OneLake Security in Microsoft Fabric
Overview
OneLake, the unified data lake for Microsoft Fabric, centralizes and secures all data across domains and workspaces. It introduces a unified security layer that enforces governance, compliance, and access control directly at the data level — regardless of the tool or engine used to access the data.
This chapter outlines OneLake security principles, components, and best practices for implementation in enterprise environments.
Security Pillars
OneLake security is founded on the following core principles:
- Zero Trust Architecture: Enforces least-privilege access and assumes breach.
- Unified Access Control: Integration with Microsoft Entra ID for identity and access management.
- Row-level and Column-level Security: Data masking and fine-grained access policies.
- Auditability and Monitoring: Full observability with Microsoft Purview, Fabric Monitoring, and Defender for Cloud.
- Data Encryption: At rest (via platform-managed keys) and in transit (TLS 1.2+).
- Data Loss Prevention (DLP): Classification and labeling via Microsoft Purview sensitivity labels.
OneLake Security Components
- Domains & Workspaces: Define access boundaries and RBAC scopes.
- Items (Lakehouses, Warehouses, KQL DBs, Notebooks, Pipelines): Inherit workspace-level permissions but can be overridden with item-level access control.
- OneLake Shortcuts: Shared datasets linked across domains, governed by the original data owner's permissions.
- Microsoft Entra ID (Azure AD): Handles user, group, and service principal authentication.
- Microsoft Purview: Provides classification, lineage, sensitivity labeling, and DLP.
- Access Policies: Defined via workspaces or item scopes, using roles like Viewer, Contributor, Member, Admin.
Recommended Practices
- Use Microsoft Entra Groups to manage access at scale.
- Apply Sensitivity Labels consistently at the data item level.
- Implement RBAC at the workspace level and override at item level where needed.
- Leverage shortcuts judiciously and validate downstream access implications.
- Monitor data access via Fabric Monitoring and Microsoft Sentinel integration.
- Periodically review access logs and remove stale permissions.
Visual Architecture
This diagram illustrates how OneLake workspaces and items are secured within and across domains using RBAC and shortcut permissions.
Learn More
- OneLake documentation
- Microsoft Fabric security overview
- Data governance with Microsoft Purview
- Zero Trust model
OneLake Security Overview
Introduction
OneLake is Microsoft Fabric’s unified data lake, offering a hierarchical storage system comparable to Azure Data Lake Storage Gen2 or a file system. However, OneLake introduces Fabric-specific semantics at each hierarchy level — such as Workspaces, Items, and Folders — to align data governance with Microsoft Fabric's collaborative and domain-oriented model. This document outlines how security is enforced within OneLake using workspace roles, item-level permissions, data access roles, and the new OneLake Security (preview).
OneLake Hierarchy and Access Model
The OneLake folder structure aligns tightly with the Fabric workspace model:
OneLake/
├── Workspace/
│ └── Item/
│ └── Folders/
- Workspace: A container for collaboration and governance. All items live inside a workspace.
- Item: A Lakehouse, Warehouse, KQL DB, or Dataset, each representing a data-bound unit.
- Folders: Substructures within items, used for managing files and logical datasets.
Access to data is controlled at each layer using either workspace roles or item-level permissions.
Workspace Permissions
Workspaces are the primary unit of access control. They define roles that cascade permissions down to all items inside the workspace:
| Role | Add Admins | Add Members | Write Data & Create Items | Read Data |
|---|---|---|---|---|
| Admin | ✅ | ✅ | ✅ | ✅ |
| Member | ❌ | ✅ | ✅ | ✅ |
| Contributor | ❌ | ❌ | ✅ | ✅ |
| Viewer | ❌ | ❌ | ❌ | ✅ |
Use Microsoft Entra security groups to assign workspace roles at scale.
Item Permissions
You can share individual items directly with users or groups without making them workspace members. This gives them visibility to that item only.
| Permission | View Metadata | Access via SQL | Access via OneLake |
|---|---|---|---|
| Read | ✅ | ❌ | ❌ |
| ReadData | ❌ | ✅ | ❌ |
| ReadAll | ❌ | ❌ | ✅* |
* With the new OneLake data access roles,
ReadAllonly works if theDefaultReaderrole is used or properly mapped.
Item permissions are managed via the "Manage permissions" pane in the item settings.
Compute-Level Permissions (SQL)
SQL compute engines enforce row-level and column-level security (RLS/CLS). You can:
- Restrict access to schemas and tables.
- Apply
GRANT SELECT ON TABLEto users or roles. - Ensure a user has only
ReadDataorReadAll, not both, to avoid conflicting views.
Note: Permissions via SQL endpoints differ from OneLake file APIs. Access to SQL does not imply OneLake access.
OneLake Security (Preview)
The OneLake Security feature (limited preview) provides fine-grained RBAC across folders, tables, rows, and columns. Each role includes:
- Data: Defined scopes (tables or folders).
- Permissions: Read/Write per scope.
- Members: Users or groups.
- Constraints: Row/column filters (e.g.
Region = 'CH').
Admins and Members can configure roles in the item UI or via automation (future API support).
Mermaid Diagram – Security Flow
OneLake Data Access Roles (Preview)
A predecessor to OneLake Security, this feature defines read-only access to folders. Roles are defined at the folder level and are ideal for restricting visibility in lakehouse UIs, APIs, or Notebooks.
- Contributors will lose access to this config starting August 2025.
- To access shortcuts, users need
ReadAllon the target item.
Shortcut Security
Shortcuts inherit access from the target item, not the referencing item. When accessed via APIs, the owner’s identity is used, not the caller’s — impacting Power BI or T-SQL scenarios.
Authentication
OneLake uses Microsoft Entra ID for authentication:
- Supports users, groups, and service principals.
- Requires tenant admin approval to enable SPNs (Service Principal Names).
- Automatically integrates with Microsoft Entra tokens from Fabric tools.
Audit Logs
OneLake logs administrative operations via audit logs. These logs:
- Show actions like
CreateFile,DeleteFile. - Are accessible via the Fabric Admin Portal.
- Do not include read operations or activity via compute engines.
Encryption and Networking
At Rest
- All data is encrypted using Microsoft-managed keys (FIPS 140-2).
- Customer-managed keys (CMK) not yet supported.
In Transit
- Encrypted via TLS 1.2+, prefers TLS 1.3.
- Cross-service traffic uses Microsoft’s backbone.
Private Links
- OneLake supports Private Link configurations.
- For guidance: Set up and use private links
External Access Control
Tenant admins can enable or block OneLake access for external apps (e.g., custom ADLS-based tools). This is controlled in the Admin Portal > OneLake Settings.
Summary
| Security Layer | Scope | Tool |
|---|---|---|
| Workspace Roles | Workspace-wide | Fabric UI |
| Item Permissions | Individual item level | Manage Permissions panel |
| OneLake Security | Tables, Folders, Rows | Preview Feature |
| Data Access Roles | Folder-level read access | Folder Access UI |
| SQL Compute Access | Tables, RLS, CLS | SQL Analytics Endpoint |