<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Default ACL for Jobs and Clusters in Data Engineering</title>
    <link>https://community.databricks.com/t5/data-engineering/default-acl-for-jobs-and-clusters/m-p/153064#M53926</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/160404"&gt;@murtadha_s&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;Can you please clarify what you are after? The second part of your question sounded more like a statement: "but currently I need to apply my ACL at every created job/cluster separately," and that confused me a bit.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To make sure we point you to the best option... how are you creating your jobs and clusters today (UI, REST, Terraform, bundles), and what default ACL behaviour are you trying to enforce (for example, always granting a specific group CAN_VIEW or CAN_MANAGE)?&lt;/P&gt;
&lt;P data-pm-slice="1 1 []"&gt;Just so that you know, there isn’t currently a way to define a workspace‑wide "default ACL" for all new jobs and clusters via cluster policies. Policies control which config options users can set (instance types, runtime, autoscaling, etc.), but they don’t set object permissions.&lt;/P&gt;
&lt;P&gt;When it comes to Jobs, if Job ACLs are enabled in the workspace, you can pass an access_control_list when creating jobs through the REST API/SDK (/api/2.1/jobs/create or /jobs/runs/submit). That lets you apply a consistent ACL pattern at creation time.&amp;nbsp;The job’s ACLs also govern the associated job clusters, so you don’t need a separate ACL template for those.&lt;/P&gt;
&lt;P&gt;For all‑purpose (interactive) clusters, there’s no built‑in default ACL template. The usual approach is to enforce a pattern via the Permissions API / Terraform / Databricks bundles when clusters are created, rather than via cluster policy.&lt;/P&gt;
&lt;P class="p1"&gt;&lt;FONT size="2" color="#FF6600"&gt;&lt;STRONG&gt;&lt;I&gt;If this answer resolves your question, could you mark it as “Accept as Solution”? That helps other users quickly find the correct fix.&lt;/I&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;I&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P class="wnfdntd"&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Apr 2026 15:13:36 GMT</pubDate>
    <dc:creator>Ashwin_DSA</dc:creator>
    <dc:date>2026-04-02T15:13:36Z</dc:date>
    <item>
      <title>Default ACL for Jobs and Clusters</title>
      <link>https://community.databricks.com/t5/data-engineering/default-acl-for-jobs-and-clusters/m-p/153042#M53916</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;I want to set default ACL that applies to all created jobs and clusters, according to a cluster policy for example, but currently I need to apply my ACL at every created job/cluster separately.&lt;/P&gt;&lt;P&gt;is there a way to do that?&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 13:37:19 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/default-acl-for-jobs-and-clusters/m-p/153042#M53916</guid>
      <dc:creator>murtadha_s</dc:creator>
      <dc:date>2026-04-02T13:37:19Z</dc:date>
    </item>
    <item>
      <title>Re: Default ACL for Jobs and Clusters</title>
      <link>https://community.databricks.com/t5/data-engineering/default-acl-for-jobs-and-clusters/m-p/153064#M53926</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/160404"&gt;@murtadha_s&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;Can you please clarify what you are after? The second part of your question sounded more like a statement: "but currently I need to apply my ACL at every created job/cluster separately," and that confused me a bit.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To make sure we point you to the best option... how are you creating your jobs and clusters today (UI, REST, Terraform, bundles), and what default ACL behaviour are you trying to enforce (for example, always granting a specific group CAN_VIEW or CAN_MANAGE)?&lt;/P&gt;
&lt;P data-pm-slice="1 1 []"&gt;Just so that you know, there isn’t currently a way to define a workspace‑wide "default ACL" for all new jobs and clusters via cluster policies. Policies control which config options users can set (instance types, runtime, autoscaling, etc.), but they don’t set object permissions.&lt;/P&gt;
&lt;P&gt;When it comes to Jobs, if Job ACLs are enabled in the workspace, you can pass an access_control_list when creating jobs through the REST API/SDK (/api/2.1/jobs/create or /jobs/runs/submit). That lets you apply a consistent ACL pattern at creation time.&amp;nbsp;The job’s ACLs also govern the associated job clusters, so you don’t need a separate ACL template for those.&lt;/P&gt;
&lt;P&gt;For all‑purpose (interactive) clusters, there’s no built‑in default ACL template. The usual approach is to enforce a pattern via the Permissions API / Terraform / Databricks bundles when clusters are created, rather than via cluster policy.&lt;/P&gt;
&lt;P class="p1"&gt;&lt;FONT size="2" color="#FF6600"&gt;&lt;STRONG&gt;&lt;I&gt;If this answer resolves your question, could you mark it as “Accept as Solution”? That helps other users quickly find the correct fix.&lt;/I&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;I&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P class="wnfdntd"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 15:13:36 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/default-acl-for-jobs-and-clusters/m-p/153064#M53926</guid>
      <dc:creator>Ashwin_DSA</dc:creator>
      <dc:date>2026-04-02T15:13:36Z</dc:date>
    </item>
  </channel>
</rss>

