- Platform Release 6.5
- Privacera Platform Installation
- Privacera Platform User Guide
- Privacera Discovery User Guide
- Privacera Encryption Guide
- Privacera Access Management User Guide
- AWS User Guide
- Overview of Privacera on AWS
- Configure policies for AWS services
- Using Athena with data access server
- Using DynamoDB with data access server
- Databricks access manager policy
- Accessing Kinesis with data access server
- Accessing Firehose with Data Access Server
- EMR user guide
- AWS S3 bucket encryption
- Getting started with Minio
- Plugins
- How to Get Support
- Coordinated Vulnerability Disclosure (CVD) Program of Privacera
- Shared Security Model
- Privacera Platform documentation changelog
Tag Policies
Concepts in Access Management
For conceptual background, see How Access Management Works.
A tag is a label that a user attaches to an object. It describes some attribute of the object so that access can be controlled based on that attribute. A tag can be applied to multiple data sources or types of data.
For example, database columns labeled "Email" or "Phone Number" can be tagged as “PII”. You can then write policies that control access to PII-tagged data.
Adding services
From the homepage, click Access Management > Tag Policies.
Click Add service (plus sign) at the top of a service group panel.
Type a Service Name and Description.
Set the Active Status.
Enter the Key and Value in Add New Configuration . You can add multiple configurations.
To verify the configuration, click Test Connection.
Create access policies
From the homepage, click Access Management > Tag Policies.
On the Tag Policies page, click a service in a service group panel.
Select the Access tab.
Click Add New Policy.
Configure the policy.
Policy Type: Accept the default value (Access).
Policy Name: Must be unique among all policies.
Normal/Override: If you select Override, this policy takes precedence over other policies.
Policy Labels: Enter the label for this policy. This helps during search reports and filter policies based on the labels.
Tag: Enter the applicable tag name.
Policy Conditions: Click Add Conditions+ to add policy conditions (This is applied at the policy level).
Audit Logging: When enabled, an event is entered in the audit log when this policy is applied.
Create masking policies
Conditions are evaluated sequentially as listed in the policy.
From the homepage, click Access Management > Tag Policies.
On the Tag Policies page, click a service in a service group panel.
Select the Masking tab.
Click Add New Policy.
Configure the masking policy general settings.
Policy Type: Accept the default value (Access).
Policy Name: Must be unique among all policies.
Normal/Override: If you select Override, this policy takes precedence over other policies.
Add Validity Period: Select the start and end time of the policy along with the timezone and save.
Policy Labels: Enter the label for this policy. This helps during search reports and filter policies based on the labels.
Tag: Enter the applicable tag name.
Policy Conditions: Click Add Conditions+ to add policy conditions (This is applied at the policy level).
Audit Logging: Enable/disable Audit Logging. Toggle to 'No', if this policy doesn't need to be audited. By default, it is selected as 'Yes'.
Apply masking conditions.
Under Masking Conditions, click Add (+).
Select the roles to which this policy applies. To assign a role as an Administrator for the resource, add component permissions and define admin permissions. The administrator can create sub-policies based on the existing policies.
Select the groups to which this policy applies. To assign a group as an Administrator for the resource, add component permissions and define admin permissions. The administrator can create sub-policies based on the existing policies. The public group contains all users, so setting a condition for the public group applies to all users.
Select the users to which this policy applies. To assign a user as an Administrator for the resource, add component permissions, and define admin permissions. The administrator can create sub-policies based on the existing policies.
Click Add Conditions+ and configure the policy conditions.
Set Accessed after... to Yes or No and click Syntax Check.
Enter a boolean expression. This option is applicable to allow or deny conditions on tag-based policies.
Click Add Permissions+ and configure the Component Permissions.
Click Select Masking Option and select a masking type.
Default: Accept the masking scheme applied by the system.
Custom: Enter a custom masked value or expression. Custom masking can use any valid Hive UDF (Hive that returns the same data type as the data type in the column being masked).