Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Deprecation notice
Support for this integration has been deprecated. Use the Starburst (Trino) v2.0 integration instead.
See the Starburst (Trino) Pre-Configuration Details page.
Click a link below to navigate to a tutorial for your Starburst (Trino) integration.
See the Starburst (Trino) Integration v2.0 Pre-Configuration Details page.
Click a link below to navigate to a tutorial for your Starburst (Trino) integration.
Deprecation notice
Support for this integration has been deprecated. Use the Starburst (Trino) v2.0 integration instead.
Starburst: A valid Starburst Enterprise license
The Starburst (Trino) integration supports the following authentication methods to create data sources in Immuta:
Username and password: You can authenticate with your Starburst (Trino) username and password.
OAuth 2.0: You can authenticate with OAuth 2.0. Immuta's OAuth authentication method uses the Client Credentials Flow; when you register a data source, Immuta reaches out to your OAuth server to generate a JSON web token (JWT) and then passes that token to the Starburst (Trino) cluster.
Configure JWT authentication method in Starburst (Trino)
When using OAuth authentication to create data sources in Immuta, configure your Starburst (Trino) cluster to use JWT authentication, not OpenID Connect or OAuth.
When users query a Starburst (Trino) data source, Immuta sends a username with the view SQL so that policies apply in the right context. Since OAuth authentication does not require a username to be associated with a data source upon data source creation, Immuta does not send a username and Starburst (Trino) queries fail. To avoid this error, you must configure a global admin username.
If you are using OAuth or asynchronous authentication to create Starburst (Trino) data sources, see the Starburst (Trino) configuration guide to set the globalAdminUsername
property in the advanced configuration section of the Immuta app settings page.
The Starburst (Trino) integration cannot ingest tags from Trino or Starburst, but you can connect any of these supported external catalogs to work with your integration.
Native impersonation allows users to natively query data as another Immuta user. To enable native user impersonation, see the Integration User Impersonation page.
When the Trino Event Listener is enabled during the installation, Immuta can translate those events into comprehensive audit logs for users with the Immuta AUDIT
permission to view. For more information about what is included in those audit logs, see the Starburst (Trino) Audit Logs page.
You can configure multiple Starburst (Trino) integrations v2.0 with a single Immuta tenant and use them dynamically. Configure the integration once in Immuta to use it in multiple Starburst or Trino clusters. However, consider the following limitations:
Names of catalogs cannot overlap because Immuta cannot distinguish among them.
Only one cluster type is supported: You can connect either Starburst or Trino clusters. These cluster types are not supported together in a single Immuta tenant.
Certain interpolation functions can block the creation of a native view, specifically @interpolatedComparison()
and @iam
.
Trino supports an optional anonymous (no authentication) access, which is not supported through Immuta because Immuta ties the Trino user account to the Immuta user account to correctly apply policies. If your organization allows anonymous access, you will not be able to use this integration.
Limit your masked joins to columns with matching column types. Starburst truncates the result of the masking expression to conform to the native column type when performing the join, so joining two masked columns with different data types produces invalid results when one of the columns' lengths is less than the length of the masked value.
For example, if the value of a hashed column is 64 characters, joining a hashed varchar(50) and a hashed varchar(255) column will not be joined correctly, since the varchar(50) value is truncated and doesn’t match the varchar(255) value.
Deprecation notice
Support for this integration has been deprecated. Use the Starburst (Trino) v2.0 integration instead.
Immuta connects to Starburst (Trino) as a plugin integration. This allows Immuta to apply policies directly in Starburst (Trino) without data flowing through a proxy. Users can work with their existing tools (querying, reporting, etc.) and have per-user policies applied into views at query time.
Once the plugin has been pushed out to all nodes, administrators create an immuta
catalog that is managed by the custom Immuta Trino connector that generates the list of available schemas and views at query time based on the user making the request. When a user executes a query against one of the Immuta views, the connector dynamically generates the view definition and provides that to the Trino execution engine, which then connects to the backing catalogs and retrieves the data with appropriate policy enforcement.
This integration uses an immuta-trino
plugin to create policy-enforced view definitions that users access through an immuta
catalog. (Note that even though the plugin is named immuta-trino
it works and comes pre-installed with Starburst Enterprise.) When Starburst (Trino) tables are registered in Immuta as data sources, these data sources are dynamically generated as views in the immuta
catalog on the Starburst (Trino) node. Then, users subscribed to those data sources in Immuta query the corresponding protected views in Starburst (Trino).
Changes to policies, user attributes, or data sources registered in Immuta trigger webhooks that keep these views up-to-date, empowering users to query policy-enforced data.
An Immuta Application Administrator configures the Starburst (Trino) integration, creating an Immuta catalog and connector on their Starburst (Trino) node.
Immuta creates a catalog inside the configured Starburst (Trino) node.
A Data Owner registers Starburst (Trino) tables in Immuta as data sources. A Data Owner, Data Governor, or Administrator creates or changes a policy or user in Immuta.
Data source metadata, tags, user metadata, and policy definitions are stored in Immuta's Metadata Database.
The Immuta connector generates and provides the view definition to the Trino Execution Engine.
A Starburst (Trino) user who is subscribed to the data source in Immuta queries the corresponding table directly in Starburst (Trino) through the immuta
database.
Using the querying user's project, purpose, and entitlements, Immuta applies policies to the views at query time, so the user sees policy-enforced data.
This page describes the design, policy enforcement, and data flow of the Starburst (Trino) integration v2.0.
When a user queries a table in Starburst, the Trino Execution Engine reaches out to the Immuta plugin to determine what the user is allowed to see:
masking policies: For each column, Starburst (Trino) requests a view expression from the Immuta plugin. If there is a masking policy on the column, the Immuta plugin returns the corresponding view expression for that column. Otherwise, nothing is returned.
row-level policies: For each table, Starburst (Trino) requests the rows a user can see in a table from Immuta. If there is a WHERE clause policy on the data source, Immuta returns the corresponding view expression as a WHERE clause. Otherwise, nothing is returned.
The Immuta plugin then requests policy information about the tables being queried from the Immuta Web Service and sends this information to the Trino Execution Engine. Finally, the Trino Execution Engine constructs the SQL statement, executes it on the backing tables to apply the policies, and returns the response to the user.
Users cannot bypass Immuta controls
Users cannot bypass Immuta controls by changing roles in their system access control provider.
Multiple system access control providers can be configured in the Starburst (Trino) integration v2.0. This approach allows Immuta to work with existing Starburst (Trino) installations that already have an access control provider configured.
Immuta does not manage all permissions in Starburst (Trino) and will default to allowing access to anything Immuta does not manage so that the Starburst (Trino) integration v2.0 complements existing controls. For example, if the Starburst (Trino) integration v2.0 is configured to allow users write access to tables that are not protected by Immuta, you can still lock down write access for specific non-Immuta tables using an additional access control provider.
If you have multiple access control providers configured, those providers interact in the following ways:
For a user to have access to a resource (catalog, schema, or a table), that user must have access in all of the configured access control providers.
In catalog, schema, or table filtering (such as show catalogs
, show schemas
, or show tables
), the user will see the intersection of all access control providers. For example, if a Starburst (Trino) environment includes the catalogs public
, demo
, and restricted
and one provider restricts a user from accessing the restricted
catalog and another provider restricts the user from accessing the demo
catalog, running show catalogs
will only return the public
catalog for that user.
Only one column masking policy can be applied per column across all system access control providers. If two or more access control providers return a mask for a column, Starburst (Trino) will throw an error at query time.
For row filtering policies, the expression for each system access control provider is applied one after the other.
Starburst (Trino) query passthrough is available in most connectors using the query
table function or raw_query
in the Elasticsearch connector. Consequently, Immuta blocks functions named raw_query
or query
, as those table functions would completely bypass Immuta’s access controls.
For example, without blocking those functions, this query would access the public.customer
table directly:
select * from table(postgres.system.query(query => 'select * from public.customer limit 10'));
An Immuta Application Administrator configures the Starburst (Trino) integration, adding the ImmutaSystemAccessControl plugin on their Starburst (Trino) node.
Data source metadata, tags, user metadata, and policy definitions are stored in Immuta's Metadata Database.
The Trino Execution Engine calls various methods on the interface to ask the ImmutaSystemAccessControl plugin where the policies should be applied. The masking and row-level security methods apply the actual policy expressions.
The Immuta System Access Control plugin calls the Immuta Web Service to retrieve policy information for that data source for the querying user, using the querying user's project, purpose, and entitlements.
The Immuta System Access Control plugin provides the SQL view expression (for masked columns) or WHERE clause SQL view expression (for row filtering) to the Trino Execution Engine.
The Trino Execution Engine constructs and executes the SQL statement on the backing catalogs and retrieves the data with appropriate policy enforcement.
User sees policy-enforced data.
This page describes the Starburst (Trino) integration v2.0 configuration options and features.
The Starburst (Trino) integration v2.0 supports the following authentication methods to create data sources in Immuta:
Username and password: You can authenticate with your Starburst (Trino) username and password.
Configure JWT authentication method in Starburst (Trino)
When using OAuth authentication to create data sources in Immuta, configure your Starburst (Trino) cluster to use JWT authentication, not OpenID Connect or OAuth.
When users query a Starburst (Trino) data source, Immuta sends a username with the view SQL so that policies apply in the right context. Since OAuth authentication does not require a username to be associated with a data source upon data source creation, Immuta does not send a username and Starburst (Trino) queries fail. To avoid this error, you must configure a global admin username.
In addition to the information included on the Starburst (Trino) Audit Logs page, the audit logs payload in the Starburst (Trino) integration v2.0 includes immutaPlanningDuration
, which represents the planning overhead in Immuta.
You can configure multiple Starburst (Trino) integrations v2.0 with a single Immuta tenant and use them dynamically. Configure the integration once in Immuta to use it in multiple Starburst or Trino clusters. However, consider the following limitations:
Names of catalogs cannot overlap because Immuta cannot distinguish among them.
Only one cluster type is supported: You can connect either Starburst or Trino clusters. These cluster types are not supported together in a single Immuta tenant.
The descriptions below provide guidance for applying policies to Starburst (Trino)-created logical views in the
However, there are other approaches you can use to apply policies to Starburst (Trino)-created logical views. The examples below are the simplest approaches.
DEFINER
Security ModeFor views created using the DEFINER
security mode,
ensure the user who created the view is configured as an admin user in the Immuta plugin so that policies are never applied to the underlying tables.
create Immuta data sources and apply policies to logical views exposing those tables.
lock down access to the underlying tables in Starburst (Trino) so that all end user access is provided through the views.
INVOKER
Security ModeApplying Policies to Views or Tables
Avoid creating data policies for both a logical view and its underlying tables. Instead, apply policies to the logical view or the underlying tables.
For views created using the INVOKER
security mode, the querying user needs access to the logical view and underlying tables.
If non-Immuta table reads are disabled, provide access to the views and tables through Immuta. To do so, create Immuta data sources for the view and underlying tables, and grant access to the querying user in Immuta. If creating data policies, apply the policies to either the view or underlying tables, not both.
If non-Immuta table reads are enabled, the user already has access to the table and view. Create Immuta data sources and apply policies to the underlying table; this approach will enforce access controls for both the table and view in Starburst (Trino).
Limit your masked joins to columns with matching column types. Starburst truncates the result of the masking expression to conform to the native column type when performing the join, so joining two masked columns with different data types produces invalid results when one of the columns' lengths is less than the length of the masked value.
For example, if the value of a hashed column is 64 characters, joining a hashed varchar(50) and a hashed varchar(255) column will not be joined correctly, since the varchar(50) value is truncated and doesn’t match the varchar(255) value.
Project Workspaces | Tag Ingestion | User Impersonation | Native Query Audit | Multiple Integrations |
---|---|---|---|---|
After reading this page, see the for information about features and requirements before you .
The Starburst (Trino) integration v2.0 allows you to access policy-enforced data directly in your Starburst catalogs without rewriting queries or changing workflows. Instead of generating policy-enforced views and adding them to an Immuta catalog that users have to query (like in the ), Immuta policies are translated into Starburst (Trino) rules and permissions and applied directly to tables within users’ existing catalogs.
Once an Immuta Application Admin configures the Starburst (Trino) integration v2.0, the ImmutaSystemAccessControl plugin is installed on the . This plugin provides policy decisions to the Trino Execution Engine whenever an Immuta user queries a Starburst (Trino) table registered in Immuta. Then, the Trino Execution Engine applies policies to the backing catalogs and retrieves the data with appropriate policy enforcement.
By default, this integration is designed to be minimally invasive: if a catalog is not registered as an Immuta data source, users will still have access to it in Starburst. However, this limited enforcement can be changed in the provided by Immuta. Additionally, you can continue to use Trino's file-based access control provider or on catalogs that are not protected or controlled by Immuta.
See the for instructions on configuring multiple access control providers.
You can add or remove functions that are blocked by Immuta in the Starburst (Trino) integration v2.0 configuration file. See the for instructions.
A data owner . A data owner, data governor, or administrator or user in Immuta.
A Starburst (Trino) user who is subscribed to the data source in Immuta directly in their Starburst catalog.
See the to enable the integration.
Project Workspaces | Tag Ingestion | User Impersonation | Native Query Audit | Multiple Integrations |
---|
A valid
OAuth 2.0: You can authenticate with OAuth 2.0. Immuta's OAuth authentication method uses the ; when you register a data source, Immuta reaches out to your OAuth server to generate a JSON web token (JWT) and then passes that token to the Starburst (Trino) cluster.
If you are using OAuth or asynchronous authentication to create Starburst (Trino) data sources, see the to set the globalAdminUsername
property in the advanced configuration section of the Immuta app settings page.
The Starburst (Trino) integration cannot ingest tags from Starburst (Trino), but you can connect any of these to work with your integration.
Impersonation allows users to query data as another Immuta user. To enable user impersonation, see the page.
The Immuta Trino Event Listener allows Immuta to translate events into comprehensive audit logs for users with the Immuta AUDIT
permission to view. For more information about what is included in those audit logs, see the page.
Immuta policies can be applied to .
and
Deprecation notice
Support for this integration has been deprecated. Use the Starburst (Trino) v2.0 integration instead.
This page details how to configure the Starburst (Trino) integration.
The plugin comes pre-installed with Starburst Enterprise, so this page provides separate sets of guidelines for configuration:
Starburst Cluster Configuration: These instructions are specific to Starburst Enterprise clusters.
Trino Cluster Configuration: These instructions are specific to open-source Trino clusters.
Installation Method
This installation method is only available to users on Starburst Enterprise. If you are using any other form of Trino, see the Trino Cluster Configuration section.
The Starburst ODBC driver must be uploaded on the App Settings page.
Click the App Settings icon in the left sidebar.
Scroll to the Native Integrations section and click Add Native Integration.
Select Trino from the Native Integration Type dropdown menu.
Click Save.
If you are using OAuth or asynchronous authentication to create Starburst (Trino) data sources, configure the globalAdminUsername
property in the advanced configuration section of the Immuta app settings page.
Click the App Settings page icon.
Click Advanced Settings and scroll to Advanced Configuration.
Paste the following YAML configuration snippet in the text box, replacing the email address below with your admin username:
Create a configuration file immuta.properties
with the following contents in the etc/catalog
folder:
For more details, see Starburst's Event Listener documentation.
Create an etc/event-listener.properties
file in the same etc/catalog
folder.
Copy the Event Listener Configuration items from the App Settings page and paste it in the event-listener.properties
file.
For more details, see Starburst's Event Listener documentation.
Best Practice: Give Users read-only
Access to Immuta Catalog
Give users read-only
access to the Immuta catalog. This will prevent users from describing the views, which in turn prevents them from seeing secrets involved in some masking policies.
Follow Starburst's System Access Control documentation to configure Starburst to block access to any catalog that is not Immuta so that all user access has policies enacted on it.
Click the App Settings icon in the left sidebar.
Scroll to the Native Integrations section and click Add Native Integration.
Select Trino from the Native Integration Type dropdown menu.
Click Save.
The catalog configuration displayed in this section will need to be written out on all nodes (/etc/trino/config/catalog/immuta.properties).
If you are using OAuth or asynchronous authentication to create Starburst (Trino) data sources, configure the globalAdminUsername
property in the advanced configuration section of the Immuta app settings page.
Click the App Settings page icon.
Click Advanced Settings and scroll to Advanced Configuration.
Paste the following YAML configuration snippet in the text box, replacing the email address below with your admin username:
Best Practice: Immuta Archives Access Required
A user with access to Immuta's Archives site is required to conduct the download in this step at https://archives.immuta.com. If you are prompted to log in and need basic authentication credentials, reach out to your Immuta support professional.
The Immuta Trino plugin version is updated alongside Trino so that a matching version of the plugin is published for corresponding Trino releases. For example, the Immuta plugin version supporting Trino version 403 is simply version 403
. Download the plugin from version from Immuta's Archives site that corresponds with the Trino version you use.
Enable Immuta on your cluster. Select the tab below that corresponds to your installation method for instructions:
Docker installations for Trino versions 413 and older
Download the plugin from Immuta's Archives site.
Follow Trino's documentation to install the plugin archive on all nodes in your cluster.
Extract the archive to a local directory and mount the local directory to /usr/lib/trino/plugin/immuta
in the Docker container.
Install the plugin on all nodes within your cluster.
Docker installations for Trino versions 414 and newer
For Trino versions 414 and newer, you can use the immuta-trino
Docker image (which includes the Trino plugin jars) from registry.immuta.com instead of the trinodb/trino
Docker image.
Pull the image and start the container. The example below specifies the Immuta Trino plugin version 414 with the 414
tag, but any supported Trino version newer than 414 can be used:
Extract the archive to a local directory and mount the local directory to /usr/lib/trino/plugin/immuta
in the Docker container.
Standalone installations
Download the plugin from Immuta's Archives site.
Follow Trino's documentation to install the plugin archive on all nodes in your cluster.
Extract the archive to the plugin/immuta
directory in the Trino installation directory.
Install the plugin on all nodes within your cluster.
Best Practice: Trino Database Structure
The top level is set based on the name of the catalog properties files in the /etc/trino/catalog
directory. Use the name immuta.properties
for this file, which will result in a Trino catalog named “immuta.”
Follow Trino's documentation to create this catalog directory: /etc/trino/config/catalog
.
To configure the Immuta connector, mount the Immuta connector as the Immuta catalog: Create an immuta.properties
file with the following contents, replacing the connection properties with your Trino Cluster Configuration displayed on the App Settings page:
TLS Certificate Generation
If you provided your own TLS certificates during Immuta installation, you must ensure that the hostname in your certificate matches the hostname specified in the Starburst (Trino) configuration.
If you did not provide your own TLS certificates, Immuta generated these certificates for you during installation. See notes about your specific deployment method below for details.
Kubernetes Deployment: Immuta generates a local certificate authority (CA) that signs certificates for each service by default. Ensure that the externalHostname
you specified in the Immuta Helm Chart matches the Immuta hostname name specified in the Starburst (Trino) configuration.
If the hostnames in your certificate don't match the hostname specified in your Starburst (Trino) integration, you can set immuta.disable-hostname-verification
to true
to get the integration working in the interim.
The Starburst (Trino) integration uses the immuta.ca-file
property to communicate with Immuta. Specify a path to your CA file using the immuta.ca-file
property.
You can include any of these parameters in your immuta.properties
file to customize your integration.
immuta.ca-data
The base64-encoded CA certificate to use when making calls to the Immuta Web Service.
immuta.ca-file
: The path to a CA file to use when making calls to the Immuta Web Service.
immuta.cache.audit.seconds
: The amount of time in seconds audit-related query metadata should be cached in the Immuta Metadata Database. If you customize this value, it should be set to a value longer than the longest running query you plan to execute against the Immuta catalog (The default is 24 hours.).
immuta.cache.datasources.seconds
: The amount of time in seconds a user's available data sources will be cached. Changing this will impact how quickly available data sources will show up when updating projects or subscriptions.
immuta.cache.views.seconds
: The amount of time in seconds that a user's view of a data source will be cached. Changing this will impact how quickly policy changes are reflected for users actively querying.
immuta.disable-hostname-verification
: Disable hostname verification when connecting to the Immuta Web Service.
immuta.error-on-audit-failure
: When set to true
, error out when an Immuta audit record can not be created. Only used when the Event Listener is enabled.
Create an event-listener.properties
file in this directory: /etc/trino/
. For more details, see Trino's Event Listener documentation.
Copy the Event Listener Configuration items from the App Settings page and paste it in the event-listener.properties
file.
Best Practice: Give Users read-only
Access to Immuta Catalog
Give users read-only
access to the Immuta catalog. This will prevent users from describing the views, which in turn prevents them from seeing secrets involved in some masking policies.
Follow Trino's System Access Control documentation to configure Trino to block access to any catalog that is not Immuta so that all user access has policies enacted on it.
Audience: System Administrators
Content Summary: This page documents an example of a Starburst (Trino) Catalog policy, which can be used to protect sensitive data in your Starburst (Trino) cluster before Immuta is installed.
Starburst (Trino) Catalog Policy
The configuration of Starburst (Trino) catalog policies described below does not pertain to Immuta configuration or Immuta policies; this configuration manages access to sensitive data before Immuta is installed. Once Immuta is installed, Immuta's Subscription policies dynamically enforce access restrictions within the immuta
catalog, so if you opt to use the configuration below, it should be removed after Immuta is installed.
The catalog rules are course grained rules used to restrict all access or write access to catalogs. They do not explicitly grant any specific schema or table permissions. The table and schema rules are used to specify who can create, drop, alter, select, insert, delete, etc. for schemas and tables.
Follow the steps below to create a catalog policy to restrict access to your Starburst (Trino) data before Immuta is installed.
The following catalog policy gives every user access to immuta
and only super_admin_user
can access catalogs besides immuta
.
The plugin comes pre-installed with Starburst Enterprise, so this page provides separate sets of guidelines for configuration:
Click the App Settings icon in the left sidebar.
Scroll to the Native Integrations section and click Add Native Integration.
Select Trino from the Native Integration Type dropdown menu.
Click Save.
If you are using OAuth or asynchronous authentication to create Starburst (Trino) data sources, configure the globalAdminUsername
property in the advanced configuration section of the Immuta app settings page.
Click the App Settings page icon.
Click Advanced Settings and scroll to Advanced Configuration.
Paste the following YAML configuration snippet in the text box, replacing the email address below with your admin username:
Default Configuration Property Values
If you use the default property values in the configuration file described in this section,
you will give users read and write access to tables that are not registered in Immuta and
results for SHOW
queries will not be filtered on table metadata.
These default settings help ensure that a new Starburst integration installation is minimally disruptive for existing Starburst deployments, allowing you to then add Immuta data sources and update configuration to enforce more controls as you see fit.
However, the access-control.config-files
property can be configured to allow Immuta to work with existing Starburst installations that have already configured an access control provider. For example, if the Starburst integration v2.0 is configured to allow users write access to tables that are not protected by Immuta, you can still lock down write access for specific non-Immuta tables using an additional access control provider.
TLS Certificate Generation
If you provided your own TLS certificates during Immuta installation, you must ensure that the hostname in your certificate matches the hostname specified in the Starburst (Trino) configuration.
If you did not provide your own TLS certificates, Immuta generated these certificates for you during installation. See notes about your specific deployment method below for details.
If the hostnames in your certificate don't match the hostname specified in your Starburst (Trino) integration, you can set immuta.disable-hostname-verification
to true
in the Immuta access control config file to get the integration working in the interim.
The Starburst (Trino) integration uses the immuta.ca-file
property to communicate with Immuta. When configuring the plugin in Starburst (outlined below), specify a path to your CA file using the immuta.ca-file
property in the Immuta access control configuration file.
Create the Immuta access control configuration file in the Starburst configuration directory (/etc/starburst/immuta-access-control.properties
for Docker installations or <starburst_install_directory>/etc/immuta-access-control.properties
for standalone installations).
The table below describes the properties that can be set during configuration.
Enable the Immuta access control plugin in Starburst's configuration file (/etc/starburst/config.properties
for Docker installations or <starburst_install_directory>/etc/config.properties
for standalone installations). For example,
All Starburst users must map to Immuta users or match the immuta.user.admin
regex configured on the cluster, and their Starburst username must be mapped to Immuta so they can query policy-enforced data.
A user impersonating a different user in Starburst requires the IMPERSONATE_USER permission in Immuta. Both users must be mapped to an Immuta user, or the querying user must match the configured immuta.user.admin
regex.
Click the App Settings icon in the left sidebar.
Scroll to the Native Integrations section and click Add Native Integration.
Select Trino from the Native Integration Type dropdown menu.
Click Save.
If you are using OAuth or asynchronous authentication to create Starburst (Trino) data sources, configure the globalAdminUsername
property in the advanced configuration section of the Immuta app settings page.
Click the App Settings page icon.
Click Advanced Settings and scroll to Advanced Configuration.
Paste the following YAML configuration snippet in the text box, replacing the email address below with your admin username:
Default Configuration Property Values
If you use the default property values in the configuration file described in this section,
you will give users read and write access to tables that are not registered in Immuta and
results for SHOW
queries will not be filtered on table metadata.
These default settings help ensure that a new Starburst integration installation is minimally disruptive for existing Trino deployments, allowing you to then add Immuta data sources and update configuration to enforce more controls as you see fit.
However, the access-control.config-files
property can be configured to allow Immuta to work with existing Trino installations that have already configured an access control provider. For example, if the Starburst (Trino) integration v2.0 is configured to allow users write access to tables that are not protected by Immuta, you can still lock down write access for specific non-Immuta tables using an additional access control provider.
TLS Certificate Generation
If you provided your own TLS certificates during Immuta installation, you must ensure that the hostname in your certificate matches the hostname specified in the Starburst (Trino) configuration.
If you did not provide your own TLS certificates, Immuta generated these certificates for you during installation. See notes about your specific deployment method below for details.
If the hostnames in your certificate don't match the hostname specified in your Starburst (Trino) integration, you can set immuta.disable-hostname-verification
to true
in the Immuta access control config file to get the integration working in the interim.
The Starburst (Trino) integration uses the immuta.ca-file
property to communicate with Immuta. When configuring the plugin in Starburst (outlined below), specify a path to your CA file using the immuta.ca-file
property in the Immuta access control configuration file.
Enable Immuta on your cluster. Select the tab below that corresponds to your installation method for instructions:
Docker installations (Trino 413 and older)
Create the Immuta access control configuration file in the Trino configuration directory: /etc/trino/immuta-access-control.properties
.
Docker installations (Trino 414 and newer)
Pull the image and start the container. The example below specifies the Immuta Trino plugin version 414 with the 414
tag, but any supported Trino version newer than 414 can be used:
Create the Immuta access control configuration file in the Trino configuration directory: /etc/trino/immuta-access-control.properties
.
Standalone installations
Create the Immuta access control configuration file in the Trino configuration directory: <trino_install_directory>/etc/immuta-access-control.properties
.
Configure the properties described in the table below.
Enable the Immuta access control plugin in Trino's configuration file (/etc/trino/config.properties
for Docker installations or <trino_install_directory>/etc/config.properties
for standalone installations). For example,
All Trino users must map to Immuta users or match the immuta.user.admin
regex configured on the cluster, and their Trino username must be mapped to Immuta so they can query policy-enforced data.
A user impersonating a different user in Trino requires the IMPERSONATE_USER permission in Immuta. Both users must be mapped to an Immuta user, or the querying user must match the configured immuta.user.admin
regex.
All data sources created in Immuta will exist in the immuta
catalog created by the System Administrator who configures the Starburst (Trino) integration. However, if organizations add sensitive data to Starburst (Trino) and need to restrict access to catalogs before Immuta is installed, they can do so by using the , which controls access using catalog, schema, and table rules:
Follow to install the plugin, which allows you to specify authorization rules in a JSON file.
Create a catalog policy to manage access to the catalogs in Starburst (Trino) by following to the JSON file.
This page details how to install the integration v2.0.
: These instructions are specific to Starburst Enterprise clusters.
: These instructions are specific to open-source Trino clusters.
A valid .
: Immuta generates a local certificate authority (CA) that signs certificates for each service by default. Ensure that the externalHostname
you specified in the Immuta Helm Chart matches the Immuta hostname name specified in the Starburst (Trino) configuration.
Property | Starburst version | Required or optional | Description |
---|
to add users to Immuta.
when configuring your IAM (or map usernames manually) to Immuta.
A user with access to Immuta's Archives site is required to conduct the download in this step at . If you are prompted to log in and need basic authentication credentials, reach out to your Immuta support professional.
: Immuta generates a local certificate authority (CA) that signs certificates for each service by default. Ensure that the externalHostname
you specified in the Immuta Helm Chart matches the Immuta hostname name specified in the Starburst (Trino) configuration.
The Immuta Trino plugin version is updated alongside Trino so that a matching version of the plugin is published for corresponding Trino releases. For example, the Immuta plugin version supporting Trino version 403 is simply version 403
. Download the plugin from version from site that corresponds with the Trino version you use.
Download the plugin from site. The Starburst (Trino) integration v1.0 and v2.0 exist in the same plugin archive; you will configure which integration will be enabled.
Follow to install the plugin archive on all nodes in your cluster.
For Trino versions 414 and newer, you can use the immuta-trino
Docker image (which includes the Trino plugin jars) from registry.immuta.com instead of the .
Download the plugin from site. The Starburst (Trino) integration v1.0 and v2.0 exist in the same plugin archive; you will configure which integration will be enabled.
Follow to install the plugin archive on all nodes in your cluster.
Property | Trino version | Required or optional | Description |
---|
to add users to Immuta.
when configuring your IAM (or map usernames manually) to Immuta.
| 392 and newer | Required |
| 392 and newer | Optional |
| 413 and newer | Optional | This property defines a comma-separated list of allowed operations for users on Immuta data sources they are subscribed to: |
| 392 and newer | Optional | This property defines a comma-separated list of allowed operations users will have on tables not registered as Immuta data sources. If this property is left empty, users will not get access to any tables outside Immuta. When set to |
| 392 and newer | Required | This should be set to the Immuta API key displayed when enabling the integration on the app settings page. |
| 392 and newer | Optional | This property allows you to specify a path to your CA file. |
| 392 and newer | Optional | Amount of time in seconds for which a user's specific representation of an Immuta data source will be cached for. Changing this will impact how quickly policy changes are reflected for users actively querying Starburst. By default, cache expires after 30 seconds. |
| 392 and newer | Optional | Amount of time in seconds for which a user's available Immuta data sources will be cached for. Changing this will impact how quickly data sources will be available due to changing projects or subscriptions. By default, cache expires after 30 seconds. |
| 392 and newer | Required | The protocol and fully qualified domain name (FQDN) for the Immuta instance used by Starburst (for example, |
| 392 and newer | Optional | When set to false, Immuta won't filter unallowed table metadata, which helps ensure Immuta remains noninvasive and performant. If this property is set to true, running |
| 420 and newer | Required if | This property identifies the Starburst group that is the Immuta administrator. The users in this group will not have Immuta policies applied to them. Therefore, data sources should be created by users in this group so that they have access to everything. This property can be used in conjunction with the |
| 392 and newer | Required if | This property identifies the Starburst user who is an Immuta administrator (for example, |
| 392 and newer | Required |
| 392 and newer | Optional | Trino allows you to enable multiple system access control providers at the same time. To do so, add providers to this property as comma-separated values. This approach allows Immuta to work with existing Trino installations that have already configured an access control provider. Immuta does not manage all permissions in Trino and will default to allowing access to anything Immuta does not manage so that the Starburst (Trino) integration v2.0 complements existing controls. For example, if the Starburst (Trino) integration v2.0 is configured to allow users write access to tables that are not protected by Immuta, you can still lock down write access for specific non-Immuta tables using an additional access control provider. |
| 413 and newer | Optional | This property defines a comma-separated list of allowed operations for users on Immuta data sources they are subscribed to: |
| 392 and newer | Optional | This property defines a comma-separated list of allowed operations users will have on tables not registered as Immuta data sources. If this property is left empty, users will not get access to any tables outside Immuta. When set to |
| 392 and newer | Required | This should be set to the Immuta API key displayed when enabling the integration on the app settings page. |
| 392 and newer | Optional | This property allows you to specify a path to your CA file. |
| 392 and newer | Optional | Amount of time in seconds for which a user's specific representation of an Immuta data source will be cached for. Changing this will impact how quickly policy changes are reflected for users actively querying Trino. By default, cache expires after 30 seconds. |
| 392 and newer | Optional | Amount of time in seconds for which a user's available Immuta data sources will be cached for. Changing this will impact how quickly data sources will be available due to changing projects or subscriptions. By default, cache expires after 30 seconds. |
| 392 and newer | Required | The protocol and fully qualified domain name (FQDN) for the Immuta instance used by Trino (for example, |
| 392 and newer | Optional | When set to false, Immuta won't filter unallowed table metadata, which helps ensure Immuta remains noninvasive and performant. If this property is set to true, running |
| 420 and newer | Required if | This property identifies the Trino group that is the Immuta administrator. The users in this group will not have Immuta policies applied to them. Therefore, data sources should be created by users in this group so that they have access to everything. This property can be used in conjunction with the |
| 392 and newer | Required if | This property identifies the Trino user who is an Immuta administrator (for example, |
This property enables the integration. Both the and the Starburst integration v2.0 can be enabled at the same time. The immuta.allowed.non.immuta.datasource.operations
property (explained below) must contain at least READ when both integrations are enabled.
Starburst allows you to enable multiple system access control providers at the same time. To do so, add providers to this property as comma-separated values. Immuta has tested the Immuta system access control provider alongside the . This approach allows Immuta to work with existing Starburst installations that have already configured an access control provider. Immuta does not manage all permissions in Starburst and will default to allowing access to anything Immuta does not manage so that the Starburst integration v2.0 complements existing controls. For example, if the Starburst integration v2.0 is configured to allow users write access to tables that are not protected by Immuta, you can still lock down write access for specific non-Immuta tables using an additional access control provider.
This property enables the integration. Both the and the Starburst (Trino) integration v2.0 can be enabled at the same time. The immuta.allowed.non.immuta.datasource.operations
property (explained below) must contain at least READ when both integrations are enabled.