โ02-10-2026 03:48 AM
โ02-10-2026 03:49 AM
โ02-11-2026 08:23 AM
The Creator will always have CAN_MANAGE in addition to the Workspace Admins.
In your screenshot that 3rd row email is a different one from the creator right?
Creator (1st row email) ends with "a". 3rd row email ends with "s".
Are you trying to make sure that 3rd email does not have CAN_MANAGE?
โ02-12-2026 06:23 AM
No โ Iโm not trying to remove the CAN_MANAGE permission from the third email. That user was added only as a test to see how a newly added user with CAN_MANAGE would appear.
My actual issue is different:
Regular workspace users automatically receive CAN_MANAGE on the dashboards they create, which means they can share those dashboards freely. What I want is to disable the sharing option for non-admin users.
I initially thought that changing the dashboard creatorโs permission from CAN_MANAGE to CAN_EDIT could help, but I realized this isnโt possible because:
Given these constraints, Iโm looking for another way to disable the share button for users who are not workspace admins, allowing only admins to share dashboards and change sharing settings.
โ02-20-2026 04:21 PM
Ah ok. That suggests that your issue lies further up. Try navigating up all the way up to the top and see what your permissions are set up like. In this example, I navigated all the way up to the "Workspace" and I can see that "All workspace users" have View access. Check if yours are more permissible.
But to be clear, there isn't a setting that prevents User1 from creating Dashboard1 and choosing to Share it with User2/Group3.
โ
โ02-25-2026 10:52 AM
Thank you for your response. I wasnโt able to find an ideal way to disable the Share button for regular users, nor to prevent them from adding new users and assigning permission levels directly on the dashboard.
What Iโm currently testing is a routine that monitors dashboard permissions through a Databricks API endpoint. The routine checks the ACL list for each dashboard in the workspace, evaluating all users, groups, and their respective permission levels. If it finds that any dashboard has users or groups with permissions beyond the admin group and the owner, it automatically resets those permissions. It also consistently resets the View access for โAll workspace usersโ back to its default state.
My intention with this approach is to enforce stronger control over how sensitive business dashboards and data are shared across users, promoting a stricter โleast privilegeโ access policy.
โ02-26-2026 12:24 PM
Makes sense. You can't unilaterally disable the "Share" option. Because it is expected that users share objects they own. There have been requests from customers to try and guardrail this such as maybe members of a team/group can share with each other but no broader etc. But that's not a thing today. So your approach seems like a good corrective option.