To effectively perform the operations in Databricks, users must be granted the required permissions. The following document outlines the permissions required, their scope, and the associated Databricks objects.
Basic user entitlements
- Workspace Access: Permission to access the Databricks workspace.
- Databricks SQL Access: Permission to use Databricks SQL features.
Additional entitlements required
- Unrestricted Cluster Creation: Users must have the Allow unrestricted cluster creation entitlement to create and manage clusters necessary for running data quality tasks.
Permissions
- All-Purpose Cluster: Users need the Can Restart permission on targeted clusters.
- SQL Warehouse: Can use permission is required on targeted SQL warehouse.
- Instance Pool: Can Attach To permission is needed for users to assign job clusters to instance pools, optimizing compute resources.
Required permissions in Databricks to access hive_metastore or unity catalog
Appropriate privileges must be granted on catalogs, schemas, or tables to enable data access. These privileges can be granted based on how users choose to manage the data.
Catalog
-
USE CATALOG
Schema
-
USE SCHEMA
-
SELECT
-
CREATE
-
MODIFY
Table
-
SELECT
- Login to the Databricks portal.
- Click Catalog.
- Select the specific schema.
- Navigate to the permissions tab.
- Click Grant.
- Assign the required permissions.
- Click Confirm.
This will grant the required permissions to the selected users.
Advanced permissions for tables with row filter and column mask policies
-
If data quality operations are to be performed on tables using row filter and column mask policies, the workspace must have the Serverless Compute feature enabled, and users must have appropriate policy permissions in place.
-
For more information refer to Row filters and column masks.