Please introduce more granular permission controls that allow admins to determine which user groups can create specific Fabric artifacts. The current all-or-nothing modelโwhere users can either create all artifacts or noneโdoes not align with leastโprivilege security principles used across the industry. Detail: At the moment, Fabric supports allowing any user to create all artifact types or restricting creation to an AAD group. While helpful, modern enterprise environments require more precise governance. Different teams operate with different responsibilities, and unrestricted artifact creation increases risk, introduces operational overhead, and can lead to unintended platform misuse. For example: Data Engineering teams should be able to create Data Factory pipelines, Dataflows, Lakehouses, and Notebooks Machine Learning teams may require access to Notebooks but should not necessarily create Pipelines or Dataflows Business teams may need access only to Semantic Models or Dashboards Platform teams must be able to enforce governance while keeping Fabric aligned with enterprise architectures Implementing a leastโprivilege, role-based model is standard practice across cloud services (Azure, AWS, GCP) and is critical for organizations with compliance and security requirements. Request: Please enable admins to grant permissions per artifact type (ADF, Notebooks, Lakehouses, Pipelines, ML Models, etc.) to specific security groups. This would allow organizations to: Strengthen security and compliance Reduce accidental resource sprawl Ensure proper architecture and governance Empower teams with the exact tools they needโno more, no less Align Fabric with industry-standard RBAC and leastโprivilege models This enhancement would bring Fabric closer to enterprise-grade governance expectations and unlock broader adoption.
... View more