LogoLogo
CtrlK
SaaSBook a demo
  • Immuta Documentation - SaaS
  • What is Immuta?
  • Integrations
    • Immuta Integrations
    • Snowflake
      • Getting Started with Snowflake
      • How-to Guides
        • Configure a Snowflake Integration
        • Edit or Remove Your Snowflake Integration
        • Integration Settings
          • Snowflake Table Grants Private Preview Migration
          • Enable Snowflake Table Grants
          • Using Snowflake Data Sharing with Immuta
          • Enable Snowflake Low Row Access Policy Mode
            • Upgrade Snowflake Low Row Access Policy Mode
          • Configure Snowflake Lineage Tag Propagation
      • Reference Guides
        • Snowflake Integration
        • Snowflake Table Grants
        • Snowflake Data Sharing with Immuta
        • Snowflake Low Row Access Policy Mode
        • Snowflake Lineage Tag Propagation
        • Warehouse Sizing Recommendations
      • Phased Snowflake Onboarding Concept Guide
    • Databricks Unity Catalog
      • Getting Started with Databricks Unity Catalog
      • How-to Guides
        • Configure a Databricks Unity Catalog Integration
        • Migrating to Unity Catalog
      • Databricks Unity Catalog Integration Reference Guide
    • Databricks Spark
      • How-to Guides
        • Configuration
          • Simplified Databricks Configuration
          • Manual Databricks Configuration
          • Manually Update Your Databricks Cluster
          • Install a Trusted Library
        • DBFS Access
        • Limited Enforcement in Databricks
        • Hiding the Immuta Database in Databricks
        • Run spark-submit Jobs on Databricks
        • Configure Project UDFs Cache Settings
        • External Metastores
      • Reference Guides
        • Databricks Integration
        • Databricks Pre-Configuration Details
        • Configuration Settings
          • Cluster Policies
            • Python & SQL
            • Python & SQL & R
            • Python & SQL & R with Library Support
            • Scala
            • Sparklyr
          • Environment Variables
          • Ephemeral Overrides
          • Py4j Security Error
          • Scala Cluster Security
          • Security Configuration for Performance
        • Databricks Change Data Feed
        • Databricks Libraries
        • Delta Lake API
        • Spark Direct File Reads
        • Databricks Metastore Magic
    • Starburst (Trino)
      • Getting Started with Starburst (Trino)
      • How-to Guides
        • Configure Starburst (Trino) Integration
        • Customize Read and Write Access Policies for Starburst (Trino)
      • Starburst (Trino) Integration Reference Guide
    • Redshift
      • Getting Started with Redshift
      • How-to Guides
        • Configure Redshift Integration
        • Configure Redshift Spectrum
      • Reference Guides
        • Redshift Overview
        • Redshift Pre-Configuration Details
    • Azure Synapse Analytics
      • Getting Started with Azure Synapse Analytics
      • Configure Azure Synapse Analytics Integration
      • Reference Guides
        • Azure Synapse Analytics Overview
        • Azure Synapse Analytics Pre-Configuration Details
    • Amazon S3 Integration
    • Google BigQuery Integration
    • Catalogs
      • Getting Started with External Catalogs
      • Configure an External Catalog
      • Reference Guides
        • External Catalog Introduction
        • Custom REST Catalog Interface Introduction
        • Custom REST Catalog Interface Endpoints
  • Data
    • Registering a Host
      • How-to Guides
        • Register a Snowflake Host
        • Register a Databricks Unity Catalog Host
        • Manually Crawl a Host or Object
      • Enhanced Onboarding and Data Source Registration
    • Registering Metadata
      • Data Sources in Immuta
      • Register Data Sources
        • Amazon S3 Data Source
        • Azure Synapse Analytics Data Source
        • Databricks Data Source
        • Google BigQuery Data Source
        • Redshift Data Source
        • Snowflake Data Source
        • Bulk Create Snowflake Data Sources
        • Create a Starburst (Trino) Data Source
      • Data Source Settings
        • How-to Guides
          • Manage Data Source Settings
          • Manage Data Source Members
          • Manage Access Requests and Tasks
          • Manage Data Dictionary Descriptions
          • Disable Immuta from Sampling Raw Data
        • Data Source Health Checks Reference Guide
      • Schema Monitoring
        • How-to Guides
          • Manage Schema Monitoring
          • Run Schema Monitoring and Column Detection Jobs
        • Reference Guides
          • Schema Monitoring
          • Schema Projects
        • Why Use Schema Monitoring Concept Guide
    • Domains
      • Getting Started with Domains
      • Domains Reference Guide
    • Tags
      • How-to Guides
        • Create and Manage Tags
        • Add Tags to Data Sources and Projects
      • Tags Reference Guide
  • People
    • Getting Started with Users
    • Identity Managers (IAMs)
      • How-to Guides
        • Microsoft Entra ID
        • Okta
          • Okta LDAP Interface
          • Okta and OpenID Connect
          • Integrate Okta SAML SCIM with Immuta
        • OneLogin with OpenID
        • Configure SAML IAM Protocol
      • Reference Guides
        • Identity Managers
        • SAML Protocol Configuration Options
        • SAML Single Logout
    • Immuta Users
      • How-to Guides
        • Managing Personas and Permissions
        • User Impersonation
        • Manage Attributes and Groups
        • External User ID Mapping
        • External User Info Endpoint
      • Reference Guides
        • Permissions and Personas
        • Attributes and Groups in Immuta
  • Discover Your Data
    • Getting Started with Discover
    • Introduction
    • Data Discovery
      • How-to Guides
        • Enable Sensitive Data Discovery (SDD)
        • Manage Identification Frameworks
        • Manage Identifiers
        • Run and Manage Sensitive Data Discovery on Data Sources
        • Manage Sensitive Data Discovery Settings
        • Migrate From Legacy to Native SDD
      • Reference Guide
        • Built-in Identifier Reference
        • Improved Pack: Built-in Identifier Reference
        • Built-in Discovered Tags Reference
        • How Competitive Pattern Analysis Works
    • Data Classification
      • How-to Guides
        • Activate Classification Frameworks
        • Adjust Identification and Classification Framework Tags
        • How to Use a Built-In Classification Framework with Your Own Tags
      • Reference Guides
        • Built-in Classification Frameworks
        • The Immuta DSF
  • Detect Your Data
    • Getting Started with Detect
      • Monitor and Secure Sensitive Data Platform Query Activity
        • SaaS Benefits
        • User Identity Best Practices
        • Native Integration Architecture
        • Snowflake Roles Best Practices
        • Register Data Sources
        • Automate Entity and Sensitivity Discovery
        • Onboard Detect with Discover
        • Using Immuta Detect
      • General Immuta Configuration
        • SaaS Benefits
        • User Identity Best Practices
        • Native Integration Architecture
        • Databricks Roles Best Practices
        • Register Data Sources
    • Introduction
    • Audit
      • How-to Guides
        • Export Audit Logs to S3
        • Export Audit Logs to ADLS
        • Run Governance Reports
      • Reference Guides
        • Universal Audit Model (UAM)
          • UAM Schema Reference Guide
        • Query Audit Logs
          • Snowflake Query Audit Logs
          • Databricks Unity Catalog Query Audit Logs
          • Databricks Spark Query Audit Logs
          • Starburst (Trino) Query Audit Logs
        • Audit Export GraphQL Reference Guide
        • Unknown Users in Audit Logs
        • Governance Report Types
      • Deprecated Audit Guides
        • Legacy to UAM Migration
        • Manage Audit Logs
    • Dashboards
      • Use the Detect Dashboards How-To Guide
      • Detect Dashboards Reference Guide
    • Monitors
      • Detect Monitors
      • Manage Monitors and Observations
  • Secure Your Data
    • Getting Started with Secure
      • Automate Data Access Control Decisions
        • The Two Paths
        • Managing User Metadata
        • Managing Data Metadata
        • Author Policy
        • Test and Deploy Policy
      • Compliantly Open More Sensitive Data for ML and Analytics
        • Managing User Metadata
        • Managing Data Metadata
        • Author Policy
      • Federated Governance for Data Mesh and Self-Serve Data Access
        • Defining Domains
        • Managing Data Products
        • Managing Data Metadata
        • Apply Federated Governance
        • Discover and Subscribe to Data Products
    • Introduction
      • Scalability and Evolvability
      • Understandability
      • Distributed Stewardship
      • Consistency
      • Availability of Data
    • Authoring Policies in Secure
      • Authoring Policies at Scale
      • Data Engineering with Limited Policy Downtime
      • Subscription Policies
        • Overview
        • How-to Guides
          • Author a Subscription Policy
          • Author an ABAC Subscription Policy
          • Subscription Policies Advanced DSL Guide
          • Author a Restricted Subscription Policy
          • Clone, Activate, or Stage a Global Policy
        • Reference Guides
          • Subscription Policy Access Types
          • Advanced Use of Special Functions
      • Data Policies
        • Overview
        • How-to Guides
          • Author a Masking Data Policy
          • Author a Minimization Policy
          • Author a Purpose-Based Restriction Policy
          • Author a Restricted Data Policy
          • Author a Row-Level Policy
          • Author a Time-Based Restriction Policy
          • Certifications Exemptions and Diffs
          • External Masking Interface
        • Reference Guides
          • All Data Policy Types
          • Masking Policies
          • Row-Level Policies
          • Custom WHERE Clause Functions
          • Data Policy Conflicts and Fallback
          • Custom Data Policy Certifications
          • Orchestrated Masking Policies
    • Projects and Purpose-Based Access Control
      • Projects and Purpose Controls
        • Getting Started
        • How-to Guides
          • Create a Project
          • Create and Manage Purposes
          • Adjust a Policy
          • Project Management
            • Manage Projects and Project Settings
            • Manage Project Data Sources
            • Manage Project Members
        • Reference Guides
          • Projects and Purposes
          • Policy Adjustments
        • Concept Guide
          • Why Use Purposes?
      • Equalized Access
        • Manage Project Equalization How-to Guide
        • Equalized Access Reference Guide
        • Why Use Project Equalization?
      • Masked Joins
        • Enable Masked Joins How-to Guide
        • Why Use Masked Joins?
      • Writing to Projects
        • How-to Guides
          • Create and Manage Snowflake Project Workspaces
          • Create and Manage Databricks Project Workspaces
          • Write Data to the Workspace
        • Reference Guides
          • Writing to Projects
          • Project UDFs (Databricks)
    • Data Consumers
      • Subscribe to a Data Source
      • Query Data
        • Querying Snowflake Data
        • Querying Databricks Data
        • Querying Starburst (Trino) Data
        • Querying Databricks SQL Data
        • Querying Redshift Data
        • Querying Azure Synapse Analytics Data
      • Subscribe to Projects
  • Application Configuration
    • How-to Guides
      • App Settings
      • Private Networking Support
        • AWS PrivateLink for Redshift
        • Databricks Private Connectivity
          • AWS PrivateLink for Databricks
          • Azure Private Link for Databricks
        • Snowflake Private Connectivity
          • AWS PrivateLink for Snowflake
          • Azure Private Link for Snowflake
        • Starburst (Trino) Private Connectivity
          • AWS PrivateLink for Starburst (Trino)
          • Azure Private Link for Starburst (Trino)
      • BI Tools
        • BI Tool Configuration Recommendations
        • Power BI Configuration Example
        • Tableau Configuration Example
      • IP Filtering
      • System Status Bundle
    • Reference Guides
      • Deployment Options
      • Data Processing
      • Encryption and Masking Practices
  • Releases
    • Deployment Notes
    • Immuta Support Matrix Overview
    • Immuta CLI Release Notes
    • Preview Features
      • Features in Preview
    • Deprecations
  • Developer Guides
    • The Immuta CLI
      • Install and Configure the Immuta CLI
      • Manage Your Immuta Tenant
      • Manage Data Sources
      • Manage Sensitive Data Discovery
        • Manage Sensitive Data Discovery Rules
        • Manage Identification Frameworks
        • Run Sensitive Data Discovery on Data Sources
      • Manage Policies
      • Manage Projects
      • Manage Purposes
      • Manage Audit Export
    • The Immuta API
      • Integrations API
        • Getting Started
        • How-to Guides
          • Configure an Amazon S3 Integration and Create an S3 Data Source
          • Configure an Azure Synapse Analytics Integration
          • Configure a Databricks Unity Catalog Integration
          • Configure a Google BigQuery Integration
          • Configure a Redshift Integration
          • Configure a Snowflake Integration
          • Configure a Starburst (Trino) Integration
        • Reference Guides
          • Integrations API Endpoints
          • Integration Configuration Payload
          • Response Schema
          • HTTP Status Codes and Error Messages
      • Enhanced Onboarding API
        • How-to Guides
          • Register a Host
            • Register a Snowflake Host
            • Register a Databricks Unity Catalog Host
          • Manage a Host
          • Deregister a Host
        • Host Registration Payloads Reference Guide
      • Immuta V2 API
        • Data Source Payload Attribute Details
          • Data Source Request Payload Examples
        • Create Policies API Examples
        • Create Projects API Examples
        • Create Purposes API Examples
      • Immuta V1 API
        • Authenticate with the API
        • Configure Your Instance of Immuta
          • Get Fingerprint Status
          • Get Job Status
          • Manage Frameworks
          • Manage IAMs
          • Manage Licenses
          • Manage Notifications
          • Manage Sensitive Data Discovery (SDD)
          • Manage Tags
          • Manage Webhooks
          • Search Filters
        • Connect Your Data
          • Create an Azure Synapse Analytics Data Source
          • Create a Databricks Data Source
          • Create a Redshift Data Source
          • Create a Snowflake Data Source
          • Create a Starburst (Trino) Data Source
          • Manage the Data Dictionary
        • Manage Data Access
          • Manage Access Requests
          • Manage Data and Subscription Policies
          • Manage Domains
          • Manage Write Policies
            • Write Policies Payloads and Response Schema Reference Guide
          • Policy Handler Objects
          • Search Audit Logs
          • Search Connection Strings
          • Search for Organizations
          • Search Schemas
        • Subscribe to and Manage Data Sources
        • Manage Projects and Purposes
          • Manage Projects
          • Manage Purposes
Powered by GitBook
On this page

Was this helpful?

  1. Application Configuration

Reference Guides

Deployment OptionsData ProcessingEncryption and Masking Practices
PreviousSystem Status BundleNextDeployment Options

Was this helpful?

Self-managed versions

  • 2025.1
  • 2024.3
  • 2024.2

Resources

  • Immuta Changelog

Copyright © 2014-2025 Immuta Inc. All rights reserved.