You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

SYSM-362 - Getting issue details... STATUS


Assess shortcut from Azure (ADLSgen2) to Fabric

  • Compare access control mechanisms between Azure and Fabric for ADLS shortcuts

  • Evaluate security implications of ADLS Gen2 shortcuts in Fabric

  • Latency consideration


Version

Date

Description

Contributor

V0.1

 

Initial document

COLOMBANI Théo








SYSM-389 - Compare access control mechanisms between Azure and Fabric for ADLS shortcuts

SYSM-389 - Getting issue details... STATUS

Key message

Access to ADLS Gen2 data through Fabric shortcuts is governed by two distinct control planes: Azure controls access to the storage target, while Fabric controls access to the shortcuted data experience. The design question is not only “who can connect”, but also “which layer authorizes what, with which identity, and at which granularity.”

Description

This section compares how access to ADLS Gen2 data is managed in Azure versus Fabric, focused on three dimensions:

DimensionAzureFabric
AuthenticationMicrosoft Entra identity, service principal, managed identity, SAS, Shared Key depending on access modeShortcut credential such as Workspace Identity, Service Principal, Organizational account, SAS, or Account Key
AuthorizationAzure RBAC plus POSIX-style ACLs on folders/filesWorkspace roles, item permissions, and OneLake security roles on folders/tables
Access scopeStorage account, container, directory, fileWorkspace, item, shortcut path, folder, table
  • Azure Data Lake Storage uses RBAC for coarse-grained access and ACLs for fine-grained access.
  • Fabric uses workspace and item permissions, and OneLake security adds fine-grained access at folder or table level for supported items.

Azure vs Fabric comparison

TopicAzure ADLS Gen2Fabric
Primary purposeProtect the storage resource itselfProtect access to data through Fabric items and experiences
Identity modelEntra users, groups, service principals, managed identitiesFabric users plus shortcut credential / workspace identity
Main authorization modelAzure RBAC + ACLWorkspace roles + item permissions + OneLake security
GranularityRBAC = broad, ACL = file/folder levelWorkspace/item = broad, OneLake security = folder/table level
Default security postureDepends on RBAC/ACL assignmentsOneLake security follows deny-by-default once enabled on the item
Non-Entra accessSAS and Shared Key supportedSAS and Account Key can be used for shortcuts, but reduce identity-based governance
Operational ownerAzure / platform / infra teamFabric / analytics / data platform team
  • Azure RBAC can grant broad access to a storage account or container, while ACLs secure individual directories and files.
  • In Fabric, OneLake security roles can grant access only to specific folders or tables, while Admins, Members, and Contributors generally retain broad access within the item


Shortcut-specific access model

QuestionPractical answer
Who authenticates to ADLS?The identity configured on the shortcut
Who authorizes storage access?Azure ADLS
Who authorizes visibility in Fabric?Fabric workspace/item permissions and, when enabled, OneLake security
What happens if both layers apply?The effective access is constrained by both layers; for shortcuts, Fabric documents a most-restrictive logic between shortcut path and target path
Is behavior identical across engines?

No; some scenarios use delegated identity differently, including owner-based access patterns in specific engines

Access flow

LayerWhat it controlsExamples
Fabric layerWho can see and use the shortcut inside FabricWorkspace role, item access, OneLake security
Shortcut layerWhich identity is used to reach ADLSWorkspace Identity, Service Principal, Organizational account, SAS, Account Key
Azure layerWhether the target storage path can actually be readRBAC, ACL, firewall / trusted access





SYSM-388 - Evaluate security implications of ADLS Gen2 shortcuts in Fabric

  • No labels