Page tree

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 19 Next »

Trifacta Dataprep



Contents:

   

Contents:


In the Trifacta platformIdentity and Access Management (IAM) allows you to control user and group access to your project's resources. This section describes the IAM permissions relevant to Dataprep by Trifacta and the IAM roles that grant those permissions. To access the IAM console, see https://cloud.google.com/iam.

  • A role is a set of one or more permissions. A role is assigned to users and groups.
  • A permission grants access to a resource. Different permissions can grant different access levels to the same resource.

Tools for manage IAM policies:

  • Google Cloud Console
  • API
  • gcloud CLI

For more information, see https://cloud.google.com/iam/docs/granting-changing-revoking-access.

Required Roles and Their Permissions

To use Dataprep by Trifacta, the following roles are required. Below, you can review each required role, its purpose, and the permissions that are enabled by it.

RoleUsePermissions and roles
roles/dataprep.user

Enables a user to run Dataprep by Trifacta in a project See below.

Permissions:

  • dataprep.projects.use
  • resourcemanager.projects.get
  • serviceusage.quotas.get
  • serviceusage.services.get
  • serviceusage.services.list
roles/dataprep.serviceAgent

Enables the platform to access and modify datasets and storage and to run and manage Dataflow jobs on behalf of the user within the project

NOTE: When the product is enabled within a project, this role is granted by the project owner as part of the enablement process. For more information, see Enable or Disable Dataprep.

Permissions:

  • storage.buckets.get
  • storage.buckets.list

Roles:

  • roles/dataflow.developer
  • roles/bigquery.user
  • roles/bigquery.dataEditor
  • roles/storage.objectAdmin
  • roles/iam.serviceAccountUser

roles/dataprep.user IAM Role

All users of any version of Dataprep by Trifacta must be assigned the roles/dataprep.user IAM Role.

This role and its related permissions enable access to all data in a project. Other permissions do not apply.

Trifacta Application Permissions

The following base set of IAM permissions and some additional permissions are required for accessing the product. Below, you can review the required permissions for this product edition.

NOTE: These permissions provide basic access to the Trifacta application. Additional features within the product or available through external integrations are considered optional.

General

PermissionProduct Use
dataprep.projects.use

Allow a user to use Dataprep by Trifacta

resourcemanager.projects.get

Get Dataprep by Trifacta project details

Dataflow

Run Trifacta jobs on Dataflow:

PermissionProduct Use
compute.machineTypes.get

List available machine types for Dataflow jobs

dataflow.jobs.create

Create a Dataflow job

dataflow.jobs.get

List Dataflow jobs

dataflow.messages.list

Get Dataflow job details

dataflow.metrics.get

Get Dataflow job details

Connection Permissions

These permissions are required for connections that are common in Dataprep by Trifacta.

Cloud Storage

Read and write to Cloud Storage, the base storage for Dataprep by Trifacta:

PermissionProduct UseRequirement
storage.buckets.list

List Cloud Storage buckets in project

Required at project level
storage.buckets.getGet bucket metadataRequired for staging bucket only
storage.objects.createCreate filesRequired for staging bucket only
storage.objects.deleteDelete filesRequired for staging bucket only
storage.objects.getRead filesRequired for staging bucket only
storage.objects.listList filesRequired for staging bucket only

BigQuery

Read and write to BigQuery, including views and custom SQL:

PermissionProduct UseRequirement
bigquery.jobs.create

For Custom SQL query support and launching Dataflow jobs with BigQuery data sources.

Required at project level to use BigQuery
bigquery.datasets.getList and get metadata about datasets in projectCan be applied at project level or at individual dataset level
bigquery.tables.createExecute custom queriesCan be applied at project level or at individual dataset level
bigquery.tables.getCreate tables in datasetCan be applied at project level or at individual dataset level
bigquery.tables.getGet table metadataCan be applied at project level or at individual dataset level
bigquery.tables.getDataget table contentsCan be applied at project level or at individual dataset level
bigquery.tables.listList tables in datasetCan be applied at project level or at individual dataset level

Feature Permissions

Additional permissions may be required to use specific features. Individual users may be required to permit Dataprep by Trifacta access when the feature is first used. 

Dataflow job cancellation

PermissionProduct Use
dataflow.jobs.cancelEnables users to cancel their jobs in progress. It is not required for the product to work but may be helpful to add via IAM roles.

BigQuery publishing options

The following permissions are required to publish to BigQuery:

PermissionProduct Use
bigquery.datasets.createCreate datasets in BigQuery
bigquery.datasets.updateUpdate datasets in BigQuery

The following permission is not required to publish to BigQuery.

PermissionProduct Use
bigquery.tables.delete

If this permission is not granted to a user, that user requires one of the following permissions to drop or truncate table data in BigQuery: 

  • The user is granted editor or owner role on the project.
  • The user is granted bigquery.tables.delete for the project.

NOTE: If a user does not have this permission when publishing to a table, the user receives a warning that the target dataset is read-only.


Google Sheets access

Feature Availability: This feature is available in the following editions:

  • Dataprep Standard by Trifacta®
  • Dataprep Premium by Trifacta

  • drive.readonly

For more information, see Import Google Sheets Data.

Additional Permissions for Cloud IAM

Feature Availability: This feature is available in
Dataprep Premium by Trifacta only.

NOTE: Any change in a user's permissions in Trifacta platform must be reflected in the service account assigned to the user.

Run Dataflow jobs

Every Dataprep by Trifacta job requires the use of a service account through which the job is submitted to Dataflow for execution. Each project user must have access to a service account. For more information, see Google Service Account Management.

Data access

In addition to the IAM roles above, users must also be granted the following to enable data access based on their Cloud IAM:

These permissions ensure that users can access the appropriate data within Dataprep by Trifacta®.

  • No labels

This page has no comments.