Domain Policies

Domain Policies in TrustLogix allow domain owners to create access policies for data domain products spanning multiple data sources. This capability is crucial in environments such as medallion architecture, where data moves between layers like Silver, Gold, and Platinum across heterogeneous data sources like SQL Server, Databricks, and Snowflake.

TrustLogix enables users to define a single policy and deploy it across multiple layers while managing access based on assigned principals.

Steps to Create a Domain Policy

  • Log in to TrustLogix.

  • Click on the Main Menu.

  • Select Domain Policies.

  • Click Create Policy.

Define Domain Policy Details

  • Enter the Policy Name (e.g., Grant_Read_Access_On_Sales_Lead).

  • Provide a Policy Description (e.g., Grant access on sales lead to data engineer).

  • Click Next.

Select Domain and Data Products

  • Click on the Domain dropdown to view all configured domains across all data sources.

  • Select a Domain from the list.

  • Click on the Data Product dropdown to view all data products under the selected domain.

  • Choose one or more Data Products.

  • Click Next.

Assign Privileges

  • Choose the required Privileges from the dropdown options:

    • READ

    • WRITE

    • DELETE

  • Click the Checkbox to confirm the selected privileges.

  • Click Next.

Assign Principals

  • Click on the Principal dropdown to select an entity for access control.

  • The Principals will be considered based on the data source type:

    • Role : Assigns access based on predefined roles.

    • User: Grants access to specific users.

    • Group: Assigns access at a user group level.

  • Choose the appropriate Principal Name.

  • Click Save to validate and generate the policy.

Deploy the Policy

  • Click Deploy to enforce the policy across applicable data sources.

  • The policy will be applied to all relevant data layers, ensuring access control consistency.

By leveraging Domain, Data Product, Privileges, and Principals, organizations can efficiently manage data security at scale while maintaining compliance and governance best practices.

Last updated

Was this helpful?