<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Lakehouse table security in Data Engineering</title>
    <link>https://community.fabric.microsoft.com/t5/Data-Engineering/Lakehouse-table-security/m-p/5131789#M15459</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.fabric.microsoft.com/t5/user/viewprofilepage/user-id/1253027"&gt;@schneiw&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you tried One lake security(preview) feature&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/fabric/onelake/security/row-level-security" target="_blank"&gt;https://learn.microsoft.com/en-us/fabric/onelake/security/row-level-security&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Srisakthi&lt;/P&gt;</description>
    <pubDate>Fri, 13 Mar 2026 15:09:31 GMT</pubDate>
    <dc:creator>Srisakthi</dc:creator>
    <dc:date>2026-03-13T15:09:31Z</dc:date>
    <item>
      <title>Lakehouse table security</title>
      <link>https://community.fabric.microsoft.com/t5/Data-Engineering/Lakehouse-table-security/m-p/5131705#M15455</link>
      <description>&lt;P&gt;Hello Community!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For our internal IT team, we have general read access to all SQL Endpoints of Lakehouses (via workspace access setting) and also have the ReadAll setting applied on each Lakehouse as well, so that they can have read access via Notebooks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of our Lakehouses contains replicated tables from the ERP system. A requirement from Finance is that no one except a certain group has access to the GL tables. Is there away to set a "deny" on all the non authorized groups to specify that certain table(s) may not be accessed? I believe we can do this over the SQL Endpoint via grant statements in SQL, but how does one do this so that a notebook also cannot access the table(s) since it does not use the SQL Endpoint?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have seen suggestions to have those tables in their own seperate Lakehouse - but that seems like some overkill, is there no easier method to block access to specific tables when accessing via Notebooks?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2026 13:35:56 GMT</pubDate>
      <guid>https://community.fabric.microsoft.com/t5/Data-Engineering/Lakehouse-table-security/m-p/5131705#M15455</guid>
      <dc:creator>schneiw</dc:creator>
      <dc:date>2026-03-13T13:35:56Z</dc:date>
    </item>
    <item>
      <title>Re: Lakehouse table security</title>
      <link>https://community.fabric.microsoft.com/t5/Data-Engineering/Lakehouse-table-security/m-p/5131789#M15459</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.fabric.microsoft.com/t5/user/viewprofilepage/user-id/1253027"&gt;@schneiw&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you tried One lake security(preview) feature&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/fabric/onelake/security/row-level-security" target="_blank"&gt;https://learn.microsoft.com/en-us/fabric/onelake/security/row-level-security&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Srisakthi&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2026 15:09:31 GMT</pubDate>
      <guid>https://community.fabric.microsoft.com/t5/Data-Engineering/Lakehouse-table-security/m-p/5131789#M15459</guid>
      <dc:creator>Srisakthi</dc:creator>
      <dc:date>2026-03-13T15:09:31Z</dc:date>
    </item>
    <item>
      <title>Re: Lakehouse table security</title>
      <link>https://community.fabric.microsoft.com/t5/Data-Engineering/Lakehouse-table-security/m-p/5133873#M15485</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.fabric.microsoft.com/t5/user/viewprofilepage/user-id/1253027"&gt;@schneiw&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;No.&lt;/STRONG&gt; SQL GRANT/DENY only works on the SQL Endpoint; notebooks access Delta tables directly, so those permissions aren’t enforced.&lt;/P&gt;&lt;P&gt;To restrict access (for example GL tables), move them to a separate Lakehouse and grant access only to the authorized group.&lt;/P&gt;&lt;P&gt;Docs: &lt;A target="_new" rel="noopener"&gt;https://learn.microsoft.com/fabric/data-engineering/lakehouse-overview&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2026 00:08:21 GMT</pubDate>
      <guid>https://community.fabric.microsoft.com/t5/Data-Engineering/Lakehouse-table-security/m-p/5133873#M15485</guid>
      <dc:creator>Olufemi7</dc:creator>
      <dc:date>2026-03-17T00:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: Lakehouse table security</title>
      <link>https://community.fabric.microsoft.com/t5/Data-Engineering/Lakehouse-table-security/m-p/5133879#M15486</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.fabric.microsoft.com/t5/user/viewprofilepage/user-id/1253027"&gt;@schneiw&lt;/a&gt;, there is no Deny as of today; however, you can do that by leveraging One lake security preview.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Lozovskyi_0-1773706065156.png" style="width: 400px;"&gt;&lt;img src="https://community.fabric.microsoft.com/t5/image/serverpage/image-id/1330060iB512C2D2C13BC9E7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Lozovskyi_0-1773706065156.png" alt="Lozovskyi_0-1773706065156.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;To simplify the solution and maintenance undertaking, you can store GL data under one schema.&lt;/P&gt;&lt;P&gt;Then define a role to read data inside this schema.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Lozovskyi_1-1773706262890.png" style="width: 400px;"&gt;&lt;img src="https://community.fabric.microsoft.com/t5/image/serverpage/image-id/1330061i54D615948299394B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Lozovskyi_1-1773706262890.png" alt="Lozovskyi_1-1773706262890.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;add allowed user group as a member and then share the lakehouse with this group. when sharing the lakehouse, keep all selections unticked. By that, users will see the lakehouse under the OneLake catalog.&lt;/P&gt;&lt;P&gt;If you need to grant them SQL endpoint access, go to the SQL endpoint and switch to&amp;nbsp;&lt;SPAN&gt;Use OneLake security for tables (User's identity access mode)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Lozovskyi_4-1773706675759.png" style="width: 400px;"&gt;&lt;img src="https://community.fabric.microsoft.com/t5/image/serverpage/image-id/1330064i5766E2F3DD6824AD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Lozovskyi_4-1773706675759.png" alt="Lozovskyi_4-1773706675759.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Lozovskyi_3-1773706646442.png" style="width: 400px;"&gt;&lt;img src="https://community.fabric.microsoft.com/t5/image/serverpage/image-id/1330063i388C88D0EA17A490/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Lozovskyi_3-1773706646442.png" alt="Lozovskyi_3-1773706646442.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Lozovskyi_2-1773706335000.png" style="width: 400px;"&gt;&lt;img src="https://community.fabric.microsoft.com/t5/image/serverpage/image-id/1330062i449719EEB4E706B2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Lozovskyi_2-1773706335000.png" alt="Lozovskyi_2-1773706335000.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;It's important to keep in mind that having higher-level rights (shared read All, or having workspace-level access) will override this security setup.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2026 00:19:17 GMT</pubDate>
      <guid>https://community.fabric.microsoft.com/t5/Data-Engineering/Lakehouse-table-security/m-p/5133879#M15486</guid>
      <dc:creator>Lozovskyi</dc:creator>
      <dc:date>2026-03-17T00:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: Lakehouse table security</title>
      <link>https://community.fabric.microsoft.com/t5/Data-Engineering/Lakehouse-table-security/m-p/5136502#M15513</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.fabric.microsoft.com/t5/user/viewprofilepage/user-id/1253027"&gt;@schneiw&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;Thank you&amp;nbsp;&lt;a href="https://community.fabric.microsoft.com/t5/user/viewprofilepage/user-id/704884"&gt;@Lozovskyi&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://community.fabric.microsoft.com/t5/user/viewprofilepage/user-id/843006"&gt;@Olufemi7&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://community.fabric.microsoft.com/t5/user/viewprofilepage/user-id/782160"&gt;@Srisakthi&lt;/a&gt;&amp;nbsp; for your inputs.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;We’d like to follow up regarding the recent concern. Kindly confirm whether the issue has been resolved, or if further assistance is still required. We are available to support you and are committed to helping you reach a resolution.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thank you.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2026 14:07:13 GMT</pubDate>
      <guid>https://community.fabric.microsoft.com/t5/Data-Engineering/Lakehouse-table-security/m-p/5136502#M15513</guid>
      <dc:creator>v-echaithra</dc:creator>
      <dc:date>2026-03-20T14:07:13Z</dc:date>
    </item>
  </channel>
</rss>

