non-admin user notebooks attached to admin clusters should restrict run access to non-admin users
Hi Azure Databricks Team,
We have recently observed that if we attach any non-admin users notebooks to restricted/admin clusters, non-admin users are able to run the commands/queries even if they don't have attach/restart/manage permissions on that cluster.
I had a call with MS and Databricks engineers and understood that this is not handled as per current Databricks functionality.
So, I raising this as a feature request. Please help us with this new functionality to make sure the non-admin users are prohibited from running queries/commands on the clusters where they don't have access to.