Skip to content

Policy

Allows you to create and view all policies in your organization. Click a tab to filter to a specific policy type.

NameDescription
DataInformation specific to the policy type: Impersonation— repository that is being access by a data consumer via policy Access Management— friendly name of the policy Column Masking— column name where policy is applied Tag Masking— tag name where policy is applied (default masking is applied to the tag) Native Masking— tag name where policy is applied (native masking is applied to the tag) Row— table name where policy is applied
Users/GroupsUser information specific to the data source used for the policy: Snowflake— roles (this is the same as Roles when you create a policy) Databricks —user groups (this is the same as Roles when you create a policy) OLTP— IdP (i.e., Okta) users or groups
Policy TypeCategorization of the policy. Options are: Impersonation— controls access to repository users Access Management— controls access to database objects Column Masking— masks columns in query results by specifying individual column names Tag Masking— masks columns in query results based on the tag values assigned to columns where default masking is applied to the tag Native Masking— masks columns in query results based on the tag values assigned to columns where native masking is applied to the tag Row Access— filters rows from query results based on column values
StatusCurrent state of the policy. Options are: Success— policy has been successfully created In Progress— policy is being created, updated or deleted Error— an error occurred when performing an action. If the error persists, contact  ALTR Support .
Sort bySelect an option to sort policies and find what you need. Options are: Most Recently Updated— Quickly surface the policies you’ve worked on last. Data (A–Z or Z–A)— Browse your policies alphabetically, in either direction.
Policy StatementA user-friendly summary of the policy.
Rule StatementsClear, concise actions of the policy.

Impersonation policies enable data consumers to access repositories using single sign-on (SSO), without needing to know the underlying database credentials.

NameDescription
Data SourceThe repository name as it exists in Oracle.
Display NameA user-friendly name to identify the policy.
Rule StatementClear, concise actions of the policy. If creating a policy, build out the policy rule statement by selecting the IdP user or group that will impersonate the specified repository user. user/group— identity provider user or group Name— name of the user or group in your identity provider Repository User —name of the user in the repository that is being impersonated by the identity provider user or group
IdP User/GroupSelect either an individual user or a group as configured in your IdP (Okta).

Access Management policies control privileges for data objects, allowing you to manage access without relying on data engineers or submitting tickets.

NameDescription
Data SourceThe data source that the policy affects. Access to the schema objects within this data source are controlled.
Policy NameA user-friendly name to identify the policy.
Rule StatementClear, concise actions of the policy. If creating a policy, build out the policy rule statement by defining privileges for the data objects. object name or tag— how access is controlled by database objects. role— the Snowflake role (i.e., ALTR user group) that the policy affects read, write or read/write— level of access of the schema object that the users within the selected role can access object type— database, schema, table or view to determine what kind of object the roles have access to
Policy RefreshRefresh a policy to check for new data objects and update the policy as needed. Set a schedule to automatically check for new data objects at an interval or click Refresh to manually check.
NameDescription
Data SourceThe data source that the policy affects. Access to the schema objects within this data source are controlled.
Policy NameA user-friendly name to identify the policy.
Rule StatementClear, concise actions of the policy. If creating a policy, build out the policy rule statement by defining privileges for the data objects. user or group— the identity provider user or group that impersonates the repository user create , read , update or delete —level of access of the schema object that the user/group can access object type— object the user/groups have access to. Options are: database, schema, table/view and column. Define Object— specific database, schema, table/view or column being accessed

Column masking policies mask column values in query results by specifying individual column names.

NameDescription
Add an alertClick to configure notifications and/or block users for this policy. Learn more .
ColumnName of column that the policy affects. The policy applies masking rules to all values within this column.
Policy StateActivate to make the policy active and apply access controls to your data. Activate a policy at any time. Deactivate to make the policy inactive and stop applying controls to your data. Before deactivating, resolve all alerts. The default is Active.
Policy StatementA user-friendly summary of the policy.
Rule StatementClear, concise actions of the policy. If creating a policy, build out the policy rule statement. role— ALTR user group (i.e., a Snowflake role) that the policy affects. Learn more . masking policy— Type of masking that is applied to the column. Learn more . Options are:

Tag masking policy masks columns in query results based on the tag values assigned to columns.

NameDescription
Add an alertClick to configure notifications and/or block users for this policy. Learn more .
Policy StatusActivate to make the policy active and apply access controls to your data. Activate a policy at any time. Deactivate to make the policy inactive and stop applying controls to your data. Before deactivating, resolve all alerts. The default is Active.
Policy StatementA user-friendly summary of the policy.
Rule StatementClear, concise actions of the policy. If creating a policy, build out the policy rule statement. role— ALTR user group (i.e., a Snowflake role) that the policy affects. Learn more tag name and value or tag name Ways to apply masking on tags. Learn more. Options are: masking policy— Type of masking that is applied to the tag. If multiple policies are applied to a tag, the most permissive policy is enforced. Learn more . Options are:
Tag NameName of tag that the policy affects. The policy applies masking rules to all columns assigned to this tag.
NameDescription
MetastoreLocation where the tag is stored.
Policy StatusActivate to make the policy active and apply access controls to your data. Deactivate to make the policy inactive and stop applying controls to your data. A policy can be activated or deactivated at any time. The default is Active.
Policy StatementA user-friendly summary of the policy.
Rule StatementClear, concise actions of the policy. If creating a policy, build out the policy rule statement. role— Databricks user groups that the policy affects. tag name and value or tag name Ways to apply masking on tags. Learn more. Options are: masking policy— Type of masking that is applied to the tag. If multiple policies are applied to a tag, the most permissive policy is enforced. Learn more.
Tag NameName of tag that the policy affects. The policy applies masking rules to all columns assigned to this tag.

Native masking is a type of tag masking. To create a tag masking policy that utilizes native masking:

  1. Connect a tag to ALTR that utilizes native masking , meaning, data access is controlled by ALTR using only Snowflake masking policies.
  2. Create a tag policy for the native masking tag .

Row access policies filter rows from query results based on column values.

NameDescription
DatabaseDatabase where the row policy is applied. NOTE: If your data doesn’t display in the dropdown, ensure your service user account has privileges to access the data.
Policy NameFriendly name to identify the row policy.
Policy StatusActivate to make the policy active and apply access controls to your data. Deactivate to make the policy inactive and stop applying controls to your data. A policy can be activated or deactivated at any time. The default is Active.
Policy StatementA user-friendly summary of the policy
Reference ColumnContains values that are used to establish a relationship between the roles defined in the policy and the rows they can access. This relationship determines which rows are visible to which roles based on the values in the reference column. This value must be a string or a number.
Rule StatementClear, concise actions of the policy. If creating a policy, build out the policy rule statement. role— ALTR user group that the policy affects. Learn more . value— ALTR user group that the policy affects. Learn more .
SchemaSchema within the selected database where the row policy is applied. NOTE: If your data doesn’t display in the dropdown, ensure your service user account has privileges to access the data.
TableTable name within the schema where the row policy is applied. NOTE: If your data doesn’t display in the dropdown, ensure your service user account has privileges to access the data.