You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -101,7 +101,7 @@ Any user can create project. By default, the project creator is granted the `Pro
101
101
102
102
Bytebase does not define database specific roles. Whether a user can perform certain action to the database is based on the user's Workspace role and the role of the project owning the database.
Copy file name to clipboardExpand all lines: content/docs/security/database-permission/query.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,37 +4,37 @@ title: Data Query
4
4
5
5
Bytebase users query data from [SQL Editor](/docs/sql-editor/run-queries/). Bytebase can enforce query access control for a particular user at the database, schema or table level.
6
6
7
-
## Assign Project Querier Role
7
+
## Assign SQL Editor User Role
8
8
9
-
`Workspace Admin`, `Workspace DBA` or `Project Owner` can manually grant `Project Querier` role to users/groups.
9
+
`Workspace Admin`, `Workspace DBA` or `Project Owner` can manually grant `SQL Editor User` role to users/groups.
10
10
11
11
### Assign at Project level
12
12
13
13
**Select Project** and go to **Manage > Members**. Then **Grant Access**.
Users can also apply for `Project Querier` role by submitting an issue. Approval flow matches the `Request Querier Role` in [custom approval](/docs/administration/custom-approval/) if configured.
37
+
Users can also apply for `SQL Editor User` role by submitting an issue. Approval flow matches the `Request Querier Role` in [custom approval](/docs/administration/custom-approval/) if configured.
"expression": "(resource.database in [\"instances/test-sample-instance/databases/hr_test\"])",
125
-
"title": "project querier hr_prod",
125
+
"title": "SQL Editor User hr_prod",
126
126
"description": "",
127
127
"location": ""
128
128
}
129
129
}
130
130
```
131
131
132
-
This grants the `projectQuerier` role only for the `hr_test` database in `test-sample-instance`.
132
+
This grants the `SQL Editor User` role only for the `hr_test` database in `test-sample-instance`.
133
133
134
134
1. When processing IAM policies, handle [CEL (Common Expression Language)](https://cel.dev/) format conditions carefully. In this demo, we parse these conditions using a custom `parseCelExpression` function:
Copy file name to clipboardExpand all lines: content/docs/tutorials/how-to-manage-data-access-for-developers.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,7 @@ Log in as `Developer`, and you can see `Sample Project`. Enter **SQL Editor** on
69
69
70
70
### Admin grants data query access directly
71
71
72
-
1. Log in as `Admin`, and go to `Sample Project`. Click **Members** and then **Grant Access**. Choose `Developer` and assign the role `Project Querier`, `All` for **Databases**. Click **Confirm**.
72
+
1. Log in as `Admin`, and go to `Sample Project`. Click **Members** and then **Grant Access**. Choose `Developer` and assign the role `SQL Editor User`, `All` for **Databases**. Click **Confirm**.
73
73
74
74
1. Log in as `Developer`, and go to SQL Editor. You can see all databases under `Test` and `Prod` environment. Select `hr_prod`, input `SELECT * FROM employee;` and run, you can see the result. Change `employee` to any other tables and run, you can see data as well.
0 commit comments