USERS – Data Sources and Ingestion

The Users page provides a list of users who have access to the workspace. The role and permissions of each user are rendered as well. Table 3.18 describes the permissions (i.e., entitlements).

TABLE 3.18 Azure Databricks user entitlements

EntitlementDescription
Workspace accessThe user is allowed access to workspace environments, excluding Databricks SQL.
Databricks SQL accessThe user is allowed access to the Databricks SQL environment.
Allow unrestricted cluster creationThe user can create clusters.
Allow‐instance‐pool‐createThe user can create cluster pools.

Figure 3.68 shows how the user list and their permissions appear in the workspace.

GROUPS

It is best to grant permissions to groups instead of individuals, especially if you have many users who will have access to the workspace. The grouping concept is also useful to help discover and control who is working on a specific project. This assumes that you have a scenario in which you have multiple projects running on the same workspace. Users, other groups, and service principles can all be added to a group. You need to watch out that you do not have the same users in multiple groups. If you do, then users will get the maximum allowed permission when summed across all groups in which the user account is added. For example, if a user is in one group that does not allow access to the Databricks SQL environment and another group that does, then the user will get access to the Databricks SQL environment.

GLOBAL INIT SCRIPTS

A global init script is similar to a cluster policy. They are the same in principle, but when you use a global init script, the scope is across all clusters in the workspace, versus a single cluster. Global init scripts enable you to enforce organization‐wide library installations, security configurations, and security‐monitoring scripts.

WORKSPACE SETTINGS

This subsection provides custom settings applied to the entire workspace. Therefore, changes to the settings in this subsection impact all users who have access to the workspace. The kinds of configurations include the following:

  • Access control
  • Storage and purging
  • Jobs
  • Cluster
  • Repos
  • Advanced

Many options are available. Spend some time looking into them to become more familiar with them.

Write a Comment

Your email address will not be published. Required fields are marked *