<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to use Row Level Security on a Sync table in Lakebase in Lakebase Discussions</title>
    <link>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148077#M8</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/215694"&gt;@Jeffrey-&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Short answer: you’re not doing anything wrong—this is expected with Lakebase synced tables.&amp;nbsp;&lt;STRONG&gt;UC row filters/masks don’t apply to Lakebase synced tables yet; RLS must be defined on the Postgres side separately.&amp;nbsp;&lt;/STRONG&gt;Synced tables are owned in Postgres by a system role (for example, databricks_writer_16400), not by the UC owner, so &lt;CODE class="p8i6j0f"&gt;ALTER TABLE ... ENABLE ROW LEVEL SECURITY&lt;/CODE&gt; fails with “must be owner.&lt;/P&gt;
&lt;P class="p8i6j01 paragraph"&gt;What to do&lt;/P&gt;
&lt;UL class="p8i6j07 p8i6j02"&gt;
&lt;LI class="p8i6j0a"&gt;Create a Postgres VIEW over the synced table and apply RLS to the VIEW, then point your app to the VIEW. This avoids ownership and sync conflicts and is the recommended pattern.
&lt;DIV class="_1ibi0s314 _1ibi0s3cl tk0j8o2 tk0j8o0"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="p8i6j0a"&gt;If you need RLS on the base object, use a non-synced Lakebase table that you own or build a custom pipeline that writes directly to Lakebase so you control ownership/RLS&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;We expect to add more support cross lakebase &amp;lt;-&amp;gt; UC permissions in the future.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if you'd like other work arounds!&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Feb 2026 19:52:00 GMT</pubDate>
    <dc:creator>sarahbhord</dc:creator>
    <dc:date>2026-02-11T19:52:00Z</dc:date>
    <item>
      <title>How to use Row Level Security on a Sync table in Lakebase</title>
      <link>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148045#M7</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Im trying to test some stuff out with the Databricks Lakebase, i want to connect the Lakebase to our custom frontend application. Using lakebase, since it is postgres based should result in faster query performance. I created a synced table to sync from Unity Catalog to Lakebase (autoscaling), this works well. But now im trying to enable Row Level Security but i cant get this to work. Is this just not supported or am i doing something wrong?&lt;/P&gt;&lt;P&gt;When execute the following SQL command: `ALTER TABLE "my_table" ENABLE ROW LEVEL SECURITY` i get this error:&amp;nbsp;ERROR: must be owner of table my_table (SQLSTATE 42501)&lt;/P&gt;&lt;P&gt;When i check who the owner is, it results in: SELECT tableowner FROM pg_tables WHERE tablename = 'my_table';&lt;BR /&gt;databricks_writer_16400&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 12:45:37 GMT</pubDate>
      <guid>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148045#M7</guid>
      <dc:creator>Jeffrey-</dc:creator>
      <dc:date>2026-02-11T12:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Row Level Security on a Sync table in Lakebase</title>
      <link>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148077#M8</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/215694"&gt;@Jeffrey-&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Short answer: you’re not doing anything wrong—this is expected with Lakebase synced tables.&amp;nbsp;&lt;STRONG&gt;UC row filters/masks don’t apply to Lakebase synced tables yet; RLS must be defined on the Postgres side separately.&amp;nbsp;&lt;/STRONG&gt;Synced tables are owned in Postgres by a system role (for example, databricks_writer_16400), not by the UC owner, so &lt;CODE class="p8i6j0f"&gt;ALTER TABLE ... ENABLE ROW LEVEL SECURITY&lt;/CODE&gt; fails with “must be owner.&lt;/P&gt;
&lt;P class="p8i6j01 paragraph"&gt;What to do&lt;/P&gt;
&lt;UL class="p8i6j07 p8i6j02"&gt;
&lt;LI class="p8i6j0a"&gt;Create a Postgres VIEW over the synced table and apply RLS to the VIEW, then point your app to the VIEW. This avoids ownership and sync conflicts and is the recommended pattern.
&lt;DIV class="_1ibi0s314 _1ibi0s3cl tk0j8o2 tk0j8o0"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="p8i6j0a"&gt;If you need RLS on the base object, use a non-synced Lakebase table that you own or build a custom pipeline that writes directly to Lakebase so you control ownership/RLS&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;We expect to add more support cross lakebase &amp;lt;-&amp;gt; UC permissions in the future.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if you'd like other work arounds!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 19:52:00 GMT</pubDate>
      <guid>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148077#M8</guid>
      <dc:creator>sarahbhord</dc:creator>
      <dc:date>2026-02-11T19:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Row Level Security on a Sync table in Lakebase</title>
      <link>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148322#M9</link>
      <description>&lt;P&gt;But isn't supposed UC to be governance layer on too of not only managed catalogs/tables, but also:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;foreign catalogs - via query federation (jdbc + storage for iceberg)&lt;/LI&gt;&lt;LI&gt;foreign catalogs - via catalog federation&lt;/LI&gt;&lt;LI&gt;delta shares&lt;/LI&gt;&lt;LI&gt;including external tables created via sql in uc managed catalog&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 13:40:05 GMT</pubDate>
      <guid>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148322#M9</guid>
      <dc:creator>emanueol</dc:creator>
      <dc:date>2026-02-13T13:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Row Level Security on a Sync table in Lakebase</title>
      <link>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148332#M10</link>
      <description>&lt;DIV class="prose dark:prose-invert inline leading-relaxed break-words min-w-0 [word-break:break-word] prose-strong:font-medium visRefresh2026Fonts:prose-strong:font-bold [&amp;amp;_&amp;gt;*:first-child]:mt-0 [&amp;amp;_&amp;gt;*:last-child]:mb-0"&gt;
&lt;P class="my-2 [&amp;amp;+p]:mt-4 [&amp;amp;_strong:has(+br)]:inline-block [&amp;amp;_strong:has(+br)]:pb-2"&gt;Hey &lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/75124"&gt;@emanueol&lt;/a&gt;! &lt;BR /&gt;&lt;BR /&gt;Good question - While UC is designed to provide a governance layer across managed tables, external tables, foreign catalogs (via query and catalog federation), and shares, there are architectural limitations when data is accessed outside Databricks compute.&lt;/P&gt;
&lt;P class="my-2 [&amp;amp;+p]:mt-4 [&amp;amp;_strong:has(+br)]:inline-block [&amp;amp;_strong:has(+br)]:pb-2"&gt;Unity Catalog's row filters and column masks are enforced at&amp;nbsp;query time within Databricks. When you query a Lakebase synced table directly via PostgreSQL (bypassing Databricks SQL warehouses), UC's access controls cannot be enforced because the query execution happens entirely within the PostgreSQL engine.&amp;nbsp;&lt;/P&gt;
&lt;P class="my-2 [&amp;amp;+p]:mt-4 [&amp;amp;_strong:has(+br)]:inline-block [&amp;amp;_strong:has(+br)]:pb-2"&gt;We do expect to add more integrated support for permissions between Lakebase and Unity Catalog in the future.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 13 Feb 2026 14:20:59 GMT</pubDate>
      <guid>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148332#M10</guid>
      <dc:creator>sarahbhord</dc:creator>
      <dc:date>2026-02-13T14:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Row Level Security on a Sync table in Lakebase</title>
      <link>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148335#M11</link>
      <description>&lt;P&gt;My perception is acessing any type of UC data (managed tables, manager external tables, foreign catalogs, delta shares, legacy hms) VIA Databricks compute, all have all types of UC governance like (row access or column masking policies, tagging etc) right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 14:47:45 GMT</pubDate>
      <guid>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148335#M11</guid>
      <dc:creator>emanueol</dc:creator>
      <dc:date>2026-02-13T14:47:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Row Level Security on a Sync table in Lakebase</title>
      <link>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148349#M12</link>
      <description>&lt;P class="wnfdnte lia-align-left" data-pm-slice="1 1 []"&gt;&lt;FONT size="4"&gt;Thanks&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/75124"&gt;@emanueol&lt;/a&gt;!&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="wnfdnte lia-align-left" data-pm-slice="1 1 []"&gt;&lt;FONT size="4"&gt;Short answer: mostly yes — when you access data as a Unity Catalog (UC) object on Databricks compute, UC governance applies. There are important nuances by source:&lt;/FONT&gt;&lt;/P&gt;
&lt;UL class="lia-align-left" dir="auto"&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;Managed tables (Delta, Iceberg): Full UC governance. Row filters/column masks are supported on managed Delta; managed Iceberg doesn’t support row filters/masks yet. See managed tables overview and benefits and Iceberg limitation:&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;&lt;A href="https://docs.databricks.com/aws/en/tables/managed#unity-catalog-managed-tables-in-databricks-for-delta-lake-and-apache-iceberg" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/tables/managed#unity-catalog-managed-tables-in-databricks-for-delta-lake-and-apache-iceberg&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;&lt;A href="https://docs.databricks.com/aws/en/data-governance/unity-catalog/filters-and-masks#limitations" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/data-governance/unity-catalog/filters-and-masks#limitations&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;External tables (registered in UC): Policies are enforced at query time; avoid path/URI reads that bypass UC; FGAC has runtime requirements (e.g., DBR 15.4+ reads; 16.3+ writes on dedicated with serverless filtering). Details: &lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;Row/column policies at query time: &lt;A href="https://docs.databricks.com/aws/en/data-governance/unity-catalog/filters-and-masks#what-are-row-filters" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/data-governance/unity-catalog/filters-and-masks#what-are-row-filters&lt;/A&gt; and &lt;A href="https://docs.databricks.com/aws/en/data-governance/unity-catalog/filters-and-masks#what-are-column-masks" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/data-governance/unity-catalog/filters-and-masks#what-are-column-masks&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;Path-bypass + dedicated compute requirements: &lt;A href="https://docs.databricks.com/aws/en/data-governance/unity-catalog/filters-and-masks#limitations" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/data-governance/unity-catalog/filters-and-masks#limitations&lt;/A&gt; and &lt;A href="https://docs.databricks.com/aws/en/data-governance/unity-catalog/filters-and-masks#dedicated-access-mode-limitation" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/data-governance/unity-catalog/filters-and-masks#dedicated-access-mode-limitation&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;External access patterns (governance boundary for cloud URIs): &lt;A href="https://docs.databricks.com/aws/en/external-access#access-non-delta-lake-tabular-data-with-external-tables" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/external-access#access-non-delta-lake-tabular-data-with-external-tables&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;Foreign catalogs (HMS/Glue federation): UC provides permissions, lineage, auditing when you query via the UC foreign catalog, but feature coverage is narrower; external HMS/Glue are read‑only for writes; see: &lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;Governance layer overview: &lt;A href="https://docs.databricks.com/aws/en/query-federation/hms-federation-concepts#overview-of-hive-metastore-federation" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/query-federation/hms-federation-concepts#overview-of-hive-metastore-federation&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;Feature matrix + differences: &lt;A href="https://docs.databricks.com/aws/en/query-federation/hms-federation-concepts#how-does-hive-metastore-federation-compare-to-using-unity-catalog-external-tables" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/query-federation/hms-federation-concepts#how-does-hive-metastore-federation-compare-to-using-unity-catalog-external-tables&lt;/A&gt; and &lt;A href="https://docs.databricks.com/aws/en/query-federation/hms-federation-concepts#requirements-and-feature-support" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/query-federation/hms-federation-concepts#requirements-and-feature-support&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;Write support constraints: &lt;A href="https://docs.databricks.com/aws/en/query-federation/hms-federation-concepts#what-does-it-mean-to-write-to-a-foreign-catalog-in-a-federated-hive-metastore" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/query-federation/hms-federation-concepts#what-does-it-mean-to-write-to-a-foreign-catalog-in-a-federated-hive-metastore&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;ABAC runtime requirement (if using tag-driven policies): &lt;A href="https://docs.databricks.com/aws/en/data-governance/unity-catalog/abac#limitations" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/data-governance/unity-catalog/abac#limitations&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;Delta Sharing: Providers cannot share tables that already have row filters or column masks; recipients can apply their own policies on their side: &lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;Provider limitation + recipient capability: &lt;A href="https://docs.databricks.com/aws/en/data-governance/unity-catalog/filters-and-masks#limitations" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/data-governance/unity-catalog/filters-and-masks#limitations&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;Related sharing updates: &lt;A href="https://docs.databricks.com/aws/en/release-notes/product/2025/june#cross-platform-view-sharing-is-now-ga" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/release-notes/product/2025/june#cross-platform-view-sharing-is-now-ga&lt;/A&gt; and &lt;A href="https://docs.databricks.com/aws/en/release-notes/product/2025/june#sharing-managed-iceberg-tables-in-delta-sharing-is-in-public-preview" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/release-notes/product/2025/june#sharing-managed-iceberg-tables-in-delta-sharing-is-in-public-preview&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;Legacy hive_metastore accessed directly (not via UC): UC policies don’t apply unless the data is exposed through a UC foreign catalog or migrated:&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI dir="auto"&gt;
&lt;P class="wnfdnte"&gt;&lt;FONT size="4"&gt;Federation overview + feature support: &lt;A href="https://docs.databricks.com/aws/en/query-federation/hms-federation-concepts#overview-of-hive-metastore-federation" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/query-federation/hms-federation-concepts#overview-of-hive-metastore-federation&lt;/A&gt; and &lt;A href="https://docs.databricks.com/aws/en/query-federation/hms-federation-concepts#requirements-and-feature-support" target="_blank" rel="noopener noreferrer nofollow"&gt;https://docs.databricks.com/aws/en/query-federation/hms-federation-concepts#requirements-and-feature-support&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="wnfdnte lia-align-left"&gt;&lt;FONT size="4"&gt;Bottom line: Access data as UC objects to get UC governance. Coverage is strongest on managed/external UC tables, more limited on foreign catalogs, and behaves differently for Delta Sharing. Mind runtime/compute requirements for fine‑grained controls and avoid path-based reads that bypass UC.&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="wnfdnte lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 15:26:54 GMT</pubDate>
      <guid>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148349#M12</guid>
      <dc:creator>sarahbhord</dc:creator>
      <dc:date>2026-02-13T15:26:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Row Level Security on a Sync table in Lakebase</title>
      <link>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148454#M13</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/143567"&gt;@sarahbhord&lt;/a&gt;&amp;nbsp;let me have time merging your insights with my ongoing matrix excel of possibilities, check attached picture for the answers im trying to complete on my own personal inception to DBC UC catalogs and tables.&lt;/P&gt;&lt;P&gt;Many thanks for all shared links as starting point for me go through and try complete my matrix.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Feb 2026 20:33:20 GMT</pubDate>
      <guid>https://community.databricks.com/t5/lakebase-discussions/how-to-use-row-level-security-on-a-sync-table-in-lakebase/m-p/148454#M13</guid>
      <dc:creator>emanueol</dc:creator>
      <dc:date>2026-02-15T20:33:20Z</dc:date>
    </item>
  </channel>
</rss>

