Skip to content

User Group Roles

The Access Management > Users/Groups/Roles page is for managing Ranger users, groups, and roles.

Apache Ranger uses users, groups, and roles to manage and enforce fine-grained access control.

Users represent individual identities accessing resources. Ranger users can be part of a Group, or can be assigned to a role created within Ranger Admin UI or via REST APIs.

Groups are collections of users, allowing bulk assignment of permissions.

Roles provide a logical grouping of privileges that can be assigned to users or groups, enabling role-based access control (RBAC) across multiple services and policies.

This structure simplifies policy management and helps ensure scalable and consistent access control across large environments.

Users:

In Apache Ranger, users can be directly specified in policy conditions to allow or deny access to resources, or they can be added to groups or roles, which are then referenced in policies.

Ranger classifies users into two types based on how they are created: - Internal Users - External Users

Internal Users:

  1. Created manually within the Ranger Admin UI or via REST APIs.
  2. Below are the users created by the system as internal users:
Text Only
'admin', 'rangerusersync', 'keyadmin', 'rangertagsync', '{USER}', '{OWNER}'

Note

In Pcloud, when user is created for the first time as an admin user or when portal user gets created, a corresponding Ranger user with the same username is also created as an internal user.

Recommendation

In Pcloud,it is recommended to use only Ranger internal users for Ranger API authentication.

External Users:

  1. In self Managed environment, when user is created for the first time as an admin user or when portal user gets created, a corresponding Ranger user with the same username is also created as an external user.
  2. System generated users for each data resource service are also created as an external users
Service Name User Name
privacera_hive hive
privacera_s3 s3
privacera_adls adls
privacera_athena athena
privacera_bigquery bigquery
privacera_cloudwatch cloudwatch
privacera_databricks_sql_analytics databricks_sql_analytics
privacera_databricks_unity_catalog databricks_unity_catalog
privacera_dremio $dremio$
privacera_dremio_ps dremio_ps
privacera_dynamodb dynamodb
privacera_files files
privacera_gcs gcs
privacera_glue glue
privacera_kafka kafka
privacera_kinesis kinesis
privacera_kms kms
privacera_lakeformation lakeformation
privacera_lambda lambda
privacera_mssql mssql
privacera_peg peg
privacera_postgres postgres
privacera_powerbi powerbi
privacera_presto presto
privacera_redshift redshift
privacera_s3 s3
privacera_snowflake snowflake
privacera_starburstenterprise starburstenterprise
privacera_starburstenterprisepresto starburstpresto
privacera_tag rangertagsync
privacera_trino trino
privacera_vertica vertica

Below are some more system generated users:

User
dbx-integration-user
discovery_service_user
feu-integration-user
streamset-integration-user
oss-integration-user
vertica-integration-user
emr-hive-integration-user
emr-spark-integration-user
emr-presto-integration-user
emr-trino-integration-user
trino-integration-user
dremio-integration-user
snowflake-integration-user
gbq-integration-user
redshift-integration-user
peg
padmin
hdfs
om
hbase

Note

  • In Pcloud, service users gets created only if the service is enabled for the account
  • padmin user is available in the self managed only

3 . In Ranger, users synchronized through UserSync from LDAP or Active Directory are automatically created as external users. For more information on UserSync, see UserSync

Groups

Groups are collections of associated users. Users can be members of more than one group. Similar to user objects, groups are used in definition of resource policies.

Groups can be included or excluded specifically or in association with other groups for allowed or denied access.

Groups are also classified as Internal and External groups

Internal

Groups created in Ranger are getting created as Internal groups

Note

Public group is system generated internal group

External

Groups synchronized in Ranger through UserSync are created as external groups.

Note

Below groups are system generated External groups:

  • peg-native-integration-service-group
  • peg-remote-integration-service-group

Roles

With the Roles tab, you can create custom roles to use when you define access policies. Custom roles are distinct from the user roles (Admin, User, Auditor).

Comments