-
Book Overview & Buying
-
Table Of Contents
Distributed Data Systems with Azure Databricks
By :
Azure Databricks allows the user to perform access control to manage access to workspace objects, clusters, pools, and data tables. Admin users manage access control lists and also users with delegated permissions.
By default, in Azure Databricks, all users can create or modify clusters. Before using cluster access control, an admin user must enable it. After this, there are two types of cluster permissions, which are as follows:
When cluster access control is enabled, only admins and users with Can Manage permissions can configure, create, terminate, or delete clusters.
Cluster access control can be configured by clicking on the cluster button in the sidebar and, in the Actions options, selecting the Permissions button. This will prompt a permission dialog box where users can do the following:
These options are visible in Figure 1.39:
Figure 1.39 – Managing cluster permissions
Cluster permissions allow us to enforce fine-grained control over the computational resources used in our projects.
Folders have five levels of permissions: No Permissions, Read, Run, Edit, and Manage. Any notebook or experiment will inherit the folder permissions that contain them.
Besides the current access control, these permissions are maintained:
When there is no workspace access control, users can only edit items in their Workspace folder.
With workspace access control enabled, the following permissions exist:
Understanding these permissions helps us to know in advance how possible changes in these policies could affect how users interact with the organization's data.
Notebooks have the same five permission levels as folders: No Permissions, Read, Run, Edit, and Manage.
Users can configure notebook permissions by clicking on the Permissions button in the notebook context bar. Select the folder and then click on Permissions from the drop-down menu:
Figure 1.40 – Notebook permissions
From there, you can grant permissions to users or groups as well as edit existing permissions:
Figure 1.41 – Access control on notebooks
Access control on notebooks can easily be applied in this way by selecting one of the options from the drop-down menu.
You can assign six permission levels to MLflow Models registered in the MLflow Model Registry: No Permissions, Read, Edit, Manage Staging Versions, Manage Production Versions, and Manage.
Besides the current workspace access control, these permissions are maintained:
When there is no workspace access control, users can manage any of the models in the registry.
With workspace access control enabled, the following permissions exist:
These options are applied to MLflow Models created in Azure Databricks.
One thing to keep in mind is that only administrators belong to the admins with the Manage permissions group, while the rest of the users belong to the all users group.
MLflow Model permissions can be modified by clicking on the model's icon in the sidebar, selecting the model name, clicking on the drop-down icon to the right of the model name, and finally selecting Permissions. This will show us a dialog box from which we can select specific users or groups and add specific permissions:
Figure 1.42 – MLflow permissions
You can update the permissions of a user or group by selecting the new permission from the Permission drop-down menu:
Figure 1.43 – MLflow access management
By selecting one of these options, we can control how MLflow experiments interact with our data and which users can create models that work with it.