mirror of
https://github.com/open-metadata/OpenMetadata.git
synced 2025-09-25 08:50:18 +00:00
Doc: Updated Teams Typo in Docs (#17172)
Co-authored-by: Prajwal Pandit <prajwalpandit@Prajwals-MacBook-Air.local>
This commit is contained in:
parent
58a6751dd3
commit
4ad652a79d
@ -61,45 +61,4 @@ alt="PII Sensitive Tag Policy"
|
||||
caption="PII Sensitive Tag Policy"
|
||||
/%}
|
||||
|
||||
In this rule, we are specifying to deny operations if the table tag contains PII.Sensitive tag and if the logged-in user is not the owner, or their team is not the owner of the Table.
|
||||
|
||||
### Use Case 5: Restrict User Account Access to a Specific Service/Database
|
||||
|
||||
To restrict a user account to only see data from one specific service/database, you can create a policy that includes rules to allow access to the desired service and deny access to others. This involves setting up policies with specific conditions based on the service name. The following steps outline how this can be done using the API:
|
||||
|
||||
1. **Create a Policy**: Define a policy that allows access to the specific service.
|
||||
2. **Assign the Policy**: Assign this policy to the user or role.
|
||||
|
||||
## Example Policy:
|
||||
|
||||
```json
|
||||
{
|
||||
"name": "ServiceAccessPolicy",
|
||||
"rules": [
|
||||
{
|
||||
"name": "AllowSpecificService",
|
||||
"resource": "DatabaseService",
|
||||
"operation": "View",
|
||||
"condition": {
|
||||
"match": {
|
||||
"service.name": "desired_service_name"
|
||||
}
|
||||
},
|
||||
"effect": "Allow"
|
||||
},
|
||||
{
|
||||
"name": "DenyOtherServices",
|
||||
"resource": "DatabaseService",
|
||||
"operation": "View",
|
||||
"condition": {
|
||||
"notMatch": {
|
||||
"service.name": "desired_service_name"
|
||||
}
|
||||
},
|
||||
"effect": "Deny"
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
By implementing this policy, the user account will be restricted to access only the specified service, enhancing data security and ensuring that users can only view the data they are authorised to see.
|
||||
In this rule, we are specifying to deny operations if the table tag contains PII.Sensitive tag and if the logged-in user is not the owner, or their team is not the owner of the Table.
|
@ -3,7 +3,7 @@ title: persona
|
||||
slug: /main-concepts/metadata-standard/schemas/entity/teams/persona
|
||||
---
|
||||
|
||||
# Team
|
||||
# Persona
|
||||
|
||||
*This schema defines the Persona entity. A `Persona` is a job function associated with a user. An Example, Data Engineer or Data Consumer is a Persona of a user in Metadata world.*
|
||||
|
||||
|
@ -62,44 +62,3 @@ caption="PII Sensitive Tag Policy"
|
||||
/%}
|
||||
|
||||
In this rule, we are specifying to deny operations if the table tag contains PII.Sensitive tag and if the logged-in user is not the owner, or their team is not the owner of the Table.
|
||||
|
||||
### Use Case 5: Restrict User Account Access to a Specific Service/Database
|
||||
|
||||
To restrict a user account to only see data from one specific service/database, you can create a policy that includes rules to allow access to the desired service and deny access to others. This involves setting up policies with specific conditions based on the service name. The following steps outline how this can be done using the API:
|
||||
|
||||
1. **Create a Policy**: Define a policy that allows access to the specific service.
|
||||
2. **Assign the Policy**: Assign this policy to the user or role.
|
||||
|
||||
## Example Policy:
|
||||
|
||||
```json
|
||||
{
|
||||
"name": "ServiceAccessPolicy",
|
||||
"rules": [
|
||||
{
|
||||
"name": "AllowSpecificService",
|
||||
"resource": "DatabaseService",
|
||||
"operation": "View",
|
||||
"condition": {
|
||||
"match": {
|
||||
"service.name": "desired_service_name"
|
||||
}
|
||||
},
|
||||
"effect": "Allow"
|
||||
},
|
||||
{
|
||||
"name": "DenyOtherServices",
|
||||
"resource": "DatabaseService",
|
||||
"operation": "View",
|
||||
"condition": {
|
||||
"notMatch": {
|
||||
"service.name": "desired_service_name"
|
||||
}
|
||||
},
|
||||
"effect": "Deny"
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
By implementing this policy, the user account will be restricted to access only the specified service, enhancing data security and ensuring that users can only view the data they are authorised to see.
|
@ -3,7 +3,7 @@ title: persona
|
||||
slug: /main-concepts/metadata-standard/schemas/entity/teams/persona
|
||||
---
|
||||
|
||||
# Team
|
||||
# Persona
|
||||
|
||||
*This schema defines the Persona entity. A `Persona` is a job function associated with a user. An Example, Data Engineer or Data Consumer is a Persona of a user in Metadata world.*
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user