Skip to main content

Permissions in Embedding

You can control permissions in Zenlytic via access controls using both access filters (row-based) and access grants (column-based). Docs on those are here.

Setting up the access permissions#

To start, you'll define the logic that determine when an access grant is allowed or not allowed. For example, with these definitions, which are found in the model file:

version: 1type: modelname: democonnection: demo_snowflake
access_grants:- name: events_access  user_attribute: events  allowed_values:  - has_events
- name: revenue_access  user_attribute: revenue  allowed_values:  - has_revenue
- name: sessions_access  user_attribute: sessions  allowed_values:  - has_sessions
...

In this example, if you pass the user attribute {"revenue": "has_revenue"} the session will have access to all tables governed by the revenue_access access grant. Similarly, if you pass the user attribute with any other value besides "has_revenue" the session will not have access to the tables governed by that access grant (e.g. {"revenue": "no_revenue"}).

You can restrict a view or a field with an access grant by name, by adding the property required_access_grants with an array of the grants the user must possess:

required_access_grants:- revenue_access

Full Example#

Using the above model as our model, consider the following four views:

name: orderstype: viewmodel_name: demodefault_date: order_created_at
required_access_grants:- revenue_access
fields:...
name: eventstype: viewmodel_name: demosql_table_name: DEMO_PROD.EVENTSdefault_date: event_timestamp
required_access_grants:- events_access
name: pg_orderstype: viewmodel_name: pg_demosql_table_name: demo.public.ordersdefault_date: order_created_at
required_access_grants:- revenue_access
name: sessionstype: viewmodel_name: demosql_table_name: wcb.sessionsdefault_date: session_date
required_access_grants:- sessions_access

When requesting the signed API for the session if you pass the set of user_attributes

{    "events": "has_events",    "revenue": "no_revenue",    "sessions": "no_sessions"}

Which looks like this in Postman

has-events-request

The session that is generated will NOT have access to any of pg_orders, orders, or sessions. It will only have access to the events table (assuming these four tables are the only ones in our model). Zoë will not be able to see those three tables the user does not have access to, and will have no idea that they exist.

zoe-just-events

Conversely, if you pass the following user_attributes

{    "events": "no_events",    "revenue": "has_revenue",    "sessions": "has_sessions"}

no-events-request

The user will have access to the pg_orders, sessions, and orders tables, but will NOT have access to the events table.

zoe-no-events

You can apply similar logic to fields as well to define more granular permissions inside of tables.