Skip to main content

Permission Debugger

The Permission Debugger allows administrators to analyze and debug user permissions across roles, teams, and policies. This feature is critical for troubleshooting access issues, verifying policy behavior, and ensuring users have the correct level of access.

How It Works

The Permission Debugger simulates permission checks for a given user on a selected resource and operation. It provides detailed insight into:
  • Which policies and rules were evaluated
  • The final allow/deny decision
  • Matching rule count
  • Evaluation time

How to Use the Permission Debugger

1. Select a User

First navigate to settings > Access Control > Permission Debugger Use the input field to search for and select the user whose permissions you want to inspect. Select a User in Permission Debugger

2. Define the Permission Check

  • Resource: Select a resource type.
    • Options include: user, team, table, database, glossary, tag, glossaryTerm, searchIndex, mlModel, container, topic, pipeline, dashboard, databaseSchema
  • Operation: Choose the operation to check against the selected resource.
    • Examples: ViewAll, EditAll, Deploy, Trigger, Kill, GenerateToken, etc.
  • Resource FQN or ID (Optional): Provide a Fully Qualified Name (FQN) or unique ID of a specific resource if you want to debug at the resource instance level.
Define the Permission Check

3. Evaluate Permission

Click the Evaluate button to perform the permission check. Evaluate Permission

Example 1: DENIED (EditAll on Table)

Permission Debugger Example: DENIED User: prajwal.pp44 Resource: table Operation: EditAll Resource FQN: sample_data.ecommerce_db.shopify.dim_address_clean Result:
Decision: DENIED User prajwal.pp44 is Denied to perform EditAll on table (sample_data.ecommerce_db.shopify.dim_address_clean)
Evaluation Summary:
MetricValue
Policies Evaluated2
Rules Evaluated1048
Matching Rules0
Allow Rules0
Deny Rules0
Time354ms

Example 2: ALLOWED (ViewAll on Table)

Permission Debugger Example: ALLOWED This example demonstrates a successful permission evaluation for a user attempting to view a specific table resource using the ViewAll operation.

πŸ“„ Scenario

  • User: prajwal.pp44
  • Resource: table
  • Operation: ViewAll
  • Resource FQN: sample_data.ecommerce_db.shopify.dim_address_clean

πŸ” Evaluation Result

Decision: ALLOWED User prajwal.pp44 is Allowed to perform ViewAll on table (sample_data.ecommerce_db.shopify.dim_address_clean)

πŸ“Š Evaluation Summary

DetailValue
Policies Evaluated2
Rules Evaluated1048
Matching Rules1046
Allow Rules0
Deny Rules0
Evaluation Time363ms

Use Cases

  • Debug permission issues for a specific user.
  • Validate that newly created policies are functioning as expected.
  • Understand why a user has or doesn’t have access to specific resources.