Hello @Anusha S Raj ,
Welcome to the Microsoft Q&A platform and thanks for posting your query.
Have you got a chance to look at this article: Azure Databricks - Access Azure Data Lake Storage Gen2 using OAuth 2.0 with an Azure service principal
The above article explains how to connect to ADLS gen2 from Azure Databricks using Service principal and when you use service principal authentication, you can associate that security principal with an access level for files and directories. Each association is captured as an entry in an access control list (ACL). Each file and directory in your storage account has an access control list. When a security principal attempts an operation on a file or directory, An ACL check determines whether that security principal (user, group, service principal, or managed identity) has the correct permission level to perform the operation.
I would recommend looking at this document which has detailed info about the ACL's in ADLS Gen2 and help avoid other authorization mechanisms like Shared Keys, SAS or RBACs.