Custom Service Repo for Access Management for Trino¶
Creating a Service Repo¶
To create a custom service repository, refer to the Creating a Service Repository.
Configure Custom Repo Name¶
- Open the
values.yaml
file for editing: -
Update the
values.yaml
file with the following configuration:YAML Note
If the custom service repo is not defined, the plugin will use service repos starting with
privacera
by default.
Validation/Verification¶
To confirm the successful association of the custom service repo, perform the following steps:
- Prerequisites:
- A custom service repository is created using the steps outlined above in the PrivaceraCloud portal under SQL Repo.
- Steps to Validate:
- Once your Trino cluster is up and running, open the
/etc/trino/access-control.properties
file and ensure that the following property is updated with the custom service repository name:YAML - Execute the following SQL commands in the Trino CLI to validate the custom service repository:
- On the Privacera portal, navigate to Access Management → Audits.
- Look for the Service Name you provided when creating a service repository under
Service Name / Type
, e.g.,dev_trino
. - Verify the outcome of the resource policy. Successful access is indicated as Allowed, while failure is indicated as Denied.
- Look for the Service Name you provided when creating a service repository under
- Once your Trino cluster is up and running, open the
- Prev topic: Advanced Configuration