Get the FREE Ultimate OpenClaw Setup Guide →

fabric-lakehouse-access-control

Scanned
npx machina-cli add skill PatrickGallucci/fabric-skills/fabric-lakehouse-access-control --openclaw
Files (1)
SKILL.md
7.5 KB

Microsoft Fabric Lakehouse Access Control remediate

Diagnose and resolve access control issues across all security layers of Microsoft Fabric Lakehouse, including workspace roles, item permissions, OneLake security data access roles, SQL analytics endpoint granular permissions, and Direct Lake semantic model security integration.

When to Use This Skill

  • User cannot access lakehouse data or sees "permission denied" errors
  • Queries return empty results or missing rows/columns unexpectedly
  • OneLake security roles not applying or taking too long to propagate
  • SQL analytics endpoint permissions not restricting access as expected
  • Direct Lake semantic model returns errors after enabling OneLake security
  • Shortcut data is inaccessible or returns 404 errors
  • DefaultReader role conflicts with custom data access roles
  • Deployment pipeline or git integration issues with data access roles
  • Users see data they should not have access to (over-provisioned)
  • Row-level or column-level security not filtering correctly

Prerequisites

  • Microsoft Fabric workspace with capacity or trial license
  • Admin, Member, or Contributor workspace role for managing security
  • Familiarity with T-SQL for SQL analytics endpoint security
  • PowerShell 7+ for running diagnostic scripts

Fabric Lakehouse Security Layers

Fabric Lakehouse enforces security through multiple overlapping layers. Understanding the evaluation order is critical for remediate.

Layer 1 - Workspace Roles control coarse access to all items in a workspace.

RoleWorkspace AccessOneLake Read/WriteManage Security
AdminFullYesYes
MemberFullYesYes
ContributorFullYesNo
ViewerSee items onlyNo (unless granted)No

Layer 2 - Item Permissions grant access to a single lakehouse without a workspace role. Key permissions: Read (see item), ReadAll (read all OneLake data), Reshare, Write.

Layer 3 - OneLake Security (Preview) provides granular role-based access at the table, folder, row, and column level. Enforced across all compute engines. Disabled by default; once enabled, cannot be turned off.

Layer 4 - SQL Analytics Endpoint Security uses T-SQL GRANT/DENY/REVOKE for object-level, row-level, and column-level security. Only applies to queries via the SQL analytics endpoint.

Layer 5 - Semantic Model Security applies RLS/OLS within Direct Lake or DirectQuery models only.

Quick Diagnostic Workflow

Follow this sequence to isolate the root cause. See workflow-diagnostics.md for full details.

TODO

Common Issues and Resolutions

SymptomLikely CauseResolution
User sees all data despite OneLake security rolesDefaultReader role still activeDelete or edit DefaultReader role to remove ReadAll grant
Empty results from queriesRLS filtering all rows for userCheck RLS predicates; verify user is member of correct role
"Can't find table" or "Column can't be found" in Direct LakeOLS/CLS hiding objects after OneLake security appliedAdd user to role with table/column access
Shortcut returns 404Cross-region shortcut with OneLake security enabledOneLake security does not support cross-region shortcuts
Permission changes not taking effectPropagation latencyRole definition changes: ~5 min. Group membership changes: ~1 hour. Some engines add another hour of caching
SQL endpoint shows data OneLake security should restrictSQL security and OneLake security are separate layersApply security at both layers or restrict access to only the secured endpoint
B2B guest user cannot access data via OneLake security roleEntra External ID settingsSet Guest user access to "same access as members" in Entra External Collaboration settings
Distribution list members can't access SQL endpointSQL endpoint can't resolve DL membershipUse security groups instead of distribution lists for OneLake security roles
Deployment pipeline fails for data access rolesTarget workspace DAR tracking not enabledManually enable DAR tracking on target workspace before deploying

OneLake Security Limitations

See onelake-security-reference.md for complete details.

Key limits to remember: maximum 250 roles per lakehouse, 500 members per role, 500 permissions per role. Mixed-mode queries accessing both OneLake-security-enabled and non-enabled data will fail. OneLake security does not work with private link protection or Azure/Purview Data Share.

Available Scripts

Run the SQL permissions audit to enumerate explicit grants on a SQL analytics endpoint.

Run the access control checklist to validate a user's effective permissions across all security layers.

Use the RLS validation template as a starting point for testing row-level security predicates.

References

Source

git clone https://github.com/PatrickGallucci/fabric-skills/blob/main/skills/fabric-lakehouse-access-control/SKILL.mdView on GitHub

Overview

This skill helps diagnose and resolve access control issues across all Fabric Lakehouse security layers, including workspace roles, OneLake security, SQL endpoint permissions, and semantic model security via RLS/CLS/OLS, dynamic masking, and ReadAll conflicts. It guides remediation when users face permission denied, missing data, or unexpectedly empty results.

How This Skill Works

It systematically walks through layered security: Layer 1 Workspace Roles, Layer 2 Item Permissions, Layer 3 OneLake Security, Layer 4 SQL Analytics Endpoint Security, Layer 5 Semantic Model Security. It uses a Quick Diagnostic Workflow and references workflow-diagnostics.md to verify memberships, permissions, and potential conflicts, applying T-SQL GRANT/DENY/REVOKE and diagnostic PowerShell scripts as needed.

When to Use It

  • User cannot access lakehouse data or sees permission denied errors
  • Queries return empty results or missing rows/columns
  • OneLake security roles are not applying or propagating slowly
  • SQL analytics endpoint permissions don't restrict access as expected
  • Row-level or column-level security not filtering correctly

Quick Start

  1. Step 1: Identify the access path using workflow-diagnostics.md Step 1
  2. Step 2: Verify workspace roles, item permissions, and OneLake security membership
  3. Step 3: Audit SQL analytics endpoint permissions and Direct Lake security; apply fixes

Best Practices

  • Map security layers in order of evaluation and confirm the active role at each layer
  • Verify workspace role and item permissions before adjusting endpoint security
  • Validate OneLake security membership and monitor propagation delays
  • Audit SQL analytics endpoint permissions with GRANT/DENY/REVOKE rules
  • Check for conflicts between DefaultReader, ReadAll, and custom data-access roles

Example Use Cases

  • Troubleshooting a user with permission denied when accessing a lakehouse item
  • Investigating empty query results due to missing RLS filters
  • Resolving a OneLake role propagation delay causing access mismatch
  • Fixing Direct Lake security errors after enabling OneLake security
  • Resolving DefaultReader vs custom data-access-role conflicts

Frequently Asked Questions

Add this skill to your agents
Sponsor this space

Reach thousands of developers