You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _docs/v0.56/permissions/row-and-column-security.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ redirect_from:
16
16
17
17
{% include plans-blockquote.html feature="Row and column security" %}
18
18
19
-
Row and column security lets you give granular permissions to rows and columns for different groups of people. You can change what data a group [can view](./data#can-view-data-permission), as well as what data a group [can query](./data#create-queries-permissions) with the query builder.
19
+
Row and column security lets you give granular permissions for different groups of people. You can change what data a group [can view](./data#can-view-data-permission), as well as what data a group [can query](./data#create-queries-permissions) with the query builder.
20
20
21
21
You can use row and column security to set up [self-service analytics](/learn/metabase-basics/embedding/multi-tenant-self-service-analytics), so that each of your customers can only view the rows that match their customer ID. For example, if you have an Accounts table with information about your customers, you can add permissions to the table so that each customer only sees the data relevant to them.
22
22
@@ -38,7 +38,7 @@ You can define up to one row and column security policy for each table/group com
38
38
Row and column security show specific data to each person based on their [user attributes](../people-and-groups/managing#adding-a-user-attribute). You can:
-[Restrict **columns**](#custom-row-and-column-security-use-a-saved-question-to-create-a-custom-view-of-a-table) (as well as rows) for specific people.
41
+
-[Restrict **columns** and rows](#custom-row-and-column-security-use-a-saved-question-to-create-a-custom-view-of-a-table) for specific people.
42
42
43
43
| Goal | Row (filter by a column in the table) | Custom (use a saved SQL question) |
@@ -56,9 +56,9 @@ For example, you can filter the Accounts table for a group so that:
56
56
- A person with the user attribute value "Basic" will see rows where `Plan = "Basic"` (rows where the Plan column matches the value "Basic").
57
57
- A person with the user attribute value "Premium" will see the rows where `Plan = "Premium"` (rows where the Plan column matches the value "Premium").
58
58
59
-
### Custom row and column security: use a saved question to create a custom "view" of a table
59
+
### Custom row and column security: use a SQL question to create a custom "view" of a table
60
60
61
-
To **restrict rows _and_ columns**, you can use a saved question to filter the table. When someone views that table, they'll instead see the question's results, not the raw table.
61
+
To **restrict rows _and_ columns**, you can use a SQL question to filter the table. When someone views that table, they'll instead see the question's results, not the raw table.
62
62
63
63
For example, say your original Accounts table includes the columns: `ID`, `Email`, `Plan`, and `Created At`. If you want to hide the Email column, you can create a "Restricted Accounts" SQL question with the columns: `ID`, `Plan`, and `Created At`.
64
64
@@ -75,7 +75,7 @@ You can use a question to filter tables to:
75
75
76
76
Row security displays a filtered table, in place of an original table, to a specific group. How Metabase filters that table depends on the value in each person's user attribute.
77
77
78
-
For example, you can set up a row security so that:
78
+
For example, you can set up a row-level security so that:
79
79
80
80
- Someone with the user attribute with key of "plan" and a value of "Basic" will see a version of the Accounts table with a filter for `Plan = "Basic"` (that is, only the rows where the Plan column matches the value "Basic").
81
81
- Someone with a "plan" user attribute set to "Premium" will see a different version of the Accounts table with the filter `Plan = "Premium"` applied.
@@ -244,7 +244,7 @@ To prevent the Email column from being exposed via a SQL question:
244
244
245
245
### Public sharing
246
246
247
-
Row and column security permissions don't apply to public questions or public dashboards. If somone in an unsecured group person creates a public link using an original table, the original table will be displayed to anyone who has the public link URL.
247
+
Row and column security permissions don't apply to public questions or public dashboards. If somone in an unsecured group creates a public link using an original table, the original table will be displayed to anyone who has the public link URL.
248
248
249
249
To prevent this from happening, you'll have to [disable public sharing](../embedding/public-links) for your Metabase.
250
250
@@ -256,7 +256,7 @@ Row and column security is limited to questions built with the [query builder](.
256
256
257
257
### Groups with native query permissions (access to the SQL editor) can bypass row and column security
258
258
259
-
You can't set up [query builder and native](./data#create-queries-permissions) for groups with row and column security.
259
+
You can't set up [native query persmissons](./data#create-queries-permissions) for groups with row and column security.
260
260
261
261
To enforce row-level permissions with the native query editor, check out [impersonation](./impersonation).
Copy file name to clipboardExpand all lines: _site/docs/v0.56/permissions/row-and-column-security.html
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -4861,7 +4861,7 @@ <h1 id="row-and-column-security">Row and column security</h1>
4861
4861
</div>
4862
4862
</div>
4863
4863
4864
-
<p>Row and column security lets you give granular permissions to rows and columns for different groups of people. You can change what data a group <ahref="./data#can-view-data-permission">can view</a>, as well as what data a group <ahref="./data#create-queries-permissions">can query</a> with the query builder.</p>
4864
+
<p>Row and column security lets you give granular permissions for different groups of people. You can change what data a group <ahref="./data#can-view-data-permission">can view</a>, as well as what data a group <ahref="./data#create-queries-permissions">can query</a> with the query builder.</p>
4865
4865
4866
4866
<p>You can use row and column security to set up <ahref="/learn/metabase-basics/embedding/multi-tenant-self-service-analytics">self-service analytics</a>, so that each of your customers can only view the rows that match their customer ID. For example, if you have an Accounts table with information about your customers, you can add permissions to the table so that each customer only sees the data relevant to them.</p>
4867
4867
@@ -4886,7 +4886,7 @@ <h2 id="types-of-row-and-column-security">Types of row and column security</h2>
<li><ahref="#custom-row-and-column-security-use-a-saved-question-to-create-a-custom-view-of-a-table">Restrict <strong>columns</strong></a> (as well as rows) for specific people.</li>
4889
+
<li><ahref="#custom-row-and-column-security-use-a-saved-question-to-create-a-custom-view-of-a-table">Restrict <strong>columns</strong> and rows</a> for specific people.</li>
<li>A person with the user attribute value “Premium” will see the rows where <codeclass="language-plaintext highlighter-rouge">Plan = "Premium"</code> (rows where the Plan column matches the value “Premium”).</li>
4933
4933
</ul>
4934
4934
4935
-
<h3id="custom-row-and-column-security-use-a-saved-question-to-create-a-custom-view-of-a-table">Custom row and column security: use a saved question to create a custom “view” of a table</h3>
4935
+
<h3id="custom-row-and-column-security-use-a-sql-question-to-create-a-custom-view-of-a-table">Custom row and column security: use a SQL question to create a custom “view” of a table</h3>
4936
4936
4937
-
<p>To <strong>restrict rows <em>and</em> columns</strong>, you can use a saved question to filter the table. When someone views that table, they’ll instead see the question’s results, not the raw table.</p>
4937
+
<p>To <strong>restrict rows <em>and</em> columns</strong>, you can use a SQL question to filter the table. When someone views that table, they’ll instead see the question’s results, not the raw table.</p>
4938
4938
4939
4939
<p>For example, say your original Accounts table includes the columns: <codeclass="language-plaintext highlighter-rouge">ID</code>, <codeclass="language-plaintext highlighter-rouge">Email</code>, <codeclass="language-plaintext highlighter-rouge">Plan</code>, and <codeclass="language-plaintext highlighter-rouge">Created At</code>. If you want to hide the Email column, you can create a “Restricted Accounts” SQL question with the columns: <codeclass="language-plaintext highlighter-rouge">ID</code>, <codeclass="language-plaintext highlighter-rouge">Plan</code>, and <codeclass="language-plaintext highlighter-rouge">Created At</code>.</p>
4940
4940
@@ -4955,7 +4955,7 @@ <h2 id="prerequisites-for-row-security">Prerequisites for row security</h2>
4955
4955
4956
4956
<p>Row security displays a filtered table, in place of an original table, to a specific group. How Metabase filters that table depends on the value in each person’s user attribute.</p>
4957
4957
4958
-
<p>For example, you can set up a row security so that:</p>
4958
+
<p>For example, you can set up a row-level security so that:</p>
4959
4959
4960
4960
<ul>
4961
4961
<li>Someone with the user attribute with key of “plan” and a value of “Basic” will see a version of the Accounts table with a filter for <codeclass="language-plaintext highlighter-rouge">Plan = "Basic"</code> (that is, only the rows where the Plan column matches the value “Basic”).</li>
<p>Row and column security permissions don’t apply to public questions or public dashboards. If somone in an unsecured group person creates a public link using an original table, the original table will be displayed to anyone who has the public link URL.</p>
5152
+
<p>Row and column security permissions don’t apply to public questions or public dashboards. If somone in an unsecured group creates a public link using an original table, the original table will be displayed to anyone who has the public link URL.</p>
5153
5153
5154
5154
<p>To prevent this from happening, you’ll have to <ahref="../embedding/public-links">disable public sharing</a> for your Metabase.</p>
<h3id="groups-with-native-query-permissions-access-to-the-sql-editor-can-bypass-row-and-column-security">Groups with native query permissions (access to the SQL editor) can bypass row and column security</h3>
5163
5163
5164
-
<p>You can’t set up <ahref="./data#create-queries-permissions">query builder and native</a> for groups with row and column security.</p>
5164
+
<p>You can’t set up <ahref="./data#create-queries-permissions">native query persmissons</a> for groups with row and column security.</p>
5165
5165
5166
5166
<p>To enforce row-level permissions with the native query editor, check out <ahref="./impersonation">impersonation</a>.</p>
0 commit comments