
Sign up to save your podcasts
Or


The logs showed a deployment to Production. The problem? No one on the team admitted doing it. In this episode, Frank and Kevin investigate the chilling consequences of improper permission control in Microsoft Fabric deployment pipelines. When pipeline settings aren’t locked down, the line between authorized changes and accidental disasters gets dangerously thin.
They uncover:
- How to assign pipeline admin roles and why it matters
- The difference between workspace permissions and pipeline access
- Why role-based access control (RBAC) is your only real defense
- Real-world horror stories of "harmless" edits with very real consequences
🔐 The Unauthorized Push is a cautionary tale about access, accountability — and what happens when you leave the door wide open.
🎧 Listen now. Before someone pushes something they shouldn't.
By Frank Geisler, Kevin ChantThe logs showed a deployment to Production. The problem? No one on the team admitted doing it. In this episode, Frank and Kevin investigate the chilling consequences of improper permission control in Microsoft Fabric deployment pipelines. When pipeline settings aren’t locked down, the line between authorized changes and accidental disasters gets dangerously thin.
They uncover:
- How to assign pipeline admin roles and why it matters
- The difference between workspace permissions and pipeline access
- Why role-based access control (RBAC) is your only real defense
- Real-world horror stories of "harmless" edits with very real consequences
🔐 The Unauthorized Push is a cautionary tale about access, accountability — and what happens when you leave the door wide open.
🎧 Listen now. Before someone pushes something they shouldn't.