Skip to content

Commit bbd9011

Browse files
Merge pull request #36762 from Madhumitatripathy/patch-17
Document Dynamic Data Masking in Fabric SQL Database
2 parents 5d519f1 + aa4d6db commit bbd9011

1 file changed

Lines changed: 8 additions & 0 deletions

File tree

docs/relational-databases/security/dynamic-data-masking.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,14 @@ It's important to properly manage the permissions on the database, and to always
140140

141141
Starting with [!INCLUDE [sssql22-md](../../includes/sssql22-md.md)], you can prevent unauthorized access to sensitive data and gain control by masking it to an unauthorized user at different levels of the database. You can grant or revoke **UNMASK** permission at the database-level, schema-level, table-level or at the column-level to a user, database role, Microsoft Entra identity, or Microsoft Entra group. This enhancement provides a more granular way to control and limit unauthorized access to data stored in the database and improve data security management.
142142

143+
## Dynamic data masking in Fabric SQL database
144+
145+
Dynamic data masking is supported in SQL database in Microsoft Fabric. DDM functionality in Fabric SQL database is consistent with Azure SQL Database.
146+
147+
The `EXECUTE AS USER` clause isn't supported in Fabric SQL database. To test masking behavior, connect as a different user who doesn't have the **UNMASK** permission, and verify that the masked data returns as expected.
148+
149+
You can only configure dynamic data masking in Fabric SQL database through [!INCLUDE [tsql](../../includes/tsql-md.md)]. Define masking functions explicitly on table columns using [!INCLUDE [tsql](../../includes/tsql-md.md)] statements.
150+
143151
## Examples
144152

145153
<a id="creating-a-dynamic-data-mask"></a>

0 commit comments

Comments
 (0)