Advanced Configuration for Access Management for Trino¶
Use Custom Service Repo¶
Creating a Service Repo¶
To create a custom service repo, refer to Creating a Service repo.
Configure Custom Repo Name¶
- Open the
values.yaml
file for editing: -
Update the
values.yaml
file with the following configuration:YAML Note
If the custom service repo is not defined, the plugin will use service repos starting with
privacera
by default.
Validation/Verification¶
To confirm the successful association of the custom S3 service repo, perform the following steps:
- Prerequisites:
- A custom service repository is created using the steps above on the PrivaceraCloud portal under SQL Repo.
- Steps to Validate:
- Once your Trino cluster is up and running, open the
/etc/trino/access-control.properties
file and ensure that the following property is updated with the custom service repository name:YAML - Run the following SQL commands in the Trino CLI to validate the custom service repository:
- On the Privacera portal, go to Access Management -> Audits.
- Check for the Service Name you provided when Creating a Service repo under
Service Name / Type
, e.g.,dev_s3
. - Verify the success or failure of the resource policy. Successful access is indicated as Allowed and a failure is indicated as Denied.
- Check for the Service Name you provided when Creating a Service repo under
- Once your Trino cluster is up and running, open the
- Prev topic: Setup