Data Access Management > Data access policies > Prerequisites for pushdown enforcement
  

Prerequisites for pushdown enforcement

To enable Data Access Management to push down data access control policies and data filter policies into your cloud data platform, complete the necessary configuration and authorization tasks.
The following table lists the types of data access policies that you can push down in each type of cloud data platform:
Cloud Data Platform Type
Data Access Policy Types
Amazon Redshift
Data access control policies
Databricks
Data access control policies
Microsoft Power BI
Data access control policies
Snowflake
Data access control policies and data filter policies
Once you configure your cloud data platform to support pushdown enforcement, you assign permissions to data assets.
For more information, see Assigning permissions to source systems.

Prerequisites for Amazon Redshift pushdown enforcement

You can enable Data Access Management to push down data access control policies into your Amazon Redshift cloud data platform.
Complete the following configuration and authorization tasks for your Amazon Redshift cloud data platform:
  1. 1Configure a catalog source.
  2. For more information about configuring a catalog source for Amazon Redshift, see Amazon Redshift.
  3. 2Grant the following permissions to the connection associated with your Amazon Redshift cloud data platform:
  4. grant create role to role [IDMC_USER_ROLE];
    grant { { SELECT | INSERT | UPDATE | DELETE } [,...] | ALL [ PRIVILEGES ] } on [OBJECT_NAME]
    to { [IDMC_USER_ROLE] with grant option;
  5. 3To grant privileges on an object in Amazon Redshift, you must meet one of the following criteria:
  6. For more information about configuring connection properties to connect to Amazon Redshift, see Connect to Amazon Redshift.
Note: If your organization uses an identity provider (IdP) and pushes data access policies to Amazon Redshift, you must add a custom property for the namespace that Amazon Redshift requires to the Data Access Management Agent service. This allows the Secure Agent to map the IDMC user groups in the data access policies into the IdP-based roles created in a namespace in Amazon Redshift.
For more information about adding properties to the Data Access Management Agent service, see Data Access Management Agent service properties.

Prerequisites for Databricks pushdown enforcement

You can enable Data Access Management to push down data access control policies into your Databricks cloud data platform.
Complete the following configuration and authorization tasks for your Databricks cloud data platform:
  1. 1Ensure that the user identified in the catalog source connection that pushes the policies has Databricks workspace admin privileges on the catalog source.
  2. 2Configure a catalog source.
Note: Use a personal access token to connect to your Databricks instance through Data Access Management.
For more information about configuring a catalog source for Databricks, see Register a catalog source.

Prerequisites for Microsoft Power BI pushdown enforcement

You can enable Data Access Management to push down data access control policies into your Microsoft Power BI cloud data platform.
Complete the following configuration and authorization tasks for your Microsoft Power BI cloud data platform:
  1. 1For each Microsoft Power BI workspace into which you want Data Access Management to push data access control policies, add the service principal as a member with the Admin permission.
  2. 2Configure a catalog source.
  3. For more information about configuring a catalog source for Microsoft Power BI, see Microsoft Power BI Connection Properties.
  4. 3Grant the following permissions as the Delegated type to the connection associated with your Microsoft Power BI cloud data platform:
  5. Dataset.ReadWrite.All
    Dataset.Read.All
    Workspace.ReadWrite.All
  6. 4Grant the following permissions as the Application type to the connection associated with your Microsoft Power BI cloud data platform:
  7. Group.Read.All
    GroupMember.Read.All
    Note: You must click "Grant admin consent" in Microsoft Power BI to approve application permissions.

Prerequisites for Snowflake pushdown enforcement

You can enable Data Access Management to push down data access control policies and data filter policies into your Snowflake cloud data platform.
Complete the following configuration and authorization tasks for your Snowflake cloud data platform:
  1. 1Configure a catalog source.
  2. For more information about configuring a catalog source for Snowflake, see Snowflake.
  3. 2Determine which types of data access policies you would like to enforce in your Snowflake cloud data platform. You can currently enforce data access control policies and data filter policies. Each requires different permissions.
  4. 3For use with data access control policies, grant the following permissions to the connection associated with your Snowflake cloud data platform:
  5. GRANT MANAGE GRANTS ON ACCOUNT TO [IDMC_USER_ROLE];
    GRANT CREATE ROLE ON ACCOUNT TO [IDMC_USER_ROLE];
  6. 4For use with data filter policies, your Snowflake account needs to be able to enforce Snowflake's row access policies.
  7. To enforce row access policies, Data Access Management requires a Snowflake database to store the necessary objects. You can configure this database in any of the following ways: