AWS Lake Formation - Push Mode - Access Management¶
Connector configuration modes
This document describes the configuration modes for the AWS Lake Formation connector with Privacera using the Push mode. If your are looking information about Pull mode, then refer to AWS Lake Formation - Pull mode. For differences between the Push and Pull modes, refer to.
Introduction¶
In this mode, Privacera is the source of truth for access control policies. For more information on the Push mode, refer to Push mode.
Access Management¶
Topic | Detail |
---|---|
Integration methodology | Privacera PolicySync |
Access Tools | AWS Console, JDBC |
Supported User Identities | AWS IAM, SAML |
Supported User Identities
All user identities are not supported in all AWS services and connections. Refer to AWS documentation for the capabilities of accessing AWS services like AWS Athena and AWS Redshift using AWS Console and JDBC
Supported Access Management Features¶
Feature | Supported | Native | Using SecureView |
---|---|---|---|
Database Access Control | Yes | Yes | N/A |
Table Access Control | Yes | Yes | N/A |
View Access Control | Yes | Yes | N/A |
Column Access Control | Yes | Yes | N/A |
Row Access Control | Yes | Yes | N/A |
Cell Access Control | No | No | N/A |
Dynamic Column Data Masking | No | No | N/A |
Dynamic Column Data Encryption | No | No | N/A |
Centralized Access Audit | Yes | N/A | N/A |
Granular Access Audit Record | No | N/A | N/A |
Limitations for Access Management Features¶
- Lake Formation doesn't support external UDF, so column masking and encryption from Privacera are not available.
- Privacera doesn't support Cell Level Filtering for Lake Formation.
User Identity Mapping¶
Lake Formation supported services like AWS Athena and AWS Redshift Spectrum use AWS IAM and SAML users for access control. The roles in Privacera are mapped to the IAM roles in AWS. Any permissions granted to the roles in Privacera are pushed to Lake Formation for the corresponding IAM roles. For SAML users and groups, the permissions for users and groups in Privacera are pushed to Lake Formation with the SAML ARN prefix.
This connector pulls the IAM roles from AWS IAM and adds them to Privacera as roles. Any policies defined in Privacera for these roles are pushed to Lake Formation for the corresponding IAM roles.
AWS IAM Roles and Lake Formation¶
sequenceDiagram
participant PrivaceraPlatform
participant PrivaceraConnector
participant AWS IAM
participant LakeFormation
PrivaceraConnector->>AWS IAM: Pull IAM roles
AWS IAM-->>PrivaceraConnector: IAM roles added as<br> Privacera roles
PrivaceraConnector->>PrivaceraPlatform: Add IAM roles to<br> Privacera Platform as roles
PrivaceraConnector->>PrivaceraPlatform: Get policies from Privacera
PrivaceraPlatform->>PrivaceraConnector: Privacera Policies
PrivaceraConnector->>LakeFormation: Push permissions for IAM roles
Users for Roles
For the roles are created in Privacera, the users for the roles need to be explicitly added to the roles. [TODO: Give link here]
SAML Users and Groups in Lake Formation¶
sequenceDiagram
participant PrivaceraPlatform
participant PrivaceraConnector
participant LakeFormation
PrivaceraConnector->>PrivaceraPlatform: Get policies from Privacera<br> for Corporate Users and Groups
PrivaceraPlatform->>PrivaceraConnector: Privacera Policies
PrivaceraConnector->>LakeFormation: Push permissions for SAML users<br> and groups by ARN
Discovery Features¶
Discover features are not supported in Lake Formation connectors
Data Encryption Features¶
Data encryption features are not supported in Lake Formation connectors
- Prev topic: About Lake Formation
- Next topic: Prerequisites