Release 9.0.10.2¶
This is the Rolling Release Notes for the Release 9.0.10.2. This release notes are applicable only to Privacera's Self Managed version.
There are no breaking changes in this release. The last release with breaking change was 9.0.7.1
PolicySync Connectors¶
Databricks SQL Database Permissions Enhancement
Note
This feature is functional only when the SQL connector is configured to utilize the privacera_hive repository for defining policies on resources.
In previous versions, the "Read" permission on database level did not provide access to database's metadata. With the latest update, the "Read Metadata" permission is granted when the "Read" permission is assigned, ensuring that users can access the relevant metadata associated with the database.
Apache Ranger¶
Feature Update for Apache Ranger Java API
Apache Ranger now supports partial updates for policies and security zones through the Java API. This enhancement enables more efficient management of policies and security zones by allowing incremental updates, rather than requiring a complete replacement of the JSON within the policy or security zone.
Spark Plugin¶
FGAC Plugin: Read Permissions for Databases, Tables, and Columns in Databricks notebook
For the FGAC plugin, privacera_hive policies can now be created with read permissions on databases, tables, and columns. This behavior is now consistent with the Databricks SQL connector. Backward compatibility for read-metadata with select permissions will still be supported. Additionally, the following property needs to be added in Databricks clusters' Spark configuration:
spark.hadoop.privacera.fgac.sql.metadata.read.denied.audit.enabled true
Portal¶
Feature Update: Support for Special Characters in Role Names
The portal now allows the creation of roles with special characters in their names, including AWS ARNs as role names.
e.g., arn:aws:quicksight:us-east-1:851725425887:user/default/AWSReservedSSO_<account_name>_7106c4aa348ffe7a/<users-email-id>
- Prev topic: Releases