Tag Based Policies
TrustLogix Tag-Based Access Policies provide a flexible and scalable approach to managing access control across data assets. By leveraging metadata tagging, organizations can define and enforce security policies dynamically, ensuring that access controls remain consistent across databases, schemas, and tables.
Tag-based policies simplify this process by automatically applying access grants based on object tags, streamlining governance and reducing administrative overhead.
Creation of Tag Based Policies
Login as Super User or Policy Administrator
Click on Data Sources from main menu. User will see all the allowed data sources in the data sources list view
Select the data source for which user wants to create access policies(User can create access policies on data source for which he/she has access to)
If Access Policies is not the default tab, Click on Access Policies tab.
Click on Create Access Policy button on access policy list view
Select Object Access card from the create policy model
Enter Policy Name and Policy Description
Select Tag as Policy type from the drop down
Select the Tag names from the Tags drop down
Select the objects privileges from the drop down
Object privileges (Select,Insert, Update, Delete, Truncate) is supported, and only Table and View objects are supported via Tag policy
Choose Future grants option if the selected grants needs to be auto assigned to the principal for any new objects created under this database or schema
Future grant option is available only for Snowflake data source
Select Next button after selecting objects.
Select Principal value from the drop down
Principal value is
Role for Snowflake
Account User or Account Group for Databricks
Select Save button, to generate the grants for the selected objects and principal
Once the selected values are validated, grants will be generated
If the values provided are not valid, the policy creation process will result in an error due to validation failures. Validation can fail for the following reasons:
Duplicate Policy Creation: A policy already exists for the selected object and principal combination.
Catalog Access: The policy creation will fail if the catalog data is not accessible by control plane role.
On successful validation, policy is created and ready for deployment
Click on deploy button, on successful deployment the policy status will be moved to Deployed.
Policy deployment will be successful only all grants to be properly assigned to the TrustLogix user and no duplicate policy exists. Otherwise, the policy will fail, and any missing grants or configurations must be reported.
Benefits of Tag based policies are
Automated Policy Enforcement – Ensures security rules are applied dynamically based on object tags. Scalability – Easily manage access for large-scale data environments without manual intervention. Consistency – Enforces standardized access policies across all tagged objects, minimizing misconfigurations. Simplified Governance – Enhances visibility into access controls and reduces administrative effort.
Last updated
Was this helpful?

