table StormEvents admins ('aaduser=imikeoein@fabrikam.com')

The following example adds an application to the ingestors role on the StormEvents table.

.add table StormEvents ingestors ('aadapp=4c7e82bd-6adb-46c3-b413-fdd44834c69b;fabrikam.com')

Remove security roles with .drop

The following example removes all principals in the group from the admins role on the StormEvents table.

.drop table StormEvents admins ('aadGroup=SomeGroupEmail@fabrikam.com')

Add new security roles and remove the old with .set

The following example removes existing ingestors and adds the provided principals as ingestors on the StormEvents table.

.set table StormEvents ingestors ('aaduser=imikeoein@fabrikam.com', 'aaduser=abbiatkins@fabrikam.com')

Remove all security roles with .set

The following command removes all existing ingestors on the StormEvents table.

.set table StormEvents ingestors none

2 - Manage view access to tables

Learn how to grant view access to tables in a database.

Principals gain access to resources, such as databases and tables, based on their assigned security roles. The viewer security role is only available at the database level, and assigning a principal this role gives them view access to all tables in the database.

In this article, you learn methods for controlling a principal’s table view access.

Structure data for controlled access

To control access more effectively, we recommend that you separate tables into different databases based on access privileges. For instance, create a distinct database for sensitive data and restrict access to specific principals by assigning them the relevant security roles.

Restricted View Access policy

To restrict access to specific tables, you can turn on the Restricted View Access policy for those tables. This policy ensures that only principals with the unrestrictedViewer role can access the table. Meanwhile, principals with the regular viewer role can’t view the table.

Row Level Security policy

The Row Level Security (RLS) policy allows you to restrict access to rows of data based on specific criteria and allows masking data in columns. When you create an RLS policy on a table, the restriction applies to all users, including database administrators and the RLS creator.

Create a follower database

Create a follower database and follow only the relevant tables that you’d like to share with the specific principal or set of principals.

Create a database shortcut in Fabric and follow only the relevant tables that you’d like to share with the specific principal or set of principals.