Prerequisites for Lake Formation Push Mode - Access Management¶
AWS Lake Formation connector with Privacera using the Push mode requires the following prerequisites:
Mandatory Prerequisites¶
Prerequisites | Detail |
---|---|
IAM policies for managing Lake Formation Policies. Refer | This is used to update the policies in AWS Lake Formation |
IAM policies to read from Glue Data Catalog Refer | This is used the retrieve the list of databases and tables from AWS Glue Catalog. |
IAM policies to retrieve IAM Roles Refer | This is used to retrieve the list of roles and users from AWS IAM. The permissions will be only managed for the users and roles in the IAM |
IAM role for the Privacera Connector Refer | IAM Role which consists of all the IAM policies that are required by this connector |
Allow Privacera to manage the policies in your AWS Lake Formation | Allow the IAM role used by the Privacera Lake Formation connector to be the administrator Lake Formation policies Refer |
[Self Managed/Data Plane ] Kubernetes pod with access to the IAM Role | If the Lake Formation connector is deployed in your VPC, then the Kubernetes pod should have access to the IAM role to manage the policies in AWS Lake Formation. |
[PrivaceraCloud ] Trust Policy to PrivaceraCloud for the IAM Role Refer | If the Lake Formation connector is deployed in PrivaceraCloud, then the IAM Role should have a trust policy to PrivaceraCloud to manage the policies in your AWS Lake Formation. This should be attached to the role from the PrivaceraCloud. check here |
Optional Prerequisites¶
Prerequisites | Detail |
---|---|
IAM policies for sharing resource across AWS Accounts. Refer | This policy is required if you are managing policies in other AWS Accounts. Additional Details |
Appendix¶
IAM Policies for managing Lake Formation¶
The following IAM policies are required to update the policies in AWS Lake Formation. You can name it privacera-lf-push-policy
.
privacera-lf-push-policy
IAM policies to read from Glue Data Catalog¶
The following IAM policies are required to read from the Glue Data Catalog. You can name it privacera-lf-glue-read-policy
. This connector doesn't require write access to the Glue Data Catalog.
privacera-lf-glue-read-policy
JSON | |
---|---|
IAM policies to retrieve IAM Roles¶
The following IAM policies are required to retrieve the IAM roles. You can name it privacera-lf-iam-read-policy
. This connector doesn't require write access to the IAM roles and it will not create or modify any IAM roles.
privacera-lf-iam-read-policy
IAM policies for sharing resource across AWS Accounts¶
The following IAM policies are required to share resources across AWS Accounts. You can name it privacera-lf-share-policy
. If you are using the Data Mesh design pattern and/or sharing resources across AWS accounts, you need to add additional permissions so that Privacera can manage the policies in the shared resources in other accounts also.
privacera-lf-share-policy
IAM Role for the Privacera Connector¶
The following IAM role is required for the Privacera Connector. You can name it privacera-lf-push-connector-role
.
privacera-lf-push-connector-role
Include the following policies in the IAM role:
- privacera-lf-push-policy
- privacera-lf-glue-read-policy
- privacera-lf-iam-read-policy
- privacera-lf-share-policy [Optional]
Lake Formation Administrator Configuration¶
The IAM Role used by the Privacera Lake Formation connector should have the administrator privileges to manage the policies Lake Formation
- Log in to AWS Account and navigate to AWS Lake Formation > Administrative roles and tasks.
- Click [Add] in the Data lake administrators section
- For Access Type [Data lake administrator] search for the role that was created for Privacera Lake Formation e.g.
privacera-lf-push-connector-role
and select it. - Click [Confirm].
Trust Policy to PrivaceraCloud for the IAM Role¶
If the Lake Formation connector is deployed in PrivaceraCloud, then the IAM Role should have a trust policy to PrivaceraCloud to manage the policies in your AWS Lake Formation. This should be attached to the role from the PrivaceraCloud. Go to the AWS IAM console and attach the following trust policy to the IAM Role you created for the Privacera Lake Formation connector.
Update
Please contact Privacera support to get the <ROLE_ARN>
for the PrivaceraCloud.
Trust Policy to PrivaceraCloud for the IAM Role
- Prev topic: Push Mode Overview
- Next topic: Setup