πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided DP-700 Domain 1
Domain 1 β€” Module 4 of 8 50%
4 of 26 overall

DP-700 Study Guide

Domain 1: Implement and Manage an Analytics Solution

  • Workspace Settings: Your Fabric Foundation
  • Version Control: Git in Fabric
  • Deployment Pipelines: Dev to Production
  • Access Controls: Who Gets In
  • Data Security: Control Who Sees What
  • Governance: Labels, Endorsement & Audit
  • Orchestration: Pick the Right Tool
  • Pipeline Patterns: Parameters & Expressions

Domain 2: Ingest and Transform Data

  • Delta Lake: The Heart of Fabric Free
  • Loading Patterns: Full, Incremental & Streaming Free
  • Dimensional Modeling: Prep for Analytics Free
  • Data Stores & Tools: Make the Right Choice Free
  • OneLake Shortcuts: Data Without Duplication
  • Mirroring: Real-Time Database Replication
  • PySpark Transformations: Code Your Pipeline
  • Transform Data with SQL & KQL
  • Eventstreams & Spark Streaming: Real-Time Ingestion
  • Real-Time Intelligence: KQL & Windowing

Domain 3: Monitor and Optimize an Analytics Solution

  • Monitoring & Alerts: Catch Problems Early
  • Troubleshoot Pipelines & Dataflows
  • Troubleshoot Notebooks & SQL
  • Troubleshoot Streaming & Shortcuts
  • Optimize Lakehouse Tables: Delta Tuning
  • Optimize Spark: Speed Up Your Code
  • Optimize Pipelines & Warehouses
  • Optimize Streaming: Real-Time Performance

DP-700 Study Guide

Domain 1: Implement and Manage an Analytics Solution

  • Workspace Settings: Your Fabric Foundation
  • Version Control: Git in Fabric
  • Deployment Pipelines: Dev to Production
  • Access Controls: Who Gets In
  • Data Security: Control Who Sees What
  • Governance: Labels, Endorsement & Audit
  • Orchestration: Pick the Right Tool
  • Pipeline Patterns: Parameters & Expressions

Domain 2: Ingest and Transform Data

  • Delta Lake: The Heart of Fabric Free
  • Loading Patterns: Full, Incremental & Streaming Free
  • Dimensional Modeling: Prep for Analytics Free
  • Data Stores & Tools: Make the Right Choice Free
  • OneLake Shortcuts: Data Without Duplication
  • Mirroring: Real-Time Database Replication
  • PySpark Transformations: Code Your Pipeline
  • Transform Data with SQL & KQL
  • Eventstreams & Spark Streaming: Real-Time Ingestion
  • Real-Time Intelligence: KQL & Windowing

Domain 3: Monitor and Optimize an Analytics Solution

  • Monitoring & Alerts: Catch Problems Early
  • Troubleshoot Pipelines & Dataflows
  • Troubleshoot Notebooks & SQL
  • Troubleshoot Streaming & Shortcuts
  • Optimize Lakehouse Tables: Delta Tuning
  • Optimize Spark: Speed Up Your Code
  • Optimize Pipelines & Warehouses
  • Optimize Streaming: Real-Time Performance
Domain 1: Implement and Manage an Analytics Solution Premium ⏱ ~13 min read

Access Controls: Who Gets In

Implement workspace-level and item-level access controls to ensure the right people have the right permissions in your Fabric environment.

How does Fabric control access?

β˜• Simple explanation

Think of a hotel.

Your room key opens your room (item-level access). But the hotel also has floors β€” the executive floor needs a different key card (workspace-level access). And within your room, the safe has its own combination (data-level security, covered in the next module).

Fabric works the same way. Workspace roles control who can enter the workspace and what they can do there. Item permissions control who can see or use specific items (a lakehouse, a report, a pipeline) β€” even if they’re not a workspace member.

Microsoft Fabric uses a layered security model. The outermost layer is workspace access (roles), the middle layer is item-level permissions, and the innermost layer is data-level security (RLS, CLS, OLS β€” covered in the next module).

Workspace roles grant broad permissions across all items in a workspace. Item-level permissions grant targeted access to individual items without requiring workspace membership. Both layers work together β€” a user might be a Viewer in the workspace but have direct Read/Write access to one specific lakehouse through item permissions.

Workspace roles

Every Fabric workspace has four built-in roles. You assign users, groups, or service principals to these roles.

Workspace roles β€” from most to least privileged
PermissionAdminMemberContributorViewer
View all itemsYesYesYesYes
Read data (SQL, Spark)YesYesYesYes
Create itemsYesYesYesNo
Edit and delete itemsYesYesYesNo
Share items externallyYesYesNoNo
Manage workspace settingsYesNoNoNo
Add/remove membersYesYes (not Admins)NoNo
Delete workspaceYesNoNoNo
πŸ’‘ Exam tip: Contributor vs Member

The exam loves testing the line between Member and Contributor:

  • Members can share items with people outside the workspace and manage (add/remove) other members (but not admins)
  • Contributors can create, edit, and delete all items in the workspace but cannot share externally or manage membership

Pattern: β€œA user needs to create notebooks but should NOT be able to share data outside the team” β†’ Contributor

Assigning roles

Assignment MethodExample
Individual usersanika@shopstream.com β†’ Contributor
Security groupsSG-DataEngineers β†’ Member
Microsoft 365 groupsM365-FinanceTeam β†’ Viewer
Service principalssp-etl-pipeline β†’ Contributor (for automated pipelines)
πŸ’‘ Scenario: Ibrahim's role strategy

Ibrahim designs the role assignments for Nexus Financial:

WorkspaceAdminMembersContributorsViewers
Prod-RiskIbrahim, Sarah (compliance)Lead engineers (2)β€”Risk analysts (20), Traders (50)
Dev-RiskIbrahimAll engineers (12)β€”β€”
Analytics-MarketingMarketing leadBI developers (4)Marketing analysts (8)Executives (10)

Key decisions:

  • No Contributors in Dev β€” everyone is a Member so they can collaborate freely
  • No Contributors in Prod β€” only leads (Members) can share; analysts and traders are Viewers
  • Marketing analysts as Contributors β€” they create reports but shouldn’t share externally (client data sensitivity)

Item-level permissions

Sometimes workspace roles are too broad. You want someone to access one lakehouse without seeing everything else in the workspace. That’s where item-level permissions come in.

How item permissions work

ConceptDetail
ShareGive a specific user or group access to a single item (lakehouse, warehouse, report, etc.)
Permission typesRead, ReadAll (SQL/Spark read), Write, Reshare, and Build (for semantic models)
No workspace role neededA user with item-level permissions can access that item without being a workspace member
Link sharingGenerate a link that grants access β€” People in your org, People with existing access, or Specific people

When to use item permissions vs workspace roles

Use workspace roles for broad access, item permissions for targeted access
ScenarioBest ApproachWhy
Team of 10 engineers all working on same contentWorkspace roles (Member/Contributor)They need access to everything β€” no point granting item by item
BI analyst needs access to one lakehouse for Power BI reportsItem-level permissions (ReadAll on lakehouse)They don't need to see pipelines, notebooks, or other lakehouses
External auditor needs to read one specific reportItem-level permissions (Read on report)Minimal access β€” only the specific item they need
Service principal runs a scheduled pipelineWorkspace role (Contributor) or item permissionsDepends on how many items the pipeline touches

ReadAll permission

ReadAll is a specific item permission that grants SQL and Spark read access to all data in a lakehouse or warehouse. Without it, a user might see the item in the workspace but get β€œaccess denied” when they try to query it.

πŸ’‘ Exam tip: ReadAll vs Read
  • Read = can see the item exists and view metadata
  • ReadAll = can query the actual data using SQL endpoint or Spark

Exam pattern: β€œA user has Viewer role in the workspace but cannot query the lakehouse via SQL.” Fix: grant ReadAll on the lakehouse item, or β€” if this is a data-level issue β€” check RLS/CLS (next module).

ℹ️ Scenario: Anika shares a lakehouse externally

Anika at ShopStream builds a product catalog lakehouse that the recommendation team (a separate workspace) needs to read. Instead of adding them to her workspace, she:

  1. Shares the lakehouse item directly with the recommendation team’s security group
  2. Grants ReadAll permission (they need to query via Spark)
  3. Does NOT grant Write (they should never modify product data)

The recommendation team sees only the product catalog lakehouse β€” nothing else in Anika’s workspace.


Question

What are the four Fabric workspace roles, from most to least privileged?

Click or press Enter to reveal answer

Answer

Admin β†’ Member β†’ Contributor β†’ Viewer. Admins manage settings and delete workspaces. Members can share and manage other members. Contributors can create and edit own items. Viewers can only view.

Click to flip back

Question

What is the difference between Read and ReadAll item permissions?

Click or press Enter to reveal answer

Answer

Read lets a user see the item exists and view metadata. ReadAll lets the user query actual data via the SQL endpoint or Spark. Without ReadAll, a user can see a lakehouse but can't run SELECT queries against it.

Click to flip back

Question

Can a user access a Fabric item without being a workspace member?

Click or press Enter to reveal answer

Answer

Yes. Item-level permissions (Share) grant access to specific items without requiring a workspace role. The user sees only the shared item, not other workspace content.

Click to flip back


Knowledge Check

A marketing analyst at Nexus Financial needs to create Power BI reports in the marketing workspace but should NOT be able to share those reports with anyone outside the team. Which workspace role should Ibrahim assign?

Knowledge Check

Anika shares a lakehouse with a data scientist. The scientist can see the lakehouse in Fabric but gets 'access denied' when running a Spark query. What permission is missing?

Knowledge Check

Which of the following can be assigned to a Fabric workspace role? (Select all that apply)

🎬 Video coming soon

Next up: Data Security: Control Who Sees What β€” row-level, column-level, object-level security and dynamic data masking.

← Previous

Deployment Pipelines: Dev to Production

Next β†’

Data Security: Control Who Sees What

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.