You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

SYSM-362 - Getting issue details... STATUS


Assess shortcut from Azure (ADLSgen2) to Fabric

  • Compare access control mechanisms between Azure and Fabric for ADLS shortcuts

  • Evaluate security implications of ADLS Gen2 shortcuts in Fabric

  • Latency consideration


Version

Date

Description

Contributor

V0.1

 

Initial document

COLOMBANI Théo








SYSM-389 - Compare access control mechanisms between Azure and Fabric for ADLS shortcuts


DimensionAzure ADLS Gen2Fabric / OneLake
Main control modelAzure RBAC + ACLWorkspace roles + item permissions + OneLake security
GranularityRBAC = broad, ACL = fine-grainedWorkspace, item, folder, shortcut path
Effective access on shortcutTarget authorization in ADLSMost restrictive combination of shortcut path and target path
Identity behaviorEnd-user / app identity in AzureUsually passthrough, but some engines use owner identity
Key riskOver-granted RBAC or non-Entra authMisunderstanding engine-specific behavior

In ADLS Gen2, Azure RBAC provides coarse-grained control and ACLs provide fine-grained control. Shared Key and some SAS patterns do not rely on Microsoft Entra identity in the same way.

For shortcuts, Fabric applies the most restrictive permission between the shortcut path and the target path.

Key exception to document


ScenarioImportant behavior
DirectLake over SQL / T-SQL delegated identity scenarios

The engine may use the item owner identity to access the shortcut target, not the end-user identity. OneLake roles still filter what the user can see.


Recommendation block

  • Document Azure and Fabric as two control layers, not one.
  • Use ACLs for fine-grained data access in ADLS.
  • Test security behavior by engine, not only at shortcut creation time.
  • Explicitly document the owner-identity exception for BI/query scenarios.



SYSM-388 - Evaluate security implications of ADLS Gen2 shortcuts in Fabric

Check areaWhat to assessExpected output
Authentication methodOrganizational account, Service Principal, Workspace Identity, SAS, Account KeyApproved / Restricted / Forbidden list
Credential riskScope of access granted in ADLSRisk level by auth method
Least privilegeRBAC vs ACL usageRequired minimum roles and ACL pattern
FirewallTrusted Workspace Access requirementSupported network pattern
Cross-tenantWhether target storage is in another tenantSupported / unsupported design
Engine behaviorSpark / SQL / semantic model differencesSecurity caveats by engine

ADLS shortcuts use a delegated authorization model: access is authorized using the credential configured on the shortcut. Supported auth types are Organizational account, Service Principal, Workspace Identity, SAS, and Account Key. Microsoft warns that Account Key grants full access to the storage account.

Recommended decision table

Authentication kindRecommendationWhy
Workspace IdentityPreferredNo secret/certificate management; Microsoft positions it as a secure option.
Service PrincipalApprovedGood for central IT-managed access and cross-tenant cases.
Organizational accountLimited useMore user-dependent; less suitable for stable platform patterns.
SASException onlyValid, but should be tightly scoped and governed.
Account KeyAvoidFull storage account access.

Recommendation block

  • Prefer Workspace Identity by default.
  • Use Service Principal for centralized managed access or cross-tenant scenarios.
  • Avoid Account Key.
  • Require ACL-based least privilege, not only broad RBAC.
  • Validate firewall-enabled storage early.
  • No labels