Skip to main content

Permissions Reference

Principle

Grant the minimum permissions required for the selected connector scope. Start with a pilot Purview collection and Databricks catalog/schema before expanding production coverage.

Microsoft Entra ID

Lineage Advisor uses Microsoft Entra ID for administrator sign-in and application authorization.

Typical identity information:

  • Tenant ID.
  • User object ID.
  • User principal name or email.
  • Display name.
  • Application/client ID.

Microsoft Purview

The connector needs permission to write metadata and lineage into the target Purview collection.

Recommended scope:

  • Dedicated Purview collection for pilot.
  • Data Map permissions limited to that collection.
  • Permission to create or update connector-specific type definitions where enabled.

Databricks

The connector needs metadata read access for selected Databricks scopes.

Recommended scope:

  • Dedicated service principal.
  • Selected workspaces.
  • Selected catalogs and schemas.
  • Metadata and lineage read access.

The connector does not require table row data for metadata and lineage sync.

Secret Handling

  • Store secrets only in approved secret storage.
  • Rotate secrets according to enterprise policy.
  • Remove unused credentials immediately.
  • Do not share personal access tokens in support tickets.

Permission Review Checklist

  • Dedicated application identity created.
  • Pilot scope is limited.
  • Production scope approved by data owners.
  • Secret rotation owner assigned.
  • Purview collection owner approved target collection.
  • Databricks administrator approved catalogs and schemas.