Skip to content

Release 9.0.10.2

This is the Rolling Release Notes for the Release 9.0.10.2. This release notes are applicable only to Privacera's Self Managed version.

There are no breaking changes in this release. The last release with breaking change was 9.0.7.1

PolicySync Connectors

Databricks SQL Database Permissions Enhancement

Note

This feature is functional only when the SQL connector is configured to utilize the privacera_hive repository for defining policies on resources.

In previous versions, the "Read" permission on database level did not provide access to database's metadata. With the latest update, the "Read Metadata" permission is granted when the "Read" permission is assigned, ensuring that users can access the relevant metadata associated with the database.

Apache Ranger

Feature Update for Apache Ranger Java API

Apache Ranger now supports partial updates for policies and security zones through the Java API. This enhancement enables more efficient management of policies and security zones by allowing incremental updates, rather than requiring a complete replacement of the JSON within the policy or security zone.

Spark Plugin

FGAC Plugin: Read Permissions for Databases, Tables, and Columns in Databricks notebook

For the FGAC plugin, privacera_hive policies can now be created with read permissions on databases, tables, and columns. This behavior is now consistent with the Databricks SQL connector. Backward compatibility for read-metadata with select permissions will still be supported. Additionally, the following property needs to be added in Databricks clusters' Spark configuration:

spark.hadoop.privacera.fgac.sql.metadata.read.denied.audit.enabled true

Portal

Feature Update: Support for Special Characters in Role Names

The portal now allows the creation of roles with special characters in their names, including AWS ARNs as role names.

e.g., arn:aws:quicksight:us-east-1:851725425887:user/default/AWSReservedSSO_<account_name>_7106c4aa348ffe7a/<users-email-id>

Comments