View permissions

Important 

In Collibra 2024.02, we've launched a new user interface (UI) in beta for Collibra Data Intelligence Platform! You can learn more about this latest UI in the UI overview.

Use the following options to see the documentation in the latest UI or in the previous, classic UI:

A view permission is the right to see a resource (such as an asset) and its children. This means that it is view permissions that determine which users can see and work with which resources.

You assign a view permission to users or user groups on either a domain or community level. Consequently, only these assigned users can see the resources and their children, including the assets. This also includes relations to assets, so if you don't have view permissions for an asset, you also don't see the relations to that asset, for example in views or on the asset page of the related assets.

An example of ow this works is if User A has view permissions for Community 4 but not Community 6, then User A will only be able to see and work with any resources (including assets) in Community 4. Anything in Community 6 will be inaccessible to User A, unless they are subsequently assigned view permissions.

Understanding view permissions

By default, all users can see all resources. You can tell that there are no view permissions if Unrestricted view permissions is in the View permissions section of the resource's Responsibilities page.

If you add users or user groups to the view permissions of a resource, only those users or groups can view the resource and its children.

All child resources inherit the view permissions from parent resources. Once you have added users or user groups to the view permissions of a resource, you cannot create view permissions for any of its child or parent resources.

You can recognize inherited view permissions by their gray background.

Note 
  • A user with the System Administration global permission, for example via the Sysadmin global role can see all views in Collibra, even if they are not shared.
  • A user with the Manage all views permission can see only views that are shared.

Impact of view permissions on responsibilities

View permissions affect responsibilities. If a user has a responsibility for a certain resource, but does not have view permission, that user cannot act upon that responsibility. The responsibility becomes inactive, due to the lacking view permission.

To activate the responsibility, you have to create the view permission for this resource or a parent resource.

Example 

In the example below, Luke O'Reilly is the Owner of the SCPM Glossary domain, but he does not have the view permission to see the domain. As a consequence, he cannot see the assets or act on his responsibility. On the Responsibilities page, his responsibility shows an error message to clearly show that there is a problem. You can solve the problem in one of the following ways:

  • Create a view permission for Luke.
  • Add Luke to the user group that has a view permission.
  • Delete all view permissions, so that everyone can see the assets.
  • Delete Luke's responsibility as Owner and pick another person for that role.
Example 

In the example below, Lois Ortiz is the Owner of the ABC users test domain, but he does not have the view permission to see the domain. As a consequence, she cannot see the assets or act on his responsibility. On the Responsibilities page, her responsibility shows an error message to clearly show that there is a problem. You can solve the problem in one of the following ways:

  • Create a view permission for Lois.
  • Add Lois to the user group that has a view permission.
  • Delete all view permissions, so that everyone can see the assets.
  • Delete Lois's responsibility as Owner and pick another person for that role.