Using Databricks Native Public Group¶
This property controls whether PolicySync should use the native public
group in Databricks for access grants.
True
(Default): Grants access to all users via the Databrickspublic
group.False
: Disables thepublic
group, and all access must be explicitly assigned to specific users or groups. However, Privacera groups with specified prefixes will still be granted access.
-
SSH to the instance where Privacera Manager is installed.
-
Run the following command to open the
.yml
file to be edited.If you have multiple connectors, then replace
instance1
with the appropriate connector instance name.Bash -
Set the following property to control whether PolicySync should use the native
public
group in Databricks for access grants.Bash -
Once the properties are configured, run the following commands to update your Privacera Manager platform instance:
Step 1 - Setup which generates the helm charts. This step usually takes few minutes.
Step 2 - Apply the Privacera Manager helm charts. Step 3 - Post-installation step which generates Plugin tar ball, updates Route 53 DNS and so on.
-
In PrivaceraCloud portal, navigate to Settings -> Applications.
-
On the Connected Applications screen, select Databricks Unity Catalog.
-
Click the pen icon or the Account Name to modify the settings.
-
On the Edit Application screen, go to Access Management -> ADVANCED tab.
-
Enable the Use Databricks Unity Catalog native public group for public group access policies option with the toggle button.
-
Click SAVE to apply the changes.
- Prev topic: Advanced Configuration