Last updated
Last updated
Immuta policies are dynamic and change for the user accessing data. Every user accessing policy-protected data must exist in Immuta, regardless of if they will interact with the Immuta UI.
: Add, edit, and delete the permissions on your Immuta users.
: Enable, grant, and use user impersonation for Azure Synapse Analytics, Databricks, Redshift, Snowflake, or Starburst (Trino).
: Add, edit, and delete user's attributes and groups.
: Ensure policies and audit work correctly by mapping the user's ID from the integration to Immuta.
: Configure your IAM in Immuta to retrieve users' groups and attributes from an external HTTP endpoint.
: This reference guide describes Immuta's permissions and the user personas that they apply to.
: This reference guide describes attributes and groups in Immuta.