Users, Groups, and Roles Management¶
Privacera's AWS Redshift connector provides an option to limit the users, groups, and roles that need to be managed by the connector. This can be achieved by specifying the users, groups, and roles that need to be managed or ignored by the connector. Ignored users, groups and roles have precedence over managed users, groups, and roles.
This section provides details on how to configure the connector to manage them.
Setup¶
The following properties define comma-separated lists of users, groups, and roles to be managed by PolicySync. If you wish to manage all resources, you can skip specifying these properties. Wildcards (*)are supported to match multiple resources.
Example:
- Users:
user1, user2, dev_user*
- Groups:
group1, group2, dev_group_*
- Roles:
role1, role2, dev_role_*
Replace the example values with your actual user, group, and role names.
-
SSH to the instance where Privacera Manager is installed.
-
Run the following command to open the
.yml
file to be edited.If you have multiple connectors, then replace
instance1
with the appropriate connector instance name.Bash -
If you want to manage only specific users, groups, and roles, specify them in the respective lists. Leave the values empty or put
*
, to manage all users, groups, and roles. -
To exclude specific users, groups, and roles from the connector, set the following properties.
-
Once the properties are configured, run the following commands to update your Privacera Manager platform instance:
Step 1 - Setup which generates the helm charts. This step usually takes few minutes.
Step 2 - Apply the Privacera Manager helm charts. Step 3 - Post-installation step which generates Plugin tar ball, updates Route 53 DNS and so on.
-
Navigate to Settings -> Applications.
-
On the Connected Applications screen, select Redshift application.
-
Click the edit icon, click on Access Management -> ADVANCED tab.
-
For including specific users, groups, and roles, enter the values in the following fields:
- Users to set access control policies:
user1, user2, dev_user*
- Groups to set access control policies:
group1, group2, dev_group_*
- Roles to set access control policies:
role1, role2, dev_role_*
- Users to set access control policies:
-
For excluding specific users, groups, and roles, enter the values in the following fields:
- Users to be ignored by access control policies:
user_a, user_b
- Groups be ignored by access control policies:
group_a, group_b, dev_group_*
- Roles be ignored by access control policies:
role_a, role_b, dev_role_*
- Users to be ignored by access control policies:
-
Click Save to apply the changes.
- Prev topic: Advanced Configuration