Manage User Metadata How-to Guide

1 - Manage user metadata how-to guide

Before authoring global subscription policies to automate access controls, user metadata must exist in Immuta so that it can be used in the policy to identify the users that should be granted or revoked access to data.

This how-to guide demonstrates how to manually add groups and attributes or use existing groups in external identity managers to identify users that should be targeted by a subscription policy.

For detailed explanations and examples of how to manage user metadata, see the Managing user metadata guide.

Requirements

Immuta permission: USER_ADMIN

Prerequisite

Identity access manager configured

Select your metadata strategy

Organize your user metadata

Fact-based (ABAC)

Fact-based user metadata (ABAC) allows you to decouple policy logic from user metadata, allowing highly scalable ABAC policy authoring. For example,

  • Steve has attribute: country:USA

  • Sara has attribute: role:administrator

  • Stephanie has attribute: sales_region: Ohio, Michigan, Indiana

  1. Create groups that describe users' roles or who they are.

  2. Create attributes that describe users' roles or who they are.

Logic-based (orchestrated-RBAC)

Logic-based user metadata (orchestrated-RBAC) couples user metadata with access logic. For example,

  • Steve has attribute: access_to:USA

  • Sara has attribute: role:admin_functions

  • Stephanie has groups: Ohio_sales, Michigan_sales, Indiana_sales

  1. Use your groups as-is from your identity manager or other custom sources.

  2. Create attributes in a hierarchy that will support hierarchical matching.

    For example, if you have the tags Strictly Confidential, Confidential, Internal, and Public , you would want to ensure that user attributes follow the same hierarchy. For example,

    • A user with access to all data: Classification: Strictly Confidential

    • A user with access to only Internal and Public: Classification: Strictly Confidential.Confidential.Internal

Add user metadata to Immuta

Once you've organized your user metadata, you can add that metadata in Immuta in these ways:

  1. Add attributes and groups to users in your identity manager. Then, sync your users, groups, and attributes from your external identity manager to Immuta:

    1. LDAP: Enable LDAP sync and sync groups and attributes to Immuta for your provider.

    2. OpenID Connect or SAML: Enable SCIM for your provider and enable sync attributes and groups.

Next steps

Learn

Read these guides to learn more about using Immuta to automate data access control decisions.

  1. Choose your path: orchestrated RBAC and ABAC: This section describes the two different approaches (or mix) you can take to managing policy and their tradeoffs.

  2. Managing data metadata: This guide describes how to manage your data metadata and create meaningful tags before you use them to author policies.

  3. Author policy: This guide describes how to define your global subscription policy logic.

Implement

Follow these guides to start using Immuta to automate data access control decisions.

  1. Manage data metadata. Tag your columns with tags that are meaningful.

  2. Author policy. Define your global subscription policy logic.

Last updated

Was this helpful?