Permissions in Embedding
You can control permissions in Zenlytic via access controls using both access filters (row-based) and access grants (column-based). Docs on those are here.
#
Setting up the access permissionsTo start, you'll define the logic that determine when an access grant is allowed or not allowed. For example, with these definitions, which are found in the model file:
version: 1type: modelname: democonnection: demo_snowflake
access_grants:- name: events_access user_attribute: events allowed_values: - has_events
- name: revenue_access user_attribute: revenue allowed_values: - has_revenue
- name: sessions_access user_attribute: sessions allowed_values: - has_sessions
...
In this example, if you pass the user attribute {"revenue": "has_revenue"}
the session will have access to all tables governed by the revenue_access
access grant. Similarly, if you pass the user attribute with any other value besides "has_revenue"
the session will not have access to the tables governed by that access grant (e.g. {"revenue": "no_revenue"}
).
You can restrict a view or a field with an access grant by name, by adding the property required_access_grants
with an array of the grants the user must possess:
required_access_grants:- revenue_access
#
Full ExampleUsing the above model as our model, consider the following four views:
name: orderstype: viewmodel_name: demodefault_date: order_created_at
required_access_grants:- revenue_access
fields:...
name: eventstype: viewmodel_name: demosql_table_name: DEMO_PROD.EVENTSdefault_date: event_timestamp
required_access_grants:- events_access
name: pg_orderstype: viewmodel_name: pg_demosql_table_name: demo.public.ordersdefault_date: order_created_at
required_access_grants:- revenue_access
name: sessionstype: viewmodel_name: demosql_table_name: wcb.sessionsdefault_date: session_date
required_access_grants:- sessions_access
When requesting the signed API for the session if you pass the set of user_attributes
{ "events": "has_events", "revenue": "no_revenue", "sessions": "no_sessions"}
Which looks like this in Postman
The session that is generated will NOT have access to any of pg_orders
, orders
, or sessions
. It will only have access to the events
table (assuming these four tables are the only ones in our model). Zoë will not be able to see those three tables the user does not have access to, and will have no idea that they exist.
Conversely, if you pass the following user_attributes
{ "events": "no_events", "revenue": "has_revenue", "sessions": "has_sessions"}
The user will have access to the pg_orders
, sessions
, and orders
tables, but will NOT have access to the events
table.
You can apply similar logic to fields as well to define more granular permissions inside of tables.