Skip to content

You are viewing documentation for Immuta version 2022.2.

For the latest version, view our documentation for Immuta SaaS or the latest self-hosted version.

Immuta Integrations

Audience: Data Owners, Data Users, and System Administrators

Content Summary: Immuta does not require users to learn a new API or language to access data exposed there. Instead, Immuta integrates with existing tools and ongoing work while remaining invisible to downstream consumers. This page outlines those integrations.

Prerequisite

Terms

The following concepts describe how policies are enforced in each of Immuta's integrations:

Snowflake

The Snowflake integration differs based on your Snowflake Edition:

  • Snowflake Integration Using Snowflake Governance Features: With this integration, policies administered in Immuta are pushed down into Snowflake as Snowflake Governance features (row access policies and masking policies). This integration requires Snowflake Enterprise Edition or higher.
  • Snowflake Integration Without Snowflake Governance Features: With this integration, policies administered by Immuta are pushed down into Snowflake as views with a 1-to-1 relationship to the original table and all policy logic is contained in that view.

Click a link below for details about each question:

  1. How does my integration work in Immuta?
  2. How do I configure it?
  3. How do I connect my data?
  4. How do I protect my data
  5. How do I manage data sources?
  6. How do I access and query data?
  7. How do I audit data access?

Databricks

This integration enforces policies on Databricks tables registered as data sources in Immuta, allowing users to query policy-enforced data in their Notebooks. Immuta policies are applied to the plan that Spark builds for users' queries, all executed directly against Databricks tables.

  1. How does my integration work in Immuta?
  2. How do I configure it?
  3. How do I connect my data?
  4. How do I protect my data
  5. How do I manage data sources?
  6. How do I access and query data?
  7. How do I audit data access?

Databricks SQL (Public Preview)

Databricks SQL provides a simple experience for SQL users who want to run quick ad hoc queries on their data lake, create multiple visualization types to explore query results from different perspectives, and build and share dashboards.

Immuta's Databricks SQL integration creates policy-enforced views in users' Databricks SQL environment that they can access.

  1. How does my integration work in Immuta?
  2. How do I configure it?
  3. How do I connect my data?
  4. How do I protect my data
  5. How do I manage data sources?
  6. How do I access and query data?
  7. How do I audit data access?

Starburst (Trino)

The Starburst (Trino) integration enables Immuta to apply policies directly in Starburst and Trino clusters without going through a proxy. This means users can use their existing Starburst and Trino tooling (querying, reporting, etc.) and have per-user policies dynamically applied at query time.

  1. How does my integration work in Immuta?
  2. How do I configure it?
  3. How do I connect my data?
  4. How do I protect my data
  5. How do I manage data sources?
  6. How do I access and query data?
  7. How do I audit data access?

Redshift

With the Redshift integration, Immuta applies policies directly in Redshift. This allows data analysts to query their data directly in Redshift instead of going through a proxy.

  1. How does my integration work in Immuta?
  2. How do I configure it?
  3. How do I connect my data?
  4. How do I protect my data
  5. How do I manage data sources?
  6. How do I access and query data?
  7. How do I audit data access?

Azure Synapse Analytics

The Azure Synapse Analytics integration allows Immuta to apply policies directly in Azure Synapse Analytics dedicated SQL pools without needing users to go through a proxy. Instead, users can work within their existing Synapse Studio and have per-user policies dynamically applied at query time.

  1. How does my integration work in Immuta?
  2. How do I configure it?
  3. How do I connect my data?
  4. How do I protect my data
  5. How do I manage data sources?
  6. How do I access and query data?
  7. How do I audit data access?

External Catalogs

Users who want to use tagging capabilities outside of Immuta and pull tags from external table schemas can connect Collibra or Alation as an external catalog. Once they have been connected, Immuta will ingest a data dictionary from the catalog that will apply data source and column tags directly onto queryable data sources. These tags can then be used to write and drive policies.

If users have another catalog, or have customized their Collibra or Alation integrations, they can connection through the REST Catalog using the Immuta API.

Users can also connect a Snowflake account to allow Immuta to ingest Snowflake tags onto Snowflake data sources.

  1. How does my catalog work with Immuta?
  2. How do I configure it?
  3. How do I automatically discover and tag sensitive data?

External IAMs

External identity managers configured in Immuta allow users to authenticate using an existing identity management system and can optionally be used to synchronize user groups and attributes into Immuta.

  1. How does my identity manager work with Immuta?
  2. How do I configure it?

Feature and Policy Support

Feature Support

The table below outlines the features supported by each of Immuta's integrations.

Project Workspaces Tag Ingestion User Impersonation Native Query Audit Multiple Integrations
Snowflake ✅ ✅ ✅ ✅ ✅
Databricks ✅ ❌ ✅ ✅ ✅
Databricks SQL ❌ ❌ ❌ ❌ ✅
Starburst (Trino) ❌ ❌ ✅ ✅ ✅
Redshift ❌ ❌ ✅ ❌ ✅
Azure Synapse Analytics ❌ ❌ ✅ ❌ ✅

Policy Support Matrix

Certain policies are unsupported or supported with caveats*, depending on the integration:

Integration Support Matrix

*Supported with Caveats:

  • On Databricks data sources, joins will not be allowed on data protected with replace with NULL/constant policies.
  • On Trino data sources, the Immuta functions @iam and @interpolatedComparison for WHERE clause policies can block the creation of views.

For details about each of these policies, see the Policies in Immuta page.