Are there supposed to be any security restrictions on what the notebooks can do?

Comments

2 comments

  • Avatar
    Sarath Botlagunta

    It is still the same level of exposure as with current spark code processors.
    We have road map features to control security all the way to event store level based on the credentials of the user.

    0
    Comment actions Permalink
  • Avatar
    Mike Z (Edited )

    James is correct. From our perspective, there may be a few users (i.e. Admins) that should be able to perform actions on all objects, but the standard user (and there could be dozens to 100s) should only be to perform these actions on defined objects. As Sarath mentioned, enhanced security controls should support the necessary granularity in granting these permissions.

    0
    Comment actions Permalink

Please sign in to leave a comment.