Data Access Control and Permissions
Last updated August 14, 2024
Deltaray offers robust data access control and permission management features to ensure that only authorized individuals can access and modify your data. This ensures data security, privacy, and compliance with relevant regulations.
Managing Data Access and Permissions
- Role-Based Access Control (RBAC):
- Create Roles: Define different roles to represent different levels of access and responsibilities within your organization. Examples include:
- Administrator: Full access to all data and administrative settings.
- Analyst: Access to specific datasets and analysis tools.
- Data Engineer: Ability to create, modify, and manage data transformations and connections.
- Viewer: Read-only access to datasets and visualizations.
- Assign Roles to Users: Assign specific roles to each user based on their job duties and responsibilities.
- Permissions at the Dataset Level:
- Data Access: Define whether users can read (view), write (modify), or delete data within specific datasets.
- Permissions by Field: Control access to specific fields within a dataset, allowing users to view or modify only certain columns.
- Permissions at the Transformation Level:
- Create/Edit/Delete: Control whether users can create, edit, or delete data transformations applied to datasets.
- Data Ownership:
- Designated Owners: Assign ownership of specific datasets and transformations to individuals responsible for their maintenance and accuracy.
- Permissions for Integrations:
- API Access: Control which users or applications have access to Deltaray's APIs and the scope of their access.
- Inheritance:
- Hierarchical Structures: Use hierarchical structures to inherit permissions from parent objects. For example, roles can inherit permissions from organization levels, making it easier to manage permissions for large teams.
- Auditing and Monitoring:
- Access Logs: Track user access to data and transformations, providing an audit trail for accountability.
- Alerts: Configure alerts to notify administrators of unusual or suspicious activity, like unauthorized access attempts.
By implementing these data access control and permission management strategies, you can ensure that your data remains secure, that access is granted to those who need it, and that your data is used responsibly.
Was this article helpful?