Grant access to linked data

Important 

In Collibra 2024.05, we launched a new user interface (UI) for Collibra Data Intelligence Platform! You can learn more about this latest UI in the UI overview.

Use the following options to see the documentation in the latest UI or in the previous, classic UI:

This topic describes the behavior in each applicable data source when the Grant access to the data linked to these assetsGrant Access to Data Linked to Selected Assets checkbox in a data access rule is selected. This checkbox is selected by default and is applicable to the following data sources:

  • AWS Lake Formation
  • BigQuery
  • Databricks
  • Snowflake
Tip If you try to create a rule without selecting a masking level or row filter and also clear the checkbox, an error message appears because the rule will have no effect.

Generally, a selected checkbox indicates that you are allowing the groups selected in the rule to access the tables and columns linked to the assets selected in the rule. The following table contains specific information based on the data source.

Data source Behavior if the checkbox is selected
AWS Lake Formation

The following are created in AWS Lake Formation for the groups:

  • A data filter based on the rule for the tables linked to the assets.
  • A Select-only data permission to grant access to the tables.
Note If your Edge version is 2024.10 or newer, clearing the checkbox creates only the associated data filter. You will still need to create a data permission in AWS Lake Formation to grant access to the tables.
BigQuery

If you don't select a masking level in the rule, the groups are assigned the Fine-Grained Reader role in BigQuery for access to the columns linked to the assets. Otherwise, a masking policy is applied.

Databricks

The groups are granted access to the tables linked to the assets.

To ensure access, Protect runs the following SQL queries for each group.

GRANT USE CATALOG ON CATALOG %database% TO %protect_group%;

GRANT USE SCHEMA ON SCHEMA %database%.%schema% TO %protect_group%;

GRANT SELECT ON TABLE %database%.%schema%.%table% TO %protect_group%;

Snowflake

The groups are granted access to the tables linked to the assets.

To ensure access, Protect runs the following SQL queries for each group.

GRANT USAGE ON DATABASE %database% TO ROLE %protect_group%;

GRANT USAGE ON SCHEMA %schema% TO ROLE %protect_group%;

GRANT SELECT ON TABLE %table% TO ROLE %protect_group%;