Skip to content

You are viewing documentation for Immuta version 2024.1.

For the latest version, view our documentation for Immuta SaaS or the latest self-hosted version.

Author a Subscription Policy

Best practice: write global policies

Build global subscription policies using attributes and Discovered tags instead of writing local policies to manage data access. This practice prevents you from having to write or rewrite single policies for every data source added to Immuta and from manually approving data access.

Write access policy requirements

Private preview

Write policies are only available to select accounts. Contact your Immuta representative to enable this feature.

  • At least one of the following permissions is required to manage write policies:
    • CREATE_DATA_SOURCE Immuta permission (to create local write policies)
    • GOVERNANCE Immuta permission (to create local or global write policies)
    • MANAGE_POLICIES domain permission (to create global write policies)
  • Databricks Unity Catalog or Snowflake integration
  • Snowflake table grants enabled (for Snowflake integrations)

Create a policy

  1. Determine your policy scope:
    • Global policy: Click the Policies page icon in the left sidebar and select the Subscription Policies tab. Click Add Subscription Policy and complete the Enter Name field.
    • Local policy: Navigate to a specific data source and click the Policies tab. Click Add Subscription Policy and select New Local Subscription Policy.
  2. Select the access type:
    • Read Access: Control who can view the data source.
    • Write Access: Control who can view and modify data in the data source.
  3. Select the level of access restriction you would like to apply:

    • Allow Anyone: Check the Require users to take action to subscribe checkbox to turn off automatic subscription. Enabling this feature will require users to manually subscribe to the data source if they meet the policy.
    • Allow Anyone Who Asks (and Is Approved):

      1. Click anyone or an individual selected by user from the first dropdown menu in the subscription policy builder.

        Note: If you choose an individual selected by user, when users request access to a data source they will be prompted to identify an approver with the permission specified in the policy and how they plan to use the data.

      2. Select the Owner (of the data source), User_Admin, Governance, or Audit permission from the subsequent dropdown menu.

        Note: You can add more than one approving party by selecting + Add.

    • Allow Users with Specific Groups/Attributes: See the ABAC subscription policy guide for instructions.

    • Allow Individually Selected Users
  4. For global policies: From the Where should this policy be applied dropdown menu, select When selected by data owners, On all data sources, or On data sources. If you selected On data sources, finish the condition in one of the following ways:

    • tagged: Select this option and then search for tags in the subsequent dropdown menu.

    • with columns tagged: Select this option and then search for tags in the subsequent dropdown menu.

    • with column names spelled like: Select this option, and then enter a regex and choose a modifier in the subsequent fields.

    • in server: Select this option and then choose a server from the subsequent dropdown menu to apply the policy to data sources that share this connection string.

    • created between: Select this option and then choose a start date and an end date in the subsequent dropdown menus.

  5. Click Create Policy. If creating a global policy, you then need to click Activate Policy or Stage Policy.

Manually grant access

Read and write access can also be granted manually by a data owner. See the Manage data source members guide for details.

Additional global ABAC subscription policies

When you have multiple global ABAC subscription policies to enforce, create separate global ABAC subscription policies, and then Immuta will use boolean logic to merge all the relevant policies on the tables they map to.