Access Policies define who can do what to which resources. In conjunction with Roles, Access Policies determine what users are allowed to do on DataHub.
There are 2 types of Access Policy within DataHub:
- Platform Policies
- Metadata Policies
Platform Policies determine who has platform-level Privileges on DataHub. These include:
- Managing Users & Groups
- Viewing the DataHub Analytics Page
- Managing Policies themselves
Platform policies can be broken down into 2 parts:
- Privileges: Which privileges should be assigned to the Actors (e.g. "View Analytics")
- Actors: Who the should be granted the privileges (Users, or Groups)
A few Platform Policies in plain English include:
- The Data Platform team should be allowed to manage users & groups, view platform analytics, & manage policies themselves
- John from IT should be able to invite new users
Metadata policies determine who can do what to which Metadata Entities. For example:
- Who can edit Dataset Documentation & Links?
- Who can add Owners to a Chart?
- Who can add Tags to a Dashboard?
Metadata policies can be broken down into 3 parts:
- Privileges: The 'what'. What actions are being permitted by a Policy, e.g. "Add Tags".
- Resources: The 'which'. Resources that the Policy applies to, e.g. "All Datasets".
- Actors: The 'who'. Specific users, groups, & roles that the Policy applies to.
A few Metadata Policies in plain English include:
- Dataset Owners should be allowed to edit documentation, but not Tags.
- Jenny, our Data Steward, should be allowed to edit Tags for any Dashboard, but no other metadata.
- James, a Data Analyst, should be allowed to edit the Links for a specific Data Pipeline he is a downstream consumer of.
Each of these can be implemented by constructing DataHub Access Policies.
What you need to manage Access Policies on DataHub:
- Manage Policies Privilege
This Platform Privilege allows users to create, edit, and remove all Access Policies on DataHub. Therefore, it should only be
given to those users who will be serving as Admins of the platform. The default Admin
role has this Privilege.
Policies can be created by first navigating to Settings > Permissions > Policies.
To begin building a new Policy, click Create new Policy.
In the first step, we select the Platform Policy type, and define a name and description for the new Policy.
Good Policy names describe the high-level purpose of the Policy. For example, a Policy named "View DataHub Analytics - Data Governance Team" would be a great way to describe a Platform Policy which grants abilities to view DataHub's Analytics view to anyone on the Data Governance team.
You can optionally provide a text description to add richer details about the purpose of the Policy.
In the second step, we can simply select the Privileges that this Platform Policy will grant.
Platform Privileges most often provide access to perform administrative functions on the Platform. These include:
Platform Privileges | Description |
---|---|
Manage Policies | Allow actor to create and remove access control policies. Be careful - Actors with this Privilege are effectively super users. |
Manage Metadata Ingestion | Allow actor to create, remove, and update Metadata Ingestion sources. |
Manage Secrets | Allow actor to create & remove secrets stored inside DataHub. |
Manage Users & Groups | Allow actor to create, remove, and update users and groups on DataHub. |
Manage All Access Tokens | Allow actor to create, remove, and list access tokens for all users on DataHub. |
Create Domains | Allow the actor to create new Domains |
Manage Domains | Allow actor to create and remove any Domains. |
View Analytics | Allow the actor access to the DataHub analytics dashboard. |
Generate Personal Access Tokens | Allow the actor to generate access tokens for personal use with DataHub APIs. |
Manage User Credentials | Allow the actor to generate invite links for new native DataHub users, and password reset links for existing native users. |
Manage Glossaries | Allow the actor to create, edit, move, and delete Glossary Terms and Term Groups |
Create Tags | Allow the actor to create new Tags |
Manage Tags | Allow the actor to create and remove any Tags |
Manage Public Views | Allow the actor to create, edit, and remove any public (shared) Views. |
Manage Ownership Types | Allow the actor to create, edit, and remove any Ownership Types. |
Manage Platform Settings | (Acryl DataHub only) Allow the actor to manage global integrations and notification settings |
Manage Monitors | (Acryl DataHub only) Allow the actor to create, remove, start, or stop any entity assertion monitors |
Restore Indices API1 | Allow the actor to restore indices for a set of entities via API |
Enable/Disable Writeability API1 | Allow the actor to enable or disable GMS writeability for use in data migrations |
Apply Retention API1 | Allow the actor to apply aspect retention via API |
Explain ElasticSearch Query API1 | Allow actor to explain an ElasticSearch query. |
In this step, we can select the actors who should be granted Privileges appearing on this Policy.
To do so, simply search and select the Users or Groups that the Policy should apply to.
Assigning a Policy to a User
Assigning a Policy to a Group
In the first step, we select the Metadata Policy, and define a name and description for the new Policy.
Good Policy names describe the high-level purpose of the Policy. For example, a Policy named "Full Dataset Edit Privileges - Data Platform Engineering" would be a great way to describe a Metadata Policy which grants all abilities to edit Dataset Metadata to anyone in the "Data Platform" group.
You can optionally provide a text description to add richer detail about the purpose of the Policy.
In the second step, we can simply select the Privileges that this Metadata Policy will grant. To begin, we should first determine which assets that the Privileges should be granted for (i.e. the scope), then select the appropriate Privileges to grant.
Using the Resource Type
selector, we can narrow down the type of the assets that the Policy applies to. If left blank,
all entity types will be in scope.
For example, if we only want to grant access for Datasets
on DataHub, we can select
Datasets
.
Next, we can search for specific Entities of the that the Policy should grant privileges on. If left blank, all entities of the selected types are in scope.
For example, if we only want to grant access for a specific sample dataset, we can search and select it directly.
We can also limit the scope of the Policy to assets that live in a specific Domain. If left blank, entities from all Domains will be in scope.
For example, if we only want to grant access for assets part of a "Marketing" Domain, we can search and select it.
Finally, we will choose the Privileges to grant when the selected entities fall into the defined scope.
Metadata Privileges grant access to change specific entities (i.e. data assets) on DataHub.
The common Metadata Privileges, which span across entity types, include:
Common Privileges | Description |
---|---|
View Entity Page | Allow actor to access the entity page for the resource in the UI. If not granted, it will redirect them to an unauthorized page. |
Edit Tags | Allow actor to add and remove tags to an asset. |
Edit Glossary Terms | Allow actor to add and remove glossary terms to an asset. |
Edit Owners | Allow actor to add and remove owners of an entity. |
Edit Description | Allow actor to edit the description (documentation) of an entity. |
Edit Links | Allow actor to edit links associated with an entity. |
Edit Status | Allow actor to edit the status of an entity (soft deleted or not). |
Edit Domain | Allow actor to edit the Domain of an entity. |
Edit Deprecation | Allow actor to edit the Deprecation status of an entity. |
Edit Lineage | Allow actor to edit custom lineage edges for the entity. |
Edit Data Product | Allow actor to edit the data product that an entity is part of |
Edit Incidents | Allow actor to raise and resolve incidents associated with an entity. |
Propose Tags | (Acryl DataHub only) Allow actor to propose new Tags for the entity. |
Propose Glossary Terms | (Acryl DataHub only) Allow actor to propose new Glossary Terms for the entity. |
Propose Documentation | (Acryl DataHub only) Allow actor to propose new Documentation for the entity. |
Manage Tag Proposals | (Acryl DataHub only) Allow actor to accept or reject proposed Tags for the entity. |
Manage Glossary Terms Proposals | (Acryl DataHub only) Allow actor to accept or reject proposed Glossary Terms for the entity. |
Manage Documentation Proposals | (Acryl DataHub only) Allow actor to accept or reject proposed Documentation for the entity |
Edit Entity | Allow actor to edit any information about an entity. Super user privileges. Controls the ability to ingest using API when REST API Authorization is enabled. |
Get Timeline API1 | Allow actor to get the timeline of an entity via API. |
Get Entity API1 | Allow actor to get an entity via API. |
Get Timeseries Aspect API1 | Allow actor to get a timeseries aspect via API. |
Get Aspect/Entity Count APIs1 | Allow actor to get aspect and entity counts via API. |
Search API | Allow actor to search for entities via API. |
Produce Platform Event API | Allow actor to ingest a platform event via API. |
Specific Metadata Privileges include
Entity | Privilege | Description |
---|---|---|
Dataset | Edit Dataset Column Tags | Allow actor to edit the column (field) tags associated with a dataset schema. |
Dataset | Edit Dataset Column Glossary Terms | Allow actor to edit the column (field) glossary terms associated with a dataset schema. |
Dataset | Edit Dataset Column Descriptions | Allow actor to edit the column (field) descriptions associated with a dataset schema. |
Dataset | Edit Dataset Queries | Allow actor to edit the Highlighted Queries on the Queries tab of the dataset. |
Dataset | View Dataset Usage | Allow actor to access usage metadata about a dataset both in the UI and in the GraphQL API. This includes example queries, number of queries, etc. Also applies to REST APIs when REST API Authorization is enabled. |
Dataset | View Dataset Profile | Allow actor to access a dataset's profile both in the UI and in the GraphQL API. This includes snapshot statistics like #rows, #columns, null percentage per field, etc. |
Dataset | Edit Assertions | Allow actor to change the assertions associated with a dataset. |
Dataset | Edit Monitors | (Acryl DataHub only) Allow actor to change the assertion monitors associated with a dataset. |
Tag | Edit Tag Color | Allow actor to change the color of a Tag. |
Group | Edit Group Members | Allow actor to add and remove members to a group. |
Group | Edit Contact Information | Allow actor to change email, slack handle associated with the group. |
Group | Manage Group Subscriptions | (Acryl DataHub only) Allow actor to subscribe the group to entities. |
Group | Manage Group Notifications | (Acryl DataHub only) Allow actor to change notification settings for the group. |
User | Edit User Profile | Allow actor to change the user's profile including display name, bio, title, profile image, etc. |
User + Group | Edit Contact Information | Allow actor to change the contact information such as email & chat handles. |
Term Group | Manage Direct Glossary Children | Allow actor to change the direct child Term Groups or Terms of the group. |
Term Group | Manage All Glossary Children | Allow actor to change any direct or indirect child Term Groups or Terms of the group. |
In this step, we can select the actors who should be granted the Privileges on this Policy. Metadata Policies can target specific Users & Groups, or the owners of the Entities that are included in the scope of the Policy.
To do so, simply search and select the Users or Groups that the Policy should apply to.
We can also grant the Privileges to the owners of Entities (or Resources) that are in scope for the Policy. This advanced functionality allows of Admins of DataHub to closely control which actions can or cannot be performed by owners.
To update an existing Policy, simply click the Edit on the Policy you wish to change.
Then, make the changes required and click Save. When you save a Policy, it may take up to 2 minutes for changes to be reflected.
To remove a Policy, simply click on the trashcan icon located on the Policies list. This will remove the Policy and deactivate it so that it no longer applies.
When you delete a Policy, it may take up to 2 minutes for changes to be reflected.
In addition to deletion, DataHub also supports "deactivating" a Policy. This is useful if you need to temporarily disable a particular Policy, but do not want to remove it altogether.
To deactivate a Policy, simply click the Deactivate button on the Policy you wish to deactivate. When you change the state of a Policy, it may take up to 2 minutes for the changes to be reflected.
After deactivating, you can re-enable a Policy by clicking Activate.
Out of the box, DataHub is deployed with a set of pre-baked Policies. This set of policies serves the following purposes:
- Assigns immutable super-user privileges for the root
datahub
user account (Immutable) - Assigns all Platform Privileges for all Users by default (Editable)
The reason for #1 is to prevent people from accidentally deleting all policies and getting locked out (datahub
super user account can be a backup)
The reason for #2 is to permit administrators to log in via OIDC or another means outside of the datahub
root account
when they are bootstrapping with DataHub. This way, those setting up DataHub can start managing Access Policies without friction.
Note that these Privileges can and likely should be changed inside the Policies page before onboarding
your company's users.
Policies only affect REST APIs when the environment variable REST_API_AUTHORIZATION
is set to true
for GMS. Some policies only apply when this setting is enabled, marked above, and other Metadata and Platform policies apply to the APIs where relevant, also specified in the table above.
How do Policies relate to Roles?
Policies are the lowest level primitive for granting Privileges to users on DataHub.
Roles are built for convenience on top of Policies. Roles grant Privileges to actors indirectly, driven by Policies behind the scenes. Both can be used in conjunction to grant Privileges to end users.