Sift Data Access Governance (DAG) lets you define fine-grained access control policies based on attributes assigned to users and resources. Setting up DAG requires three sequential steps: creating user attributes, creating resource attributes, and creating a policy that connects them.Documentation Index
Fetch the complete documentation index at: https://docs.siftstack.com/llms.txt
Use this file to discover all available pages before exploring further.
Before you begin
- You have an Admin role.
- You are familiar with how Sift organizes data into Assets, Channels, and Runs.
How DAG setup works
DAG controls access to Sift resources by evaluating attributes assigned to users and resources against policies you define. The resources that can be protected with DAG are Assets, Channels, and Runs. Setting up DAG follows a deliberate sequence. You start by labeling users and resources with attributes, and then define a policy that connects them. No access changes occur until a policy is created and active. For example, say your organization has a sensitive satellite program called Artemis. You want to ensure that only engineers with the correct clearance can access its telemetry data in Sift. Here is how DAG handles this:- You create a user attribute called
clearance(Enum Set) and assign it the value["Artemis", "Apollo"]to the engineers cleared for those programs. This only labels the user. No access changes yet. - You create a resource attribute called
program_classification(Enum) and assign it the valueArtemisto the Artemis Assets and Channels in Sift. This only labels the resource. No access changes yet. - You create a policy that allows access only when the user’s
clearancecontains the resource’sprogram_classification. Access changes immediately once the policy is active.
clearance includes Artemis can access the Artemis resources. Engineers without the correct clearance see nothing, even if their RBAC role would otherwise allow it.
Step 1: Create and assign a user attribute
Create a user attribute
- Click your profile icon.
- Select Manage.
- In Access control, click User attributes.
- Click Create User Attribute.
- In the Type list, select a data type for the attribute. For a description of each type, see Authorization models settings.
- In the Name box, enter a name for the attribute. Use a name tied to real concepts in your organization so that someone reading a policy can immediately understand what the attribute means.
- Optional: In the Description box, enter a description to clarify how the attribute is intended to be used in policies.
- Click Save.
Assign a user attribute
Assigning this attribute does not change access. It only labels the user so that a policy can later reference this attribute.- In Access Control, click User Attributes.
- In the User attributes table, locate the attribute to use.
- Click Options, and then select Assign.
- In Assign User Attributes, in User Groups or Users, select a group or user, and click Update.
- You can select any user or group, but do not select yourself. You can change this selection later.
- Once the policy is active, this user or group’s RBAC permissions will be further controlled for this specific Asset.
- Set the attribute value for the selected user or group.
- Click Next to review your changes.
- Review the assignment summary, then click Update to confirm.
No access: At this point, no access has changed. The user still has the same RBAC role and permissions as before. Access will only change after you create a policy that references this attribute.
Step 2: Create and assign a resource attribute
Create a resource attribute
- In Access Control, click Resource Attributes.
- Click Create Resource Attribute.
- Configure the attribute settings and click Save.
Assign a resource attribute
Assigning this attribute does not change access. It only labels the resource so that a policy can later reference this attribute.- In Access Control, click Resource Attributes.
- In Resource Attributes, find the resource attribute to use.
- Click Options, then select Assign.
- Select the resource type you want to manage: Assets, Channels, or Runs.
- In the search field, enter the name of the resource to manage.
- In the search results, select your resource.
- Click Update.
- Select a value for the attribute.
- Click Next.
- Review your changes, and then click Update.
Step 3: Create a policy
- In Access Control, click Policies.
- Click Create Policy.
- Configure the policy settings and click Create.
Next steps
- Getting started with Data Access Governance (DAG): A hands-on tutorial that walks through using DAG to protect a specific Asset by creating user and resource attributes and an explicit deny policy. By the end, you will have restricted a user’s access to a sensitive Asset without changing their RBAC role.