Data source-specific permissions
Before you can start ingesting metadata, ensure that you meet the required permissions for your specific data source.
|
Select a data source, to show Currently, information is shown for: |
Amazon Redshift
Azure Data Factory
Azure SQL Data Warehouse
Azure SQL Server
Azure Synapse Analytics
DB2
dbt Cloud (Beta) dbt Core (Beta)
Google BigQuery
Greenplum
HiveQL
IBM InfoSphere DataStage
Informatica Intelligent Cloud Services
Informatica PowerCenter
Looker
Matillion
MicroStrategy
Oracle
PostgreSQL
Power BI
MySQL
Netezza
SAP Hana
Snowflake
Spark SQL
Downloaded SQL files
SQL Server
SQL Server Integration Services
SSRS-PBRS
Sybase
Tableau
Teradata
Custom technical lineage
|
-
Ensure that you meet the Azure Data Factory-specific permissions described in Set up Azure Data Factory.
-
You need read access on information_schema. Only views that you own are processed.
-
You need read access on the SYS schema.
-
You need read access on information_schema:
- bigquery.datasets.get
- bigquery.tables.get
- bigquery.tables.list
- bigquery.jobs.create
- bigquery.routines.get
- bigquery.routines.list
-
SELECT, at table level. Grant this to every table for which you want to create a technical lineage.
-
Ensure that your service account token has the Read-Only permission.
-
Ensure that you have the permission to copy the target/ directory, which is generated by running the
dbt compilecommand, to a local folder. -
You need Monitoring role permissions.
-
A role with the LOGIN option.
-
SELECT WITH GRANT OPTION, at Table level.
-
CONNECT ON DATABASE
-
You need read access on the SYS schema and the View Definition Permission in your SQL Server.
-
You need read access on definition_schema.
- GRANT SELECT, at table level. Grant this to every table for which you want to create a technical lineage.
-
The role of the user that you specify in the
usernameproperty in lineage harvester configuration file must be the owner of the views in PostgreSQL. -
You need read access on the DBC.
-
You need read access to the following dictionary views:
- all_tab_cols
- all_col_comments
- all_objects
- ALL_DB_LINKS
- all_mviews
- all_source
- all_synonyms
- all_views
- Your user role must have privileges to export assets.
- You must have read permission on all assets that you want to export.
- You have at least a Matillion Enterprise license.
- You have generated the Matillion certificate. For more information, go to Recreating self-signed SSL certificates on a Matillion ETL instance.
- You have added the Matillion certificate to a Java truststore. For more information about adding a certificate to a Java truststore, go to Add a Certificate to a Truststore Using Keytool.
-
Ensure that the Snowflake user has the appropriate allowed host list. For details, go to Allowing Hostnames in Snowflake documentation.
-
You need a role that can access the Snowflake shared read-only database. To access the shared database, the account administrator must grant the IMPORTED PRIVILEGES privilege on the shared database to the user that runs the lineage harvester.
-
If the default role in Snowflake does not have the IMPORTED PRIVILEGES privilege, you can use the
customConnectionPropertiesproperty in the lineage harvester configuration file to assign the appropriate role to the user. For example:"customConnectionProperties": "role=METADATA" - The source code files must be in the same directory as your JSON files. For complete information, go to Working with custom technical lineage.
- To stitch the data objects of your data sources with Data Catalog assets, you need to register your data sources in Data Catalog. When you then prepare the Data Catalog physical data layer, ensure that you use a structure that matches the structure of ingested assets in Data Catalog.
- Determine whether you want to use the single-file or batch definition option.
- If you choose the single-file definition option, determine whether you want to create a simple or advanced custom technical lineage.
-
You need the following roles, with user access to the server from which you want to ingest:
- A system-level role that is at least a System user role.
- An item-level role that is at least a Content Manager role.
We recommend that you use SQL Server 2019 Reporting Services or newer. We can't guarantee that older versions will work.
-
You need Admin API permissions.
The first call we make to MicroStrategy is to authenticate. We connect to <MSTR URL>:<Port>/MicroStrategyLibrary/api-docs/ and use POST api/auth/login. You have to ensure that this API call can be made successfully. - You need permissions to access the library server.
- The lineage harvester uses port 443. If the port is not open, you also need permissions to access the repository.
- If you have a MicroStrategy on-premises environment, you need the permissions for all of the database objects that the lineage harvester accesses.
- You have to configure the MicroStrategy Modeling Service. For complete information, see the MicroStrategy documentation.
- Necessary permissions to all database objects that the lineage harvester accesses.Show me the data source-specific permissions
Data source
Required permissions
Amazon Redshift
You need read access on information_schema. Only views that you own are processed.Azure Data Factory
Ensure that you meet the Azure Data Factory-specific permissions described in Set up Azure Data Factory.Azure SQL server
You need read access on the SYS schema.Azure Synapse Analytics
SELECT, at table level. Grant this to every table for which you want to create a technical lineage.Google BigQuery
You need read access on information_schema:- bigquery.datasets.get
- bigquery.tables.get
- bigquery.tables.list
- bigquery.jobs.create
- bigquery.routines.get
- bigquery.routines.list
Greenplum
A role with the LOGIN option.HiveQL
SELECT WITH GRANT OPTION, at Table level.IBM DB2
CONNECT ON DATABASEInformatica Intelligent Cloud Services
- Your user role must have privileges to export assets.
- You must have read permission on all assets that you want to export.
Matillion
- You have at least a Matillion Enterprise license.
- You have generated the Matillion certificate. For more information, go to Recreating self-signed SSL certificates on a Matillion ETL instance.
- You have added the Matillion certificate to a Java truststore. For more information about adding a certificate to a Java truststore, go to Add a Certificate to a Truststore Using Keytool.
Microsoft SQL Server
You need read access on the SYS schema and the View Definition Permission in your SQL Server.MySQL
SELECT, at table level. Grant this to every table for which you want to create a technical lineage.Netezza
You need read access on definition_schema.Oracle You need read access to the following dictionary views:- all_tab_cols
- all_col_comments
- all_objects
- ALL_DB_LINKS
- all_mviews
- all_source
- all_synonyms
- all_views
PostgreSQL
- GRANT SELECT, at table level. Grant this to every table for which you want to create a technical lineage.
-
The role of the user that you specify in the
usernameproperty in lineage harvester configuration file must be the owner of the views in PostgreSQL.
Snowflake The following permissions are required, regardless of the ingestion mode:SQLorSQL-API.You need a role that can access the Snowflake shared read-only database. To access the shared database, the account administrator must grant the IMPORTED PRIVILEGES privilege on the shared database to the user that runs the lineage harvester.If the default role in Snowflake does not have the IMPORTED PRIVILEGES privilege, you can use thecustomConnectionPropertiesproperty in the lineage harvester configuration file to assign the appropriate role to the user. For example:"customConnectionProperties": "role=METADATA"Teradata
You need read access on the DBC.
SQL or SQL-API.The following permissions apply only to MicroStrategy on-premises customers.
There are no specific permission requirements for this data source type.
There are no specific permissions requirements for downloaded SQL files.