LAITY 发表于 2025-3-28 17:18:37
http://reply.papertrans.cn/87/8692/869192/869192_41.png经典 发表于 2025-3-28 20:25:59
http://reply.papertrans.cn/87/8692/869192/869192_42.png安抚 发表于 2025-3-29 02:02:33
http://reply.papertrans.cn/87/8692/869192/869192_43.png招致 发表于 2025-3-29 05:13:53
Secondary Roles work, specifically for users that work cross-functionally and need to assume multiple roles. One of the solutions I mentioned was role inheritance, which we will cover in the next chapter. The other solution I mentioned is secondary roles.carotid-bruit 发表于 2025-3-29 10:25:47
Schema-Level Privilegesisions are more geared towards administrative roles, specialized roles like monitoring and logging, and setting up access for downstream data. In this chapter, we’re going to cover permissioning at the schema level, as shown in Figure 11-1.大漩涡 发表于 2025-3-29 13:01:36
http://reply.papertrans.cn/87/8692/869192/869192_46.png残废的火焰 发表于 2025-3-29 19:06:18
Column-Level Permissioning and Data Maskinget of rows they’re allowed to see. We could do this via row access policies, or using secure views combined with logic and/or a mapping table. In this chapter, we’re going to cover column-level permissioning and data masking, which we can visualize in the graphic shown in Figure 14-1.Omnipotent 发表于 2025-3-29 21:33:20
Secure Data Sharingcan structure our permissions so that the different levels work together, and how to best approach different problems. In this chapter, we’re going to cover data sharing across multiple accounts, which we can see in Figure 15-1.Absenteeism 发表于 2025-3-30 01:51:38
978-1-4842-8037-9Jessica Megan Larson 2022脆弱吧 发表于 2025-3-30 05:06:18
Assuming a Primary RoleWe’ve covered the different role paradigms, whether functional or team, and we’ve addressed the different privileges Snowflake provides. We’ve discussed how we can draft roles so that they are manageable and scalable. Now we’re going to cover how we actually use these roles in practice.