Skip to content

Commit ff0c265

Browse files
author
SPRINX0\prochazka
committed
roles config
1 parent 36c974d commit ff0c265

File tree

1 file changed

+18
-1
lines changed

1 file changed

+18
-1
lines changed

content/env-variables.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,9 +162,26 @@ You could configure connection list with env variables, than "Add connection: en
162162
* LOCAL_DATA_CENTER_[connection id] - local data center (for Apache Cassandra)
163163
* CONNECTION_[connection id]_parameterName - set engine-specific parameter name
164164

165-
166165
SettingsModal.svelte , find string "name="/ If you need to define "true", use value "1". If you need "false", use empty string ("0" will not work)
167166

167+
## Roles configuration
168+
This configuration can be used only in Team Premium edition, when storage database is used for settings. Roles from environment variables are imported into storage database at docker container startup.
169+
You could define roles with specific permissions and assign connections to the role. Assigning roles to users is done in administration UI.
170+
* `ROLE_[role_name]_PERMISSIONS` - comma separated list of permissions for given role. See permission list below
171+
* `ROLE_[role_name]_CONNECTIONS` - comma separated list of connection IDs assigned to given role
172+
* `ROLE_[role_name]_DATABASES_[db_perm_id]_CONNECTION` - connection ID for database permission with given ID
173+
* `ROLE_[role_name]_DATABASES_[db_perm_id]_DATABASES` - pipe ("|") separated list of database names for database permission with given ID
174+
* `ROLE_[role_name]_DATABASES_[db_perm_id]_DATABASES_REGEX` - regular expression for database names for database permission with given ID
175+
* `ROLE_[role_name]_DATABASES_[db_perm_id]_PERMISSION` - one of: deny | run_script | write_data | read_content | view
176+
* `ROLE_[role_name]_TABLES_[db_perm_id]_CONNECTION` - connection ID for table permission with given ID
177+
* `ROLE_[role_name]_TABLES_[db_perm_id]_DATABASES` - pipe ("|") separated list of database names for database permission with given ID
178+
* `ROLE_[role_name]_TABLES_[db_perm_id]_DATABASES_REGEX` - regular expression for database names for database permission with given ID
179+
* `ROLE_[role_name]_TABLES_[db_perm_id]_SCHEMAS` - pipe ("|") separated list of schema names for table permission with given ID
180+
* `ROLE_[role_name]_TABLES_[db_perm_id]_SCHEMAS_REGEX` - regular expression for schema names for table permission with given ID
181+
* `ROLE_[role_name]_TABLES_[db_perm_id]_TABLES` - pipe ("|") separated list of table names for database permission with given ID
182+
* `ROLE_[role_name]_TABLES_[db_perm_id]_TABLES_REGEX` - regular expression for table names for database permission with given ID
183+
* `ROLE_[role_name]_TABLES_[db_perm_id]_PERMISSION` - one of: deny | run_script | create_update_delete | update_only | read
184+
* `ROLE_[role_name]_TABLES_[db_perm_id]_SCOPE` - one of: collections | sql_objects | triggers | functions | procedures | tables_views_collections | views | tables | all_objects
168185
## Permissions
169186
By default, all permissions are available. If you use \~ prefix, permission is revoked.
170187

0 commit comments

Comments
 (0)