Custom Service Repository for Access Management for Trino¶
Creating a Service Repository¶
To create a custom service repository, refer to the Creating a Service Repository.
Configure Custom Repository Name¶
- Open the
values.yaml
file for editing: -
Update the
values.yaml
file with the following configuration:YAML Note
If the custom service repo is not defined, the plugin will use service repos starting with
privacera
by default.
Validation and Verification¶
To confirm the successful association of the custom service repo, perform the following steps:
- Prerequisites:
- A custom service repository is created using the steps outlined above in the PrivaceraCloud portal under SQL Repo.
- Steps to Validate:
- Once your Trino cluster is up and running, open the
/etc/trino/access-control.properties
file and ensure that the following property is updated with the custom service repository name:YAML - Execute the following SQL commands in the Trino CLI to validate the custom service repository:
- On the Privacera portal, navigate to Access Management → Audits.
- Look for the Service Name you provided when creating a service repository under
Service Name / Type
, e.g.,dev_trino
. - Verify the outcome of the resource policy. Successful access is indicated as Allowed, while failure is indicated as Denied.
- Look for the Service Name you provided when creating a service repository under
- Once your Trino cluster is up and running, open the
- Prev topic: Advanced Configuration