USERS – Data Sources and Ingestion
The Users page provides a list of users who have access to the workspace. The role and permissions of each user are rendered as well. Table 3.18 describes the permissions (i.e., entitlements).
TABLE 3.18 Azure Databricks user entitlements
Entitlement | Description |
Workspace access | The user is allowed access to workspace environments, excluding Databricks SQL. |
Databricks SQL access | The user is allowed access to the Databricks SQL environment. |
Allow unrestricted cluster creation | The user can create clusters. |
Allow‐instance‐pool‐create | The user can create cluster pools. |
Figure 3.68 shows how the user list and their permissions appear in the workspace.
GROUPS
It is best to grant permissions to groups instead of individuals, especially if you have many users who will have access to the workspace. The grouping concept is also useful to help discover and control who is working on a specific project. This assumes that you have a scenario in which you have multiple projects running on the same workspace. Users, other groups, and service principles can all be added to a group. You need to watch out that you do not have the same users in multiple groups. If you do, then users will get the maximum allowed permission when summed across all groups in which the user account is added. For example, if a user is in one group that does not allow access to the Databricks SQL environment and another group that does, then the user will get access to the Databricks SQL environment.
GLOBAL INIT SCRIPTS
A global init script is similar to a cluster policy. They are the same in principle, but when you use a global init script, the scope is across all clusters in the workspace, versus a single cluster. Global init scripts enable you to enforce organization‐wide library installations, security configurations, and security‐monitoring scripts.
WORKSPACE SETTINGS
This subsection provides custom settings applied to the entire workspace. Therefore, changes to the settings in this subsection impact all users who have access to the workspace. The kinds of configurations include the following:
- Access control
- Storage and purging
- Jobs
- Cluster
- Repos
- Advanced
Many options are available. Spend some time looking into them to become more familiar with them.