API
Acceldata Data Observability Cloud
Get Started
Assets
Asset Schema References
Data Reliability
Data Reliability Schema References
Pipelines
Authentication
Title
Message
Create new category
What is the title of your new category?
Edit page index title
What is the title of the page index?
Edit category
What is the new title of your category?
Edit link
What is the new title and URL of your link?
Set Up RBAC (Role-Based Access Control)
Summarize Page
Copy Markdown
Open in ChatGPT
Open in Claude
Connect to Cursor
Connect to VS Code
Implement a complete role-based access control framework from scratch - defining roles, assigning permissions, and establishing access patterns.
RBAC Implementation Roadmap
Phase 1: Plan Your Roles
Document needed roles:
- Admin roles (platform-admin, team-lead)
- Creator roles (pipeline-creator, dashboard-creator)
- Editor roles (data-editor, catalog-editor)
- Viewer roles (pipeline-viewer, data-viewer)
Phase 2: Get Available Permissions
Bash
GET /authz/api/v1/roles/templateReturns: All available permissions in ADOC
Phase 3: Create Roles
Bash
x
# Platform Admin (full access)POST /authz/api/v1/roles{ "name": "platform-admin", "description": "Full platform administration", "permissions": ["*"]}# Pipeline Creator (create & manage pipelines)POST /authz/api/v1/roles{ "name": "pipeline-creator", "description": "Create and manage pipelines", "permissions": [ "pipeline.create", "pipeline.edit", "pipeline.view", "pipeline.execute" ]}# Data Viewer (read-only)POST /authz/api/v1/roles{ "name": "data-viewer", "description": "View-only access to data", "permissions": [ "pipeline.view", "catalog.view", "dashboard.view" ]}Phase 4: Assign Roles to Groups
Bash
# Data Engineering gets creator accessPUT /admin/api/assign-client-roles{ "groupId": "group-data-eng", "roles": ["pipeline-creator", "catalog-editor"]}# Analytics gets viewer accessPUT /admin/api/assign-client-roles{ "groupId": "group-analytics", "roles": ["data-viewer", "dashboard-creator"]}Phase 5: Test & Verify
Bash
# Test each roleGET /authz/api/v1/users/test-user/rolesGET /authz/api/v1/users/permissions?userId=test-user# Verify users can access what they need# Verify users cannot access what they shouldn'tAPIs Used
GET /authz/api/v1/roles/template- Available permissionsPOST /authz/api/v1/roles- Create rolesGET /authz/api/v1/roles- List all rolesPUT /admin/api/assign-client-roles- Assign to groups/usersGET /authz/api/v1/users/:userId/roles- Verify assignments
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
Last updated on
Was this page helpful?
Next to read:
Create Custom RolesFor additional help, contact www.acceldata.force.com OR call our service desk +1 844 9433282
Copyright © 2025
Discard Changes
Do you want to discard your current changes and overwrite with the template?
Archive Synced Block
Message
Create new Template
What is this template's title?
Delete Template
Message