All posts

What Are Database Roles in Databricks

In Databricks, access control is shaped by database roles. They decide who can read, write, or manage the data that powers your business logic. Understanding and configuring these roles is the difference between a controlled data environment and a security mess waiting to happen. What Are Database Roles in Databricks Database roles are named sets of permissions bundled to streamline access control. Instead of assigning permissions one by one, you group them into a role and assign that role to u

Free White Paper

Just-in-Time Access + Database Access Proxy: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

In Databricks, access control is shaped by database roles. They decide who can read, write, or manage the data that powers your business logic. Understanding and configuring these roles is the difference between a controlled data environment and a security mess waiting to happen.

What Are Database Roles in Databricks
Database roles are named sets of permissions bundled to streamline access control. Instead of assigning permissions one by one, you group them into a role and assign that role to users, service principals, or groups. This reduces complexity and makes audits and scaling security easier.

Common built-in roles include:

  • CAN_VIEW: Grants read-only access to data objects.
  • CAN_MANAGE: Allows modifying schema, objects, and permissions.
  • CAN_USE: Lets users run queries or attach notebooks to the database.

Databricks also allows custom roles through fine-grained access control. This matches the least-privilege principle by ensuring users have only the access they need.

Continue reading? Get the full guide.

Just-in-Time Access + Database Access Proxy: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

How Access Control Works in Databricks
Access control applies on multiple layers: workspace, cluster, and data.

  • Workspace Access Control manages who can view and run notebooks or jobs.
  • Cluster Access Control decides who can attach to or restart compute resources.
  • Table and View Permissions define what data someone can query or modify.

When these layers work together, they create robust boundaries between sensitive and non-sensitive workloads.

Best Practices for Database Roles and Access Control

  1. Map Roles to Business Functions – Assign permissions based on duties, not individuals.
  2. Use Groups Over Individuals – Managing access at the group level scales better.
  3. Adopt Least Privilege – Start with no access and open permissions only when justified.
  4. Audit Regularly – Review permissions to catch role creep and outdated access.
  5. Automate Onboarding and Offboarding – Remove human error from the access lifecycle.

Why It Matters
Improper role management leads to data breaches, compliance issues, and engineering downtime. With clear database roles and tight access control, you balance speed with security.

You can configure and test this model in minutes with live data pipelines and secure role assignments. See it for yourself with hoop.dev and experience a working access control setup without heavy lifting.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts