Skip to main content

Identity Broker Default Roles

The AtScale Identity Broker provides a number of default realm roles that control the actions users can perform. The following table describes these roles in detail.

For information on assigning roles in the Identity Broker, see Managing Users with the Identity Broker.

RoleDescription
adminAccess the AtScale Control Center, where the Identity Broker and other system configurations are managed; set global configuration properties; administer users, roles, and groups; administer runtime permissions on catalogs/models; grant or revoke the superuser_user role for other users; bypass all access control checks on catalogs/models.
aggregates_manageActivate/deactivate aggregates via the Aggregates page.

Access to the Aggregates page requires the user to also have the aggregates_view role.
aggregates_viewAccess the Aggregates page, view aggregates.
datawarehouses_adminAccess the Data Warehouses page; view, add, and manage the data warehouses connected to AtScale.
default-roles-atscaleFor system use only.
designcenter_userAccess Design Center.
impersonation_userImpersonate other users when connecting to AtScale. This is used to configure impersonation for data warehouses, client BI tools, etc.
offline_accessFor system use only.
queries_manageCancel queries via the Queries page.

Access to the Queries page requires the user to also have the queries_view role.
queries_viewAccess the Queries page.
query_dataset_api_viewNot currently in use.
query_userAccess models from BI tools and execute queries on them. This role is automatically assigned to all users via the everyone group.
repository_project_publishPublish catalogs.

Read access to catalog repositories requires the user to also have the repository_project_read role.
repository_project_readAccess and view catalog repositories.
superuser_userSet global configuration properties; administer users, roles, and groups; administer runtime permissions on catalogs/models; grant or revoke the superuser_user role for other users; bypass all access control checks on catalogs/models.

AtScale requires that you always have at least one user with the superuser_user role.
support_logs_viewView and download support logs.
uma_authorizationFor system use only.