Data Object Level Security

Data objects include raw databases, filesources, pipelines, and views

Assign Users/Roles to Data

Select and Insert Permissions

Permission Hierarchy

Steps to assign permissions

Controlling access to raw, aggregated or joined tables is done through the Access Control widget.

access_control

Provision access to Databases, Data sources, Data-marts, Pipelines, and Views for users and roles.

BEST PRACTICE

If you can, provision access at the Role level, as this makes for successful ongoing user management. i.e. when a user is onboarded into a company, they are placed into a Role, and that role already has predefined data access measures in place. Further, managing a handful of roles is easier than managing hundreds of users.

Assign Users/Roles to Data

Modify user or role access associated with Databases, Data sources, Data-marts, Pipelines, and/or Views by following the below steps.

  1. Select Database, Data source, Data-mart, Pipeline, or View

  2. Using Assign and Revoke, manage your users and role who have access

  3. Click Apply

Select and Insert permissions

You are then able to modify what level of access that user or role is given through Select and Insert

  1. Click on a user or role for which you want to next configure access to tables and a window shall pop up.

  2. Either click on the checkbox beside SELECT to grant select privilege on all tables or check separate checkboxes to grant select privilege on the corresponding table.

  3. Either click on the checkbox beside INSERT to grant insert privilege on all tables or check separate checkboxes to grant insert privilege on the corresponding table.

  4. Click Apply.

Permission Hierarchy

User and role data access are explicitly configured, unless a user is granted access, they will be denied access to data.

The below diagram show the logic in permission evaluation.

permission_hierarchy

Step to assign permission to roles

  1. Login to Zetaris

  2. Go to access management tab

Roleimage1

3.   Click on data source/ file source on left pane.

4.   Click on assign button for assigned roles.

Roleimage2

5.   After clicking on "Assign" all the available roles will appear. Select the role you want to assign to a particular data source / file source. Then click "Apply."

Roleimage3

6.   The role will be assigned to particular data source / file source Roleimage47.   Now click on the role which you have just assigned. Pop-up will appear.

Roleimage5

8.   Click on the check boxes to select/insert as needed and then click "Apply"

9.   Selected permissions will be assigned to that role for that particular data source/file source

10.  To revoke the permission, click on the role again.

11.  Pop-up will appear. Simply de-select where permission is not needed. This will revoke the permission

12.  To completely remove the role from the data source / file source, click on the "Revoke" button.

Roleimage6

13.  Select the role you want revoke and click "Apply."

14.  This will completely revoke the role