Users, Groups, and Roles Management¶
This section explains how to configure filters for specific users, groups, and roles in Privacera. These filters allow administrators to control which identities are included in policy synchronization and access evaluations for BigQuery.
Privacera's BigQuery connector allows you to explicitly manage or ignore specific users, groups, and roles. This feature is useful for restricting access management to only the relevant identities. If the same identity appears in both the manage and ignore lists, the ignore list takes precedence.
Prerequisites¶
- You have successfully installed Privacera Manager and have the base installation operational.
- You have configured the connector for BigQuery or are in the process of doing so.
Configuration Steps¶
The following properties define comma-separated lists of users, groups, and roles to be managed by PolicySync. Wildcards (*) are supported to match multiple resources. If you want to manage all users, groups, and roles you can omit specifying these properties.
- User:
user1,user2,dev_user* - Group:
group1,group2,dev_group* - Role:
domain:<your-domain>
Warning
- Roles are not natively supported in BigQuery. However, Privacera allows using a domain-style string such as
domain:globaltenet.comto represent a role. - Roles must be created manually on the Privacera Portal.
- Ensure that the value used for roles does not conflict with the value set in the property:
ranger.policysync.connector.0.native.public.group.identity.name.The same value mustnot beused for both.
Note
- Replace the example values with your actual user, group, and role names.
- For instructions on creating a custom group in Google Cloud, refer to this guide.
- The Google Group must be added in the portal using the following format:
Example – Name:connectorDev@googlegroups.com
-
Navigate to Settings → Applications in the Self-Managed Portal.
-
Select BigQuery from the list of Connected Applications.
-
Click on the application name or the icon, then click on Access Management → ADVANCED tab.
-
If you want to manage only specific users, and groups, specify them in the respective lists. Leave the values empty or put
*, to manage all users, and groups.- Users to manage access control policies :
user1 - Groups to manage access control policies :
group1
- Users to manage access control policies :
-
To exclude specific users, and groups from the BigQuery, set the following properties.
- Users to be ignored by access control policies :
test_user1 - Groups to be ignored by access control policies :
test_group1
- Users to be ignored by access control policies :
-
Enable
Set access control policies only on the users from managed groupsif you want to manage only the users that are members of groups specified byGroups to manage access control policies. Default value isfalse. -
Click SAVE to apply the changes.
-
SSH to the instance where Privacera Manager is installed.
-
Run the following command to open the
.ymlfile to be edited.If you have multiple connectors, then replace
instance1with the appropriate connector instance name.Bash -
Add or modify the following properties:
-
Once the properties are configured, run the following commands to update your Privacera Manager platform instance:
Step 1 - Setup which generates the helm charts. This step usually takes few minutes.
Step 2 - Apply the Privacera Manager helm charts. Step 3 - Post-installation step which generates Plugin tar ball, updates Route 53 DNS and so on.
-
In PrivaceraCloud, go to Settings -> Applications.
-
Select BigQuery from the list of Connected Applications.
-
Click on the application name or the icon, then click on Access Management.
-
Under the ADVANCED tab, enter the values for:
- Users to Set Access Control Policies :
user1 - Groups to Set Access Control Policies :
group1 - Users to be Ignored by Access Control Policies :
test_user1 - Groups to be Ignored by Access Control Policies :
test_group1 - Set Access Control Policies Only on Users from Managed Groups : Enable to specify whether to manage only the users that are members of groups specified by
Groups to set access control policies. Default value isfalse.
- Users to Set Access Control Policies :
-
Click SAVE.
-
Once saved and enabled, the BigQuery connector will start. Then you can hover on the VIEW LOGS button to check the status, either Running or Stopped.
Note
Perform the following steps only if the connector does not reflect the updated configuration and requires a restart.
Restart the BigQuery Connector:
-
Go to Settings > Applications > select the BigQuery connector application .
-
Edit the application > Disable it > and Save it.
-
Open the same application again and then: Enable it and Save it.
Principal Name Case Sensitivity¶
BigQuery principal names (users and groups) may-be case-sensitive. Privacera provides configuration options to control how principal names are persisted in the system.
Property Details¶
| Property | PM Variable | Description | Default Value | Supported Values |
|---|---|---|---|---|
ranger.policysync.connector.0.user.name.persist.case.sensitivity | CONNECTOR_BIGQUERY_USER_NAME_PERSIST_CASE_SENSITIVITY | Controls whether user names are stored with their exact case from BigQuery | true | true, false |
ranger.policysync.connector.0.group.name.persist.case.sensitivity | CONNECTOR_BIGQUERY_GROUP_NAME_PERSIST_CASE_SENSITIVITY | Controls whether group names are stored with their exact case from BigQuery | true | true, false |
Behavior Explained¶
When true (Recommended):
- Principal names are stored exactly as they appear in BigQuery
- Preserves camelCase, UPPERCASE, lowercase, and mixed case formatting
- Example: If BigQuery has
DevTeam@example.com, it's stored asDevTeam@example.comin Privacera - Action Required: Create principals on the Privacera Portal with the exact same case as they appear in BigQuery
When false (Not Recommended):
- All principal names are converted to lowercase before storage
- Example:
DevTeam@example.combecomesdevteam@example.com - May cause the connector to behave incorrectly as BigQuery uses case-sensitive matching
- Not recommended for production use
Default Behavior (Recommended)
By default, both properties are set to true, which means Privacera preserves the exact case of principal names as they appear in BigQuery. This is the recommended configuration to ensure accurate access control.
Important: Create Exact Principal Names
Since the default value is true, you must create users and groups on the Privacera Portal with the exact same case as they appear in BigQuery. This includes:
- Maintaining camelCase (e.g.,
DevTeam) - Preserving UPPERCASE (e.g.,
ADMIN) - Keeping lowercase (e.g.,
developer) - Mixed case (e.g.,
John.Doe@Example.Com)
Configuration Properties¶
The following steps show how to access these configuration properties if needed:
Note
These properties are automatically set to true by default. No additional configuration is required unless you need to change this behavior.
-
Navigate to Settings → Applications in the Self-Managed Portal.
-
Select BigQuery from the list of Connected Applications.
-
Click on the application name or the icon, then click on Access Management → ADVANCED tab.
-
Make the required changes and click Save.
-
SSH to the instance where Privacera Manager is installed.
-
Run the following command to open the
.ymlfile to be edited.If you have multiple connectors, then replace
instance1with the appropriate connector instance name.Bash -
Add the following properties (only if you need to change from defaults):
-
Once the properties are configured, run the following commands to update your Privacera Manager platform instance:
Step 1 - Setup which generates the helm charts. This step usually takes few minutes.
Step 2 - Apply the Privacera Manager helm charts. Step 3 - Post-installation step which generates Plugin tar ball, updates Route 53 DNS and so on.
-
In PrivaceraCloud, go to Settings → Applications.
-
Select BigQuery from the list of Connected Applications.
-
Click on the application name or the icon, then click on Access Management → ADVANCED tab.
-
Make the required changes and click Save.
- Prev topic: Advanced Configuration