Download Chapter 4: The Security Model from Business Intelligence with Databricks SQL.
In this rather dense chapter, we will learn how data assets in the data catalog are secured with the data security model. You will see how user-facing table access control allows for the fine-grained implementation of the data security model using familiar SQL security statements such as GRANT and REVOKE. You will also learn how Data Explorer allows visual, UI-based implementations of the table access control. After that, learn about the underlying mechanics of authorizing Databricks SQL to cloud storage to access the necessary database files. Finally, dive into the next-generation data cataloging technology known as Unity Catalog and how it improves upon the security capabilities of table access control with Hive Metastore.
You can purchase the full book here.
Not a member? Sign up here to access all content.Log In