# Customize the Immuta Trino Plugin

When you register a connection, there is a provided `immuta-access-control.properties` file pre-populated with the required properties. You can also add these additional properties to further customize your connection.

## `immuta-access-control.properties`

{% hint style="warning" %}
Starburst does not support using Starburst built-in access control (BIAC) concurrently with any other access control providers such as Immuta. If Starburst BIAC is in use, it must be disabled to allow Immuta to enforce policies on cluster.
{% endhint %}

{% hint style="info" %}
**Default configuration property values**

If you use the default property values in the configuration file described in this section,

* you will **give users read and write access to tables that are not data sources in Immuta** and
* results for `SHOW` queries will not be filtered on table metadata.

These default settings help ensure that a new Starburst connection is minimally disruptive for existing Starburst deployments, allowing you to then create Immuta data sources and update configuration to enforce more controls as you see fit.

However, the **`access-control.config-files`** property can be configured to allow Immuta to work with existing Starburst installations that have already configured an access control provider. For example, if the Starburst integration is configured to allow users write access to tables that are not protected by Immuta, you can still lock down write access for specific non-Immuta tables using an additional access control provider.
{% endhint %}

| Property                                              | Trino version | Required or optional | Description                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               |
| ----------------------------------------------------- | ------------- | -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| **`access-control.name`**                             | 392 and newer | Required             | This property enables the integration.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |
| **`access-control.config-files`**                     | 392 and newer | Optional             | Trino allows you to enable multiple system access control providers at the same time. To do so, add providers to this property as comma-separated values. This approach allows Immuta to work with existing Trino installations that have already configured an access control provider. Immuta does not manage all permissions in Trino and will default to allowing access to anything Immuta does not manage so that the Starburst (Trino) integration complements existing controls. For example, if the Starburst (Trino) integration is configured to allow users write access to tables that are not protected by Immuta, you can still lock down write access for specific non-Immuta tables using an additional access control provider.                                                                                                                                                                                                                                                                                                                                                                         |
| **`immuta.allowed.immuta.datasource.operations`**     | 413 and newer | Optional             | This property defines a comma-separated list of allowed operations for Starburst (Trino) users on tables registered as Immuta data sources: `READ`,`WRITE`, and `OWN`. (See the [Customize read and write access policies for Starburst (Trino) guide](https://documentation.immuta.com/SaaS/configuration/integrations/starburst-trino/how-to-guides/write-access-mapping) for details about the `OWN` operation.) When set to `WRITE`, all querying users are allowed read and write operations to data source schemas and tables. By default, this property is set to `READ`, which blocks write operations on data source tables and schemas. *If* [*write policies*](https://documentation.immuta.com/SaaS/govern/secure-your-data/authoring-policies-in-secure/section-contents/reference-guides/subscription-access-types#granting-starburst-trino-privileges) *are enabled for your Immuta tenant, this property is set to `READ,WRITE` by default, so users are allowed read and write operations to data source schemas and tables.*                                                                            |
| **`immuta.allowed.non.immuta.datasource.operations`** | 392 and newer | Optional             | This property defines a comma-separated list of allowed operations users will have on tables not registered as Immuta data sources: `READ`, `WRITE`, `CREATE`, and `OWN`. (See the [Customize read and write access policies for Starburst (Trino) guide](https://documentation.immuta.com/SaaS/configuration/integrations/starburst-trino/how-to-guides/write-access-mapping) for details about `CREATE` and `OWN` operations.) When set to `READ`, users are allowed read operations on tables not registered as Immuta data sources. When set to `WRITE`, users are allowed read and write operations on tables not registered as Immuta data sources. If this property is left empty, users will not get access to any tables outside Immuta. By default, this property is set to `READ,WRITE`. *If* [*write policies*](https://documentation.immuta.com/SaaS/govern/secure-your-data/authoring-policies-in-secure/section-contents/reference-guides/subscription-access-types#granting-starburst-trino-privileges) *are enabled for your Immuta tenant, this property is set to `READ,WRITE,OWN,CREATE` by default.* |
| **`immuta.apikey`**                                   | 392 and newer | Required             | This should be set to the Immuta API key displayed when [registering the connection](https://documentation.immuta.com/SaaS/configuration/integrations/starburst-trino/how-to-guides/register-a-trino-connection). To rotate this API key, [follow these instructions](https://documentation.immuta.com/SaaS/configuration/integrations/starburst-trino/how-to-guides/register-a-trino-connection/rotate-the-system-api-key) to generate a new API key, and then replace the existing `immuta.apikey` value with the new one.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              |
| **`immuta.audit.legacy.enabled`**                     | 435 and newer | Optional             | This property allows you to turn off Starburst (Trino) audit. Must set both `immuta.audit.legacy.enabled` and `immuta.audit.uam.enabled` to `false` to fully disable query audit.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         |
| **`immuta.audit.uam.enabled`**                        | 435 and newer | Optional             | This property allows you to turn off Starburst (Trino) audit. Must set both `immuta.audit.legacy.enabled` and `immuta.audit.uam.enabled` to `false` to fully disable query audit.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         |
| **`immuta.ca-file`**                                  | 392 and newer | Optional             | This property allows you to specify a path to your CA file.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               |
| **`immuta.cache.views.seconds`**                      | 392 and newer | Optional             | Amount of time in seconds for which a user's specific representation of an Immuta data source will be cached for. Changing this will impact how quickly policy changes are reflected for users actively querying Trino. By default, cache expires after 30 seconds.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       |
| **`immuta.cache.datasource.seconds`**                 | 392 and newer | Optional             | Amount of time in seconds for which a user's available Immuta data sources will be cached for. Changing this will impact how quickly data sources will be available due to changing projects or subscriptions. By default, cache expires after 30 seconds.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                |
| **`immuta.endpoint`**                                 | 392 and newer | Required             | The protocol and fully qualified domain name (FQDN) for the Immuta tenant used by Trino (for example, `https://my.immuta.tenant.io`). This should be set to the endpoint displayed when [registering the connection](https://documentation.immuta.com/SaaS/configuration/integrations/starburst-trino/how-to-guides/register-a-trino-connection).                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         |
| **`immuta.filter.unallowed.table.metadata`**          | 392 and newer | Optional             | When set to false, Immuta won't filter unallowed table metadata, which helps ensure Immuta remains noninvasive and performant. If this property is set to true, running `show catalogs`, for example, will reflect what that user has access to instead of returning all catalogs. By default, this property is set to false.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             |
| **`immuta.http.timeout.milliseconds`**                | 464 and newer | Optional             | The timeout for all HTTP calls made to Immuta in milliseconds. Defaults to `30000` (30 seconds).                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          |
| **`immuta.user.admin`**                               | 392 and newer | Required             | This property identifies the Trino user who is an Immuta administrator (for example, `immuta.user.admin=immuta_system_account`). This user will not have Immuta policies applied to them because this account will run the subqueries. This should be the Starburst user provided when registering the connection. Note that you must escape regex special characters (for example, `john\\.doe+svcacct@immuta\\.com`).                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   |

## Example Immuta system access control file

The example configuration snippet below uses the default configuration settings for `immuta.allowed.immuta.datasource.operations` and `immuta.allowed.non.immuta.datasource.operations`, which allow read access for data registered as Immuta data sources and read and write access on data that is not registered in Immuta. See the [Granting Starburst (Trino) privileges section](https://documentation.immuta.com/SaaS/govern/secure-your-data/authoring-policies-in-secure/section-contents/reference-guides/subscription-access-types#granting-starburst-trino-privileges) for details about customizing and enforcing read and write access controls in Starburst.

```conf
# Enable the Immuta System Access Control implementation.
access-control.name=immuta

# The Immuta endpoint that was displayed when registering the Trino connection in Immuta.
immuta.endpoint=http://service.immuta.com:3000

# The Immuta API key that was displayed when registering the Trino in Immuta.
immuta.apikey=45jdljfkoe82b13eccfb9c

# The administrator user regex. Trino usernames matching this regex will not be subject to
# Immuta policies. This regex should match the user name provided at Immuta data source
# registration.
immuta.user.admin=immuta_system_account

# Optional argument (default is shown).
# A CSV list of operations allowed on schemas/tables registered as Immuta data sources.
immuta.allowed.immuta.datasource.operations=READ

# Optional argument (default is shown).
# A CSV list of operations allowed on schemas/tables not registered as Immuta data sources.
# Set to empty to allow no operations on non-Immuta data sources.
immuta.allowed.non.immuta.datasource.operations=READ,WRITE

# Optional argument (default is shown).
# Controls table metadata filtering for inaccessible tables.
#   - When this property is enabled and non-Immuta reads are also enabled, a user performing
#     'show catalogs/schemas/tables' will not see metadata for a table that is registered as
#     an Immuta data source but the user does not have access to through Immuta.
#   - When this property is enabled and non-Immuta reads and writes are disabled, a user
#     performing 'show catalogs/schemas/tables' will only see metadata for tables that the
#     user has access to through Immuta.
#   - When this property is disabled, a user performing 'show catalogs/schemas/tables' can see
#     all metadata.
immuta.filter.unallowed.table.metadata=false
```
