What is Row Level Security? or authorization

Data System Architecture

About

When multiple users run the same query, the results that are returned to each user depend on their access rights and roles in the organization.

Example / Use case

  • A sales vice president sees results for all regions, while a sales representative for a particular region sees only data for that region.
  • Hospital: Allows doctors to view data rows only for their own patients, and that allows insurance claims administrators to view only specific rows for their specific site.
  • Bank: Only employees in the finance department are allowed to see customer invoices, payments, and accrual data; only European HR employees can see European employee data)
  • Tenant: A multi-tenant application can create logical separation of each tenant's data so that each tenant can see only their own data rows.

List





Discover More
Card Puncher Data Processing
Hive - Data Security

Data Security in Hive HDP >= 2.5 Apache Ranger in Hive with Ranger type of policy: Row Level Filter. The filter must be a valid WHERE clause for the table or view. grain: Each table...
Obiee User Group Permission Filter
OBIEE - Data security (visibility of data)

This article is data security or authorization in OBIEE. Data-level security controls the visibility of data (content rendered in subject areas, dashboards, Oracle BI Answers, and so on) based on the...
Oracle Database Vpd Row Level Security
Oracle Database - Vpd (Virtual Private Database)

The Virtual Private Database (VPD) provides row-level access control beyond the capabilities of roles and views. A customer can only see his orders in the 'orders' table (below), when he is listed...
Data System Architecture
Security

on a data level for a relational data structure. It controls the type and amount of data that you can see in a query. Object-based: table, view, read, write, ... Row-level based: When multiple...
What is Authorization (AuthZ)? Identity and Access Management

After a user has been authenticated, the next critical aspect of security is ensuring that the user can do and see what they are authorized to do and see. Authorization is the process of validating what...



Share this page:
Follow us:
Task Runner