Assess shortcut from Azure (ADLSgen2) to Fabric

  • Compare access control mechanisms between Azure and Fabric for ADLS shortcuts

  • Evaluate security implications of ADLS Gen2 shortcuts in Fabric

  • Latency consideration


Version

Date

Description

Contributor

V0.1

 

Initial document

COLOMBANI Théo








SYSM-389 - Compare access control mechanisms between Azure and Fabric for ADLS shortcuts

Key message

Access to ADLS Gen2 data through Fabric shortcuts is governed by two distinct control planes: Azure controls access to the storage target, while Fabric controls access to the shortcuted data experience. The design question is not only “who can connect”, but also “which layer authorizes what, with which identity, and at which granularity.”

Description

This section compares how access to ADLS Gen2 data is managed in Azure versus Fabric, focused on three dimensions:

DimensionAzureFabric
AuthenticationMicrosoft Entra identity, service principal, managed identity, SAS, Shared Key depending on access modeShortcut credential such as Workspace Identity, Service Principal, Organizational account, SAS, or Account Key
AuthorizationAzure RBAC plus POSIX-style ACLs on folders/filesWorkspace roles, item permissions, and OneLake security roles on folders/tables
Access scopeStorage account, container, directory, fileWorkspace, item, shortcut path, folder, table

Azure vs Fabric comparison

TopicAzure ADLS Gen2Fabric
Primary purposeProtect the storage resource itselfProtect access to data through Fabric items and experiences
Identity modelEntra users, groups, service principals, managed identitiesFabric users plus shortcut credential / workspace identity
Main authorization modelAzure RBAC + ACLWorkspace roles + item permissions + OneLake security
GranularityRBAC = broad, ACL = file/folder levelWorkspace/item = broad, OneLake security = folder/table level
Default security postureDepends on RBAC/ACL assignmentsOneLake security follows deny-by-default once enabled on the item
Non-Entra accessSAS and Shared Key supportedSAS and Account Key can be used for shortcuts, but reduce identity-based governance
Operational ownerAzure / platform / infra teamFabric / analytics / data platform team


Shortcut-specific access model

QuestionPractical answer
Who authenticates to ADLS?The identity configured on the shortcut
Who authorizes storage access?Azure ADLS
Who authorizes visibility in Fabric?Fabric workspace/item permissions and, when enabled, OneLake security
What happens if both layers apply?The effective access is constrained by both layers; for shortcuts, Fabric documents a most-restrictive logic between shortcut path and target path
Is behavior identical across engines?

No; some scenarios use delegated identity differently, including owner-based access patterns in specific engines

Access flow

LayerWhat it controlsExamples
Fabric layerWho can see and use the shortcut inside FabricWorkspace role, item access, OneLake security
Shortcut layerWhich identity is used to reach ADLSWorkspace Identity, Service Principal, Organizational account, SAS, Account Key
Azure layerWhether the target storage path can actually be readRBAC, ACL, firewall / trusted access





SYSM-388 - Evaluate security implications of ADLS Gen2 shortcuts in Fabric