Data Access Management > Data access policies > Prerequisites for pushdown enforcement
  

Prerequisites for pushdown enforcement

To enable Data Governance and Catalog to push down data access control policies and data filter policies into your source system, complete the necessary configuration and authorization tasks.
The following table lists the types of data access policies that you can push down in each type of source system:
Source System Type
Data Access Policy Types
Amazon Redshift
Data access control policies and data filter policies
Amazon S3
Data access control policies
Databricks
Data access control policies and data filter policies
Google BigQuery
Data access control policies
Microsoft Fabric Data Lakehouse
Data access control policies and data filter policies
Microsoft Fabric Data Warehouse
Data access control policies and data filter policies
Microsoft Power BI
Data access control policies and data filter policies
Snowflake
Data access control policies and data filter policies
Tableau
Data access control policies
Once you configure your source system to support pushdown enforcement, you assign permissions to data assets.
For more information, see Assigning permissions to source systems.

Prerequisites for Amazon Redshift pushdown enforcement

You can enable Data Governance and Catalog to push down data access control policies and data filter policies into your Amazon Redshift source system.
Complete the following configuration and authorization tasks for your Amazon Redshift source system:
  1. 1Configure Amazon Redshift as a catalog source.
  2. For more information about configuring a catalog source for Amazon Redshift, see Amazon Redshift.
  3. 2Grant the following privileges to the connection user associated with your Amazon Redshift source system:
  4. grant create role to role [IDMC_USER_ROLE];
    grant { { SELECT | INSERT | UPDATE | DELETE } [,...] | ALL [ PRIVILEGES ] } on [OBJECT_NAME]
    to { [IDMC_USER_ROLE] with grant option;
    To grant privileges on an object in Amazon Redshift, you must meet one of the following criteria:
    For more information about configuring connection properties for Amazon Redshift, see Connect to Amazon Redshift.
Note:
If your organization uses an identity provider (IdP) and pushes
data access policies
to Amazon Redshift, you must add a custom property for the namespace that Amazon Redshift requires to the
Data Access Management
Agent service. This allows the Secure Agent to map the IDMC user groups in the
data access policies
into the IdP-based roles created in a namespace in Amazon Redshift.
For more information about adding properties to the Data Access Management Agent service, see Data Access Management Agent service properties.

Prerequisites for Amazon S3 pushdown enforcement

You can enable Data Governance and Catalog to push down data access control policies into your Amazon S3 source system.
Data access control policies grant access to data based on one or more AWS customer-managed policies attached to an IAM role.
Complete the following configuration and authorization tasks for your Amazon S3 source system:
  1. 1Configure Amazon S3 as a catalog source.
  2. For more information about configuring a catalog source for Amazon S3, see Amazon S3.
  3. 2Grant the following privileges to the connection user associated with your Amazon S3 source system:
For more information about configuring connection properties for Amazon S3, see Create a connection.

Prerequisites for Databricks pushdown enforcement

You can enable Data Governance and Catalog to push down data access control policies and data filter policies into your Databricks source system.
Complete the following configuration and authorization tasks for your Databricks source system:
  1. 1Ensure that the user identified in the catalog source connection that pushes the policies has Databricks workspace admin permissions on the catalog source.
  2. 2Configure Databricks as a catalog source.
  3. To enforce data filter policies, Data Governance and Catalog uses the following Databricks catalog by default:
    cdam_internal_state
  4. 3For data filter policies, create the following catalog on your Databricks source system:

  5. CREATE cdam_internal_state.default
    Note:
    You cannot apply
    data filter policies
    to views.
  6. 4For data filter policies, permissions to the connection associated with your Databricks source system:

  7. GRANT CREATE FUNCTION ON SCHEMA cdam_internal_state.default TO user_or_role;
    GRANT DROP FUNCTION ON SCHEMA cdam_internal_state.default TO user_or_role;
  8. 5For each schema on which you want to apply data filter policies, grant the following permissions:
  9. GRANT MANAGE ON CATALOG catalog_name TO user_or_role;
    GRANT MANAGE ON SCHEMA catalog_name.schema TO user_or_role;
For more information about configuring a catalog source for Databricks, see Register a catalog source.

Prerequisites for Google BigQuery pushdown enforcement

You can enable Data Governance and Catalog to push down data access control policies into your Google BigQuery source system.
Complete the following configuration and authorization tasks for your Google BigQuery source system:
  1. 1Configure Google BigQuery as a catalog source.
  2. For more information about configuring a catalog source for Google BigQuery, see Google BigQuery in the Metadata Command Center help.
  3. 2In Google BigQuery, create a custom role with the following permissions per project:
  4. 3Alternatively, grant the following roles to the Google BigQuery service account used in the connection:
For more information about configuring connection properties for Google BigQuery, see Connect to Google BigQuery.

Prerequisites for Microsoft Fabric Data Lakehouse pushdown enforcement

You can enable Data Governance and Catalog to push down data access control policies and data filter policies into your Microsoft Fabric Data Lakehouse source system.
Complete the following configuration and authorization tasks for your Microsoft Fabric Data Lakehouse source system:
  1. 1Configure Microsoft Fabric Data Lakehouse as a catalog source.
  2. For more information about configuring a catalog source for Microsoft Fabric Data Lakehouse, see Connect to Microsoft Fabric Data Lakehouse.
  3. 2For each database into which you will push data access control policies and data filter policies, grant the service principal the following permissions:
  4. Alternatively, grant the following permission to users who need to grant any permission on any database in the server:
  5. 3For data filter policies, additionally grant the following permission on the database:
  6. GRANT CREATE SCHEMA TO [IDMC_USER_ROLE]
    GRANT CREATE FUNCTION TO [IDMC_USER_ROLE]
    Note:
    The default Microsoft Fabric Data Warehouse schema name that
    Data Access Management
    uses to manage data filter policies is CDAM_INTERNAL_STATE. If this name does not comply with your organization's schema naming convention, use the plugin.fabric-warehouse.default.schema property to give the schema another name.
    Note:
    If you manually created the CDAM_INTERNAL_STATE schema, add the following permission for
    data filter policies
    :
    GRANT ALTER ON SCHEMA::CDAM_INTERNAL_STATE TO [IDMC_USER_ROLE]
  7. 4For data filter policies, additionally grant permissions to create a security policy for row-level security on the schema in the following format:
  8. GRANT ALTER ANY SECURITY POLICY TO [IDMC_USER_ROLE]

Prerequisites for Microsoft Fabric Data Warehouse pushdown enforcement

You can enable Data Governance and Catalog to push down data access control policies and data filter policies into your Microsoft Fabric Data Warehouse source system.
Complete the following configuration and authorization tasks for your Microsoft Fabric Data Warehouse source system:
  1. 1Configure Microsoft Fabric Data Warehouse as a catalog source.
  2. For more information about configuring a catalog source for Microsoft Fabric Data Warehouse, see Connect to Microsoft Fabric Data Warehouse.
  3. 2For each database into which you will push data access control policies and data filter policies, grant the service principal the following permissions:
  4. Alternatively, grant the following permission to users who need to grant any permission on any database in the server:
  5. 3For data filter policies, additionally grant the following permission on the database:
  6. GRANT CREATE SCHEMA TO [IDMC_USER_ROLE]
    GRANT CREATE FUNCTION TO [IDMC_USER_ROLE]
    Note:
    The default Microsoft Fabric Data Warehouse schema name that
    Data Access Management
    uses to manage data filter policies is CDAM_INTERNAL_STATE. If this name does not comply with your organization's schema naming convention, use the plugin.fabric-warehouse.default.schema property to give the schema another name.
    Note:
    If you manually created the CDAM_INTERNAL_STATE schema, add the following permission for
    data filter policies
    :
    GRANT ALTER ON SCHEMA::CDAM_INTERNAL_STATE TO [IDMC_USER_ROLE]
  7. 4For data filter policies, additionally grant permissions to create a security policy for row-level security on the schema in the following format:
  8. GRANT ALTER ANY SECURITY POLICY TO [IDMC_USER_ROLE]

Prerequisites for Microsoft Power BI pushdown enforcement

You can enable Data Governance and Catalog to push down data access control policies and data filter policies into your Microsoft Power BI source system.
Note:
You must use one of the following types of Microsoft workspaces:
In Metadata Command Center configure Microsoft Power BI as a catalog source.
For more information about configuring a catalog source for Microsoft Power BI, see Microsoft Power BI Connection Properties.
In Microsoft Power BI, complete the following configuration and authorization tasks:
  1. 1Disable the tenant-level setting "Block republish and disable package refresh" to prevent any access issues related to Microsoft Power BI permissioning.
  2. 2For each Microsoft Power BI workspace into which you want Data Governance and Catalog to push data access control policies and data filter policies, add the user or service principal as at least a member or admin of the workspace.
  3. 3Ensure that the XMLA endpoint property is set to read-write.
  4. 4Grant the following permissions as the Delegated type to the connection user associated with your Microsoft Power BI source system:
  5. Dataset.ReadWrite.All
    Dataset.Read.All
    Workspace.ReadWrite.All
  6. 5Grant the following permissions as the Application type to the connection user associated with your Microsoft Power BI source system:
  7. Group.Read.All
    GroupMember.Read.All
    Note:
    You must grant administrator consent in Microsoft Power BI to approve application permissions.
  8. 6For use with data filter policies, grant the following minimum permissions:

Prerequisites for Snowflake pushdown enforcement

You can enable Data Governance and Catalog to push down data access control policies and data filter policies into your Snowflake source system.
Complete the following configuration and authorization tasks for your Snowflake source system:
  1. 1Configure Snowflake as a catalog source.
  2. For more information about configuring a catalog source for Snowflake, see Snowflake.
  3. 2Determine which types of data access policies you would like to enforce in your Snowflake source system. You can currently enforce data access control policies and data filter policies. Each requires different permissions.
  4. 3For use with data access control policies, grant the following permissions to the user role associated with your Snowflake source system connection:
  5. GRANT MANAGE GRANTS ON ACCOUNT TO [IDMC_USER_ROLE];
    GRANT CREATE ROLE ON ACCOUNT TO [IDMC_USER_ROLE];
  6. 4For use with data filter policies, your Snowflake account needs to be able to enforce Snowflake's row access policies.
  7. To enforce row access policies, Data Access Management requires a Snowflake database to store the necessary objects. You can configure this database in any of the following ways:

Prerequisites for Tableau pushdown enforcement

You can enable Data Governance and Catalog to push down data access control policies into your Tableau source system.
Complete the following configuration and authorization tasks for your Tableau source system:
  1. 1Configure Tableau as a catalog source.
  2. For more information about configuring a catalog source for Tableau, see Tableau in the Metadata Command Center help.
  3. 2Configure the user account with the following permissions:
  4. Note:
    Tableau automatically grants permissions from parent objects to their child objects such as tables within a database.
    For more information about configuring connection properties for Tableau, see Create a Connection.