Reference | Security model overview #
How do Dataiku users securely access the platform with the right permissions? Dataiku’s security model consists of the following components.
First, Dataiku relies on both user identity and user authentication:
-
user identity to uniquely identify users of the platform and
-
user authentication to prove that the user is who they claim to be.
Second, Dataiku has a groups-based permissions model to allow users to perform actions on the platform. By default, permissions are linked to two elements:
-
user profiles and
Users can belong to an arbitrary number of groups. Groups can have one or several permissions, which may be global or per-resource group permissions . Administrators can also configure security permissions for other resources such as data connections .
Note
In addition to the resources linked here, visit Security in the reference documentation for more information.