Data AdminΒΆ
Data Admin is a special permission that allows users to override fine-grained access controls like Row-Level Security (RLS) and column-level masking policies. This permission is typically granted to service users or users who need to update data in the underlying tables or create views on the tables.
Here are the reasons why you might want to use Data Admin:
- You have ETL jobs that need to create and update data in the tables. These jobs usually run as service users and require the Data Admin privilege.
- You have users who own the underlying data and need to update the data in the tables.
- You want users who need to create views on the table.
Consideration for Data Admin users
Make sure to give Data Admin privileges only to users who need to update the data in the tables or create views over the tables. These users will have full access to the underlying tables and will not be subject to RLS and column-level masking policies.
Behavior of Data AdminΒΆ
The behavior of Data Admin in PolicySync Connector and Plugins is slightly different. Given below are the details of the behavior of Data Admin in both cases.
Please note that the behavior of Data Admin in PolicySync Connector and Plugins are different. Review the below table carefully.
PolicySync ConnectorΒΆ
Here is the behavior of Data Admin in the data platforms when using PolicySync Connector:
Privacera Permission | Select | Insert/Update/Delete | Show Tables | Describe/Show Create Table | Create View |
---|---|---|---|---|---|
Data Admin (Only) | No | No | No | ||
Data Admin + Select | No | No | No | ||
Data Admin + Read | No | ||||
Data Admin + Update | No |
PluginsΒΆ
Here is the behavior of Data Admin in the data platforms when using Privacera plugins:
Privacera Permission | Select | Insert/Update/Delete | Show Tables | Describe/Show Create Table | Create View |
---|---|---|---|---|---|
Data Admin (Only) | No | No | No | ||
Data Admin + Select | No | ||||
Data Admin + Read | No | ||||
Data Admin + Update | No | No |
- Prev topic: Security Zones
- Next topic:
Access Policy Definition
Access Audits