RBAC

The Role Based Access Control (RBAC) feature in ADOC allows you to implement authorization control across the entire ADOC application. With RBAC, each feature of ADOC can be accessed by users only if they have the required permissions.

The various components of RBAC are as follows.

  • Applications: ADOC has two applications. Admin Central and Data Observability. The Admin Central application consists of all the configurations which are part of the User Management and Access icon. The Data Observability application consists of all other ADOC features other than the admin settings.
  • Roles: The Admin Central application has two roles; Admin and User. The Data Observability application has three roles; Viewer, Editor, and Owner. The list of actions that you can perform with each of these roles is explained in further section of this document.
  • Features: Both the Admin Central and Data Observability applications have some features. The role assigned to a user determines the features that can be accessed by the user.

You can view the roles assigned to a user, for both the applications, by navigating to the user detail view.

The various tasks that you can perform with each feature in Admin Central application is described in the following table.

FeatureUser RoleAdmin Role
API KeysCreate, Modify, ViewCreate, Modify, View
SSO SettingsCannot viewCreate, Modify, View
User ProfileModify, ViewCreate, Modify, View
UsersCannot viewCreate, Modify, View

Administration

Feature GroupFeature NameDescriptionCreateModifyView
API KeysAPI KeysAPI keys are handled by users to ensure secure data access.
Account ConfigurationSSO SettingsSingle Sign-On configuration for user login
User ManagementUser RolesLimits user operations by assigning permissions.
User GroupsCreate and manage the user groups
UsersCreate and manage users

User Profile :View and manage your personal profile and API keys. All ADOC users are granted implicit permission.

The various tasks that you can perform with each feature in Data Observability application is described in the following table.

FeatureOwnerEditorViewer
Manage BudgetCreate, Modify, ViewCannot viewCannot view
Organization ChargebackCreate, Modify, ViewCannot viewCannot view
Cost CentreCreate, Modify, ViewCannot viewCannot view
Organization UnitCreate, Modify, ViewCannot viewCannot view
Compute MonitorCreate, Modify, ViewCreate, Modify, ViewView
AssetViewViewView
Asset Customer MetadataCreate, Modify, ViewCannot viewView
Manage Asset LineageCreate, Modify, ViewCannot viewView
Manage Asset SettingsModify, ViewModify, ViewView
Business AssetsCreate, Modify, ViewCannot viewView
Data Policy TemplatesCreate, Modify, ViewCannot viewView
Data TagsCreate, Modify, ViewCannot viewView
Business GlossaryCreate, Modify, ViewCannot viewView
Execution JobsModify, ViewModify, ViewView
PoliciesCreate, Modify, ViewCannot viewCannot view
Query AnalyzerCreateCreateCannot view
Reliability DashboardViewViewView
Import/Export PolicyCreateCreateCannot view
Visual ViewCreate, Modify, ViewCannot viewView
Manage DatasourcesCreate, Modify, ViewViewView
Manage TagsCreate, Modify, ViewCannot viewView
Data PlaneCreate, Modify, ViewViewView
Manage AlertsCreate, Modify, ViewCannot viewView
Pipeline EventsCreate, Modify, ViewCannot viewView
Manage PipelinesCreate, Modify, ViewCannot viewView
Data PersistenceModify, ViewCannot viewCannot view
Data ProtectionModify, ViewCannot viewCannot view
NotificationsCreate, Modify, ViewCannot viewView

Compute

Feature GroupFeature NameDescriptionOwnerEditorViewer
ChargebackManage BudgetCreate and manage budget for the organization. Create Modify View Modify View View
Organization ChargebackChargeback for the organizational units. Create Modify View Modify View View
Cost CentersCreate and manage cost centers for the organization. Create Modify View Modify View View
  • The RBAC roles and permissions are also applicable for API operations.
  • If a user is assigned multiple roles, the user gets a union of permissions from all the assigned roles. If a user is assigned two roles which have a different permission set (example owner and viewer), the role with supreme permissions (in this case owner) takes the precedence.
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard