is the access level that a user has within the Zoomdata environment. Once a user is authenticated into Zoomdata, authorization is handled using roles and permissions. This approach defines specific capabilities that users can and cannot perform with the data sources in Zoomdata.
A group allows multiple users to have the same access privileges. For example, you can grant a group specific access privileges for a folder a file, and all members of the group have access. You can also assign a group specific access privileges for each of your shared folders.Click the Add button below the list of users.
In addition, admins can set the attribute items that can be viewed or edited for data source (called Force Filters). This functionality allows security to be managed at the attribute level, so that potentially confidential datasets within a data source can have permission levels set. As a result, a group would only be able to view limited information within a connected data source.
The default setup (after you run ) consists of three , and which have privileges as described above. All new users are automatically added to group (thanks to ). The groups is used for users who are not logged in.Can manage VCS and access exported repository.
Now that we have that cleared up, let’s focus back on the creation of our rule. For the claim, I will type the aforementioned custom attribute, department. This rule will be applicable when the value of department is equal to the string “Engineering”, therefore, in the Match Type field I will select the Equals match type. Finally, I will type the actual string value, “Engineering”, for the attribute value that should be matched in the rule. If a user has a matching value fo