Configure Starburst (Trino) Integration
The plugin comes pre-installed with Starburst Enterprise, so this page provides separate sets of guidelines for configuration:
Starburst Cluster Configuration
Requirements
1 - Enable the Integration
Click the App Settings icon in the left sidebar.
Click the Integrations tab.
Click Add Native Integration and select Trino from the Native Integration Type dropdown menu.
Click Save.
OAuth Authentication
If you are using OAuth or asynchronous authentication to create Starburst data sources, work with your Immuta representative to configure the globalAdminUsername
property.
2 - Configure the Immuta System Access Control Plugin in Starburst
Default configuration property values
If you use the default property values in the configuration file described in this section,
you will give users read and write access to tables that are not registered in Immuta and
results for
SHOW
queries will not be filtered on table metadata.
These default settings help ensure that a new Starburst integration installation is minimally disruptive for existing Starburst deployments, allowing you to then add Immuta data sources and update configuration to enforce more controls as you see fit.
However, the access-control.config-files
property can be configured to allow Immuta to work with existing Starburst installations that have already configured an access control provider. For example, if the Starburst integration is configured to allow users write access to tables that are not protected by Immuta, you can still lock down write access for specific non-Immuta tables using an additional access control provider.
Create the Immuta access control configuration file in the Starburst configuration directory (
/etc/starburst/immuta-access-control.properties
for Docker installations or<starburst_install_directory>/etc/immuta-access-control.properties
for standalone installations).The table below describes the properties that can be set during configuration.
Enable the Immuta access control plugin in Starburst's configuration file (
/etc/starburst/config.properties
for Docker installations or<starburst_install_directory>/etc/config.properties
for standalone installations). For example,
Example Immuta System Access Control Configuration
3 - Add Starburst Users to Immuta
All Starburst users must map to Immuta users or match the
immuta.user.admin
regex configured on the cluster, and their Starburst username must be mapped to Immuta so they can query policy-enforced data.A user impersonating a different user in Starburst requires the IMPERSONATE_USER permission in Immuta. Both users must be mapped to an Immuta user, or the querying user must match the configured
immuta.user.admin
regex.
4 - Register data
Trino Cluster Configuration
1 - Enable the Integration
Click the App Settings icon in the left sidebar.
Click the Integrations tab.
Click Add Native Integration and select Trino from the dropdown menu.
Click Save.
OAuth Authentication
If you are using OAuth or asynchronous authentication to create Starburst data sources, work with your Immuta representative to configure the globalAdminUsername
property.
2 - Configure the Immuta System Access Control Plugin in Trino
Default configuration property values
If you use the default property values in the configuration file described in this section,
you will give users read and write access to tables that are not registered in Immuta and
results for
SHOW
queries will not be filtered on table metadata.
These default settings help ensure that a new Starburst integration installation is minimally disruptive for existing Trino deployments, allowing you to then add Immuta data sources and update configuration to enforce more controls as you see fit.
However, the access-control.config-files
property can be configured to allow Immuta to work with existing Trino installations that have already configured an access control provider. For example, if the Starburst (Trino) integration is configured to allow users write access to tables that are not protected by Immuta, you can still lock down write access for specific non-Immuta tables using an additional access control provider.
Enable Immuta on your cluster. Select the tab below that corresponds to your installation method for instructions:
Docker (Trino 413 and older)
Create the Immuta access control configuration file in the Trino configuration directory:
/etc/trino/immuta-access-control.properties
.
Pull the image and start the container. The example below specifies the Immuta Trino plugin version 414 with the
414
tag, but any supported Trino version newer than 414 can be used:Create the Immuta access control configuration file in the Trino configuration directory:
/etc/trino/immuta-access-control.properties
.
Standalone installations
Create the Immuta access control configuration file in the Trino configuration directory:
<trino_install_directory>/etc/immuta-access-control.properties
.
Configure the properties described in the table below.
Enable the Immuta access control plugin in Trino's configuration file (
/etc/trino/config.properties
for Docker installations or<trino_install_directory>/etc/config.properties
for standalone installations). For example,
Example Immuta System Access Control Configuration
3 - Add Trino Users to Immuta
All Trino users must map to Immuta users or match the
immuta.user.admin
regex configured on the cluster, and their Trino username must be mapped to Immuta so they can query policy-enforced data.A user impersonating a different user in Trino requires the IMPERSONATE_USER permission in Immuta. Both users must be mapped to an Immuta user, or the querying user must match the configured
immuta.user.admin
regex.
4 - Register data
Last updated