Skip to main content

CelerData access control

CelerData employs role-based access control (RBAC) to manage privileges within a CelerData cloud account. RBAC gives account administrators the ability to restrict privileges within the account on granular level with ease.

Within an account, a role is a collection of privileges that can be applied to members within the account as needed. An account member can be granted one or more roles, which determine their permissions on clusters, members, cloud settings, and usage and billing.

NOTE

The access control system of an account is distinct and isolated from a CelerData cluster's data access control system, which is used to manage the privileges to operate the data in CelerData clusters. See Data access control for more information.

Privileges

Privileges within an account are defined as follows:

PrivilegeTypeDescription
View clusterCluster privilegeThe privilege to view the details of a cluster
Edit clusterCluster privilegeThe privilege to:
  • Edit cluster configuration
  • Create, edit, and delete scheduling policy
  • Create, scale and delete warehouses
Release clusterCluster privilegeThe privilege to release a cluster
Create clusterAccount privilegeThe privilege to create clusters within an account
Suspend & resume clusterAccount privilegeThe privilege to suspend and resume clusters within an account
Member managementAccount privilegeThe privilege to:
  • Invite members
  • Remove members
  • Initiate password reset for members
  • Assign roles to members
  • Unassign roles from members
Role managementAccount privilegeThe privilege to:
  • Create roles
  • Delete roles
  • Remove members
  • Enable account or cluster privileges for roles
  • Disable account or cluster privileges for roles
Cloud settings managementAccount privilegeThe privilege to:
  • Create IAM credentials
  • Delete IAM credentials
  • Create network configurations
  • Delete network configurations
View and manage billingAccount privilegeThe privilege to view and manage the usage and billing information of an account
Configure alarmAccount privilegeThe privilege to create a new alarm policy, edit the alarm policy, and drop the alarm policy within an account
Organization managementOrganization privilegeThe privilege to create or remove accounts within the organization.
Payment setting managementOrganization privilegeThe privilege to edit the payment settings of the organization.

Default roles

The following two roles are created by default within each account:

RoleDescription
Organization adminThe role entitled to manage all accounts within an organization.
Account adminThe role entitled to all privileges within an account. Note that privileges of the Account Admin role cannot be modified.
PublicThe role with no privileges within an account. The Public role is entitled to all basic operations other than the privileges listed above. Note that the Public role is assigned to all account members and cannot be unassigned.