Through the Admin Settings page, administrators can manage aspects of user accounts, as well as other aspects of the instance. See Admin Settings Page.
Depending on your instance, access to stored assets can be governed by multiple sets of permissions. Access can be governed by:
When a shares a resource with another user, that second user may not have access to the underlying resource if one of the other permission sets does not provide it. In the
, the issue may be surfaced as a generic read or access error, which may be difficult for end users to debug.
Tip: Where possible, you should use a single principal user for |
: Set this value to
true
to allow the user administrator privileges.
NOTE: You should limit the number of administrator accounts, which have extensive privileges in the application. |
SSO Principal: If SSO is enabled, set this value to be the SSO principal value associated with this user.
NOTE: Required value for each user if SSO is enabled. See Configure SSO for AD-LDAP. |
Hadoop Principal: If secure impersonation is enabled, set this value to be the Hadoop principal value associated with this user.
NOTE: The user principal value should not include the realm. |
NOTE: Required value if secure impersonation is enabled. See Configure for Secure Impersonation. |
NOTE: If Kerberos is enabled, verify that all user principals that use the platform are also members of the group of the keytab user. |
true
, the account is currently disabled. Else, the account is active. Edit the user to change access.Never
indicates that the account has never been used.NOTE: |
To reset a user's account password, click Reset Password. Copy the URL and paste it into an email to send the user.
Tip: If you are using Chrome for Windows, press |
The following platform roles are supported in the .
: Provides administrator roles, which include administering users, changing configuration, and deletion of objects created by other users.
Avoid granting |
Data Admin: Enables user to use file browsers to browse external file systems.
NOTE: The Data Admin role is required to browse HDFS or other non-relational datastores. If an account lacks this role, dataset upload and download and access to JDBC data sources, including Hive, are still supported. |
Deployment: In a Development environment, this role can be added to a user's account to enable access to the Deployment Manager.
user: Please ignore this role. It does nothing at present.
wrangler: Enables access to the . All users accounts must have this role.
NOTE: All users accounts must have this role, which cannot be modified. |
When per-user authentication is enabled for AWS access, administrators can review and modify each user's settings for AWS authentication, click Configure.
NOTE: When you return from configuring S3 access, your changes there have already been saved. |
For more information, see Configure Your Access to S3.
Non-admin users can be enabled or disabled as needed.