Skip to main content

Access control lists

This article describes details about the permissions available for the different workspace objects.

note

Access control requires the Premium plan or above.

Access control settings are disabled by default on workspaces that are upgraded from the Standard plan to the Premium plan or above. Once an access control setting is enabled, it can not be disabled. For more information, see Access controls lists can be enabled on upgraded workspaces.

Access control lists overview

In Databricks, you can use access control lists (ACLs) to configure permission to access workspace level objects. Workspace admins have the CAN MANAGE permission on all objects in their workspace, which gives them the ability to manage permissions on all objects in their workspaces. Users automatically have the CAN MANAGE permission for objects that they create.

For an example of how to map typical personas to workspace-level permissions, see the Proposal for Getting Started With Databricks Groups and Permissions.

Manage access control lists with folders

You can manage workspace object permissions by adding objects to folders. Objects in a folder inherit all permissions settings of that folder. For example, a user that has the CAN RUN permission on a folder has CAN RUN permission on the alerts in that folder.

If you grant a user access to an object inside the folder, they can view the parent folder’s name, even if they do not have permissions on the parent folder. For example, a notebook named test1.py is in a folder named Workflows. If you grant a user CAN READ on test1.py and no permissions on Workflows, the user can see that the parent folder is named Workflows. The user cannot view or access any other objects in the Workflows folder unless they have been granted permissions on them.

To learn about organizing objects into folders, see Workspace browser.

AI/BI dashboard ACLs

AbilityNO PERMISSIONSCAN VIEW/CAN RUNCAN EDITCAN MANAGE
View dashboard and resultsxxx
Interact with widgetsxxx
Refresh the dashboardxxx
Edit dashboardxx
Clone dashboardxxx
Publish dashboard snapshotxx
Modify permissionsx
Delete dashboardx

Alerts ACLs

AbilityNO PERMISSIONSCAN RUNCAN MANAGE
See in alert listxx
View alert and resultxx
Manually trigger alert runxx
Subscribe to notificationsxx
Edit alertx
Modify permissionsx
Delete alertx

Compute ACLs

important

Users with CAN ATTACH TO permissions can view the service account keys in the log4j file. Use caution when granting this permission level.

AbilityNO PERMISSIONSCAN ATTACH TOCAN RESTARTCAN MANAGE
Attach notebook to computexxx
View Spark UIxxx
View compute metricsxxx
Terminate computexx
Start and restart computexx
View driver logsx (see note)
Edit computex
Attach library to computex
Resize computex
Modify permissionsx
note

Secrets are not redacted from a cluster’s Spark driver log stdout and stderr streams. To protect sensitive data, by default, Spark driver logs are viewable only by users with CAN MANAGE permission on job, dedicated access mode, and standard access mode clusters. To allow users with CAN ATTACH TO or CAN RESTART permission to view the logs on these clusters, set the following Spark configuration property in the cluster configuration: spark.databricks.acl.needAdminPermissionToViewLogs false.

On No Isolation Shared access mode clusters, the Spark driver logs can be viewed by users with CAN ATTACH TO or CAN MANAGE permission. To limit who can read the logs to only users with the CAN MANAGE permission, set spark.databricks.acl.needAdminPermissionToViewLogs to true.

See Spark configuration to learn how to add Spark properties to a cluster configuration.

Legacy dashboard ACLs

AbilityNO PERMISSIONSCAN VIEWCAN RUNCAN EDITCAN MANAGE
See in dashboard listxxxx
View dashboard and resultsxxxx
Refresh query results in the dashboard (or choose different parameters)xxx
Edit dashboardxx
Modify permissionsx
Delete dashboardx

Editing a legacy dashboard requires the Run as viewer sharing setting. See Refresh behavior and execution context.

Delta Live Tables pipeline ACLs

AbilityNO PERMISSIONSCAN VIEWCAN RUNCAN MANAGEIS OWNER
View pipeline details and list pipelinexxxx
View Spark UI and driver logsxxxx
Start and stop a pipeline updatexxx
Stop pipeline clusters directlyxxx
Edit pipeline settingsxx
Delete the pipelinexx
Purge runs and experimentsxx
Modify permissionsxx

Feature tables ACLs

This table describes how to control access to feature tables in workspaces that are not enabled for Unity Catalog. If your workspace is enabled for Unity Catalog, use Unity Catalog privileges instead.

note
AbilityCAN VIEW METADATACAN EDIT METADATACAN MANAGE
Read feature tableXXX
Search feature tableXXX
Publish feature table to online storeXXX
Write features to feature tableXX
Update description of feature tableXX
Modify permissionsX
Delete feature tableX

File ACLs

AbilityNO PERMISSIONSCAN READCAN RUNCAN EDITCAN MANAGE
Read filexxxx
Commentxxxx
Attach and detach filexxx
Run file interactivelyxxx
Edit filexx
Modify permissionsx

Folder ACLs

AbilityNO PERMISSIONSCAN READCAN EDITCAN RUNCAN MANAGE
List objects in folderxxxxx
View objects in folderxxxx
Clone and export itemsxxx
Run objects in the folderxx
Create, import, and delete itemsx
Move and rename itemsx
Modify permissionsx

Genie space ACLs

AbilityNO PERMISSIONSCAN VIEW/CAN RUNCAN EDITCAN MANAGE
See in Genie space listxxxx
Ask Genie questionsxxx
Provide response feedbackxxx
Add or edit Genie instructionsxx
Add or edit sample questionsxx
Add or remove included tablesxx
Monitor a spacex
Modify permissionsx
Delete spacex
View other users’ conversationsxx

Git folder ACLs

AbilityNO PERMISSIONSCAN READCAN RUNCAN EDITCAN MANAGE
List assets in a folderxxxxx
View assets in a folderxxxx
Clone and export assetsxxxx
Run executable assets in folderxxx
Edit and rename assets in a folderxx
Create a branch in a folderx
Pull or push a branch into a folderx
Create, import, delete, and move assetsx
Modify permissionsx

Job ACLs

AbilityNO PERMISSIONSCAN VIEWCAN MANAGE RUNIS OWNERCAN MANAGE
View job details and settingsxxxx
View resultsxxxx
View Spark UI, logs of a job runxxx
Run nowxxx
Cancel runxxx
Edit job settingsxx
Delete jobxx
Modify permissionsxx

MLflow experiment ACLs

MLflow experiment ACLs are different for notebook experiments and workspace experiments. Notebook experiments cannot be managed independently of the notebook that created them, so the permissions are similar to notebook permissions. To learn more about the two types of experiments, see Organize training runs with MLflow experiments.

ACLs for notebook experiments

Changing these permissions also modifies the permissions on the notebook that corresponds to the experiment.

AbilityNO PERMISSIONSCAN READCAN RUNCAN EDITCAN MANAGE
View notebookxxxx
Comment on notebookxxxx
Attach/detach notebook to computexxx
Run commands in the notebookxxx
Edit notebookxx
Modify permissionsx

ACLs for workspace experiments

AbilityNO PERMISSIONSCAN READCAN EDITCAN MANAGE
View experimentxxx
Log runs to the experimentxx
Edit the experimentxx
Delete the experimentx
Modify permissionsx

MLflow model ACLs

This table describes how to control access to registered models in workspaces that are not enabled for Unity Catalog. If your workspace is enabled for Unity Catalog, use Unity Catalog privileges instead.

AbilityNO PERMISSIONSCAN READCAN EDITCAN MANAGE STAGING VERSIONSCAN MANAGE PRODUCTION VERSIONSCAN MANAGE
View model details, versions, stage transition requests, activities, and artifact download URIsxxxxx
Request a model version stage transitionxxxxx
Add a version to a modelxxxx
Update model and version descriptionxxxx
Add or edit tagsxxxx
Transition model version between stagesxxx
Approve a transition requestxxx
Cancel a transition requestx
Rename modelx
Modify permissionsx
Delete model and model versionsx

Notebook ACLs

AbilityNO PERMISSIONSCAN READCAN RUNCAN EDITCAN MANAGE
View cellsxxxx
Commentxxxx
Run using %run or notebook workflowsxxxx
Attach and detach notebooksxxx
Run commandsxxx
Edit cellsxx
Modify permissionsx

Pool ACLs

AbilityNO PERMISSIONSCAN ATTACH TOCAN MANAGE
Attach cluster to poolxx
Delete poolx
Edit poolx
Modify permissionsx

Query ACLs

AbilityNO PERMISSIONSCAN VIEWCAN RUNCAN EDITCAN MANAGE
View own queriesxxxx
See in query listxxxx
View query textxxxx
View query resultxxxx
Refresh query result (or choose different parameters)xxx
Include the query in a dashboardxxx
Edit query textxx
Change SQL warehouse or data sourcex
Modify permissionsx
Delete queryx

Secret ACLs

AbilityREADWRITEMANAGE
Read the secret scopexxx
List secrets in the scopexxx
Write to the secret scopexx
Modify permissionsx

Serving endpoint ACLs

AbilityNO PERMISSIONSCAN VIEWCAN QUERYCAN MANAGE
Get endpointxxx
List endpointxxx
Query endpointxx
Update endpoint configx
Delete endpointx
Modify permissionsx

SQL warehouse ACLs

AbilityNO PERMISSIONSCAN USECAN MONITORIS OWNERCAN MANAGE
Start the warehousexxxx
View warehouse detailsxxxx
View warehouse queriesxxx
Run queriesxxxx
View warehouse monitoring tabxxx
Stop the warehousexx
Delete the warehousexx
Edit the warehousexx
Modify permissionsxx

Vector search endpoint ACLs

AbilityNO PERMISSIONSCAN CREATECAN USECAN MANAGE
Get endpointxxx
List endpointsxxx
Create endpointxxx
Use endpoint (create index)xx
Delete endpointx
Modify permissionsx