Please refer to the responsibilities and capabilities assignment model for an explanation of how users relate to role assignment.
Object specific roles are used to assign responsibilities to users and groups for specific objects in the repository.
There are a number of pre-defined but fully customizable object roles, based upon various methodologies, already delivered with the product.
Role Name | Type | Definition |
---|---|---|
Object Administrator | Producer | All object administrative capabilities. Created by default on new install and on migrated install for the Administrators group to migrate. |
Content Custodian | Producer | Manages content for a subset of the repository, collects and holds information on behalf of a data producers or requesters and who is responsible for managing the use, disclosure and protection of metadata. Responsible for accuracy, integrity, and timeliness of an information asset and for establishing the controls for its generation, import, processing, access, dissemination and disposal. |
(DG) Chief Data Officer | Consumer | The chief data officer oversees a range of data-related functions that may include data management, ensuring data quality and creating data strategy. He or she may also be responsible for data analytics and business intelligence, the process of drawing valuable insights from data. Or some data management functions may fall to IT, and analytics may belong to a chief analytics officer, a title that some say is interchangeable with chief data officer. |
(DG) Council Member | Producer | A data governance council (DGC) is ultimately in charge of high-level decisions involving data. This is the body that will actually create the policies concerning your data. Your council should be cross-functional, i.e., it should include employees from different parts of your company. This ensures that everyone who uses data is represented. You would not want your council to create a policy that prevents a particular team from conducting their business efficiently. |
(DG) Manager | Producer | A user who acts as liaison between all the different roles and groups. This user can also analyze and pack up issues, so that the data governance council can make decisions. Assigning and removing roles and responsibilities are also among this user's duties. |
Steward | Producer | A Steward user: - Is responsible for the taking (stewarding) data asset metadata, terminology, etc., through the data governance process - Is a primary point of contact for information about those assets - Is involved in daily, business-related decisions about the best ways to turn policy into practice. As steward presents a trust level of responsibility toward those metadata assets assigned. This user approves changes to the metadata for the assigned assets and terminology. Most cited reference: "The concept of a data steward is intended to convey a fiduciary (or trust) level of responsibility toward the data. Data governance is the process by which responsibilities of stewardship are conceptualized and carried out." - Rosenbaum, Sara, "Data Governance and Stewardship: Designing Data Stewardship Entities and Advancing Data Access", Health Serv Res. 2010 Oct; 45(5 Pt 2): 1442-1455. |
Subject Matter Expert | Producer | A Subject Matter Expert: - Has a recognized level of expertise in a particular domain - Performs specific data-related tasks - Is consulted with to provide guidance and feedback. This user proposes and formalizes (edits) changes to the metadata for the assigned assets and terminology Most cited reference: This is an individual who has certain expertise in a particular domain. "Expertise" is usually broken down into knowledge and skills; either the SME knows about a particular topic or knows how to get something done. Since we are talking about data, the SME is typically someone who knows about a particular data topic in the enterprise or how to do a particular thing with data. It is important to recognize that a SME is an individual person, rather than a role. You do not become a SME by being assigned as one. - Dataversity |
Data Owner | Producer | A Data Owner: - is responsible for the accuracy, integrity, and timeliness of data in a particular data domain - establishing the controls for its generation, import, processing, access, dissemination and disposal. - ensure that the data under their purview is governed throughout the organization This user: - proposes, formalizes (edits), and approves changes to the metadata for the assigned assets and terminology - Has access to the actual sampled data and profiling information. Most cited reference: Data Owners - A data owner is responsible for the data in a particular data domain. They may belong to the steering committee and ensure that the data under their purview is governed throughout the organization. Data owners approve data glossaries and definitions as well as initiate data quality activities. - The Data Administration Newsletter |
Stakeholder | Producer | A Stakeholder: - Is directly affected or responsible for organizational activities which are impacted by a particular data domain or terminology - Can use, affect or be affected by an asset under discussion This user wants to be involved or notified, but can only provide comments and reviews. "The Wide Sense of Stakeholder: Any identifiable group or individual who can affect the achievement of an organization's objects or who is affected by the achievement of an organization's objects." -Freeman, R. Edward and Reed, David L., "Stockholders and Stakeholders A New Perspective on Corporate Governance" Corporate governance has been defined as a set of relationships between a company's management, its board, its shareholders and other stakeholders that provide a structure for determining organizational objectives "and monitoring performance, thereby ensuring that corporate objectives are attained." -Khatri, Vijay and Brown, Carol V., "Designing Data Governance", Communications of the ACM, January 2010 |
Data Analyst | Producer | This role is assigned to a user who is an analyst, is active in the curation and is allowed to see a data profiling and sample of this object |
Data User | Consumer | This role is assigned to a user who has full access to the data. The Data Access Request workflow assigns the requester the role for each assigned data model and is notified via email of the successful completion of the request. |
Data Custodian | Producer | A user who collects and holds information on behalf of a data provider or requester and who is responsible for managing the use, disclosure and protection of data. |
Content Technical Steward | Producer | A user who is designated as the main technical point of contact for ensuring models are harvested properly and stitched properly. Also, the point of contact for harvesting issues (logged errors, etc.) |
Regular user | Producer | General viewer who may provide curation, comments, and labels. |
Guest User | Consumer | Casual viewer of metadata |
Workflow Administrator | Producer | Administers one or more models with workflows. |
Workflow Editor | Producer | Edits one or more models with workflows. |
Workflow Approver | Producer | Approver for one or more models with workflows. |
Workflow Reviewer | Producer | Reviews changes for one or more models with workflows. |
Workflow Publisher | Producer | Publishes one or more models with workflows. |
View Restricted | Consumer | A View Restricted user is given permission to view the metadata for portions of the repository which should be restricted to viewing by most other users. Assigning this role to an object in the repository causes that object (and its contained objects) to NOT have Metadata Viewer permissions for Everyone. In addition, assigning View Resticted to the repository root or any folder in the repository allows you to then assing restricted viewing permissions to contained folders or model. In that was, you may assign “negative permissions” or viewing restrictions to a subset of the users allowed at a higher level in the hierarchy. By default, Metadata Viewer responsibilities areassigned on the repository root for Everyone. |
The list of object roles above are provided by default for new installations only. If you have upgraded from an earlier version you may not see all of these and may see others which were migrated. You may still import the list of object roles above which are in the installation path at /conf/Roles/ObjectRoles.csv.
Assignment of the Object Administrator role to a user means that user has all object capabilities on all objects in the repository.
Object Roles and Producers vs. Consumers
A concurrent user license can be split in two maximum limits:
-
Metadata producers who are read-write concurrent users such as data architects, data stewards, data modelers, glossary editors, mapping designers, developers and any advanced users with access to all functionalities.
-
Metadata consumers who are ready-only concurrent users such as data users, analysts, reviewers who can create worksheets/dashboards, add comments/social curation)
With this split license, users are considered to be metadata consumers by default. A user will automatically be designated as a producer, if they have are assigned to any roles with capability assignments that make them a Producer.
If a user is assigned any role of License type Producer, then they are counted as a Producer, otherwise if all roles they are assigned are Consumer only, then they are counted as a Consumer.
Similarly, if a role has any capability type Producer, then it is of type Producer, otherwise if all capabilities for that role are Consumer only, then it is of type Consumer.
Consumers are those with object capabilities responsibilities to only either view objects or provide feedback.
Add an Object Role
You may add any number of new object roles on an object (repository model) and to one or more users or groups.
Capabilities which are assigned through object roles are always granted to the entire repository model. Permissions based upon capabilities assigned are NOT checked (and thus cannot vary) at the individual contained (within the repository model) object level, thus assigning such a role at the contained object level will not change anything.
There is one special use case for roles with workflow capabilities, because they are checked at the contained object level and also appear to grant some permissions (e.g., if you are a workflow editor and the object is in the right workflow status, then you can edit, otherwise you cannot). But these are not authorization permissions, they are just allowed actions in the workflow process.
Steps
-
Sign in as a user with at least the Security Administrator capability global role assignment.
-
Go to MANAGE > Object Roles in the banner
-
Click Add.
-
Provide Name and Definition.
-
Use the Capabilities pick list to select capability assignments for the role.
-
Click OK.
You may create a new role based upon an existing one by using the Duplicate Role context menu item on the existing line.
Example
Sign in as Administrator and go to MANAGE > Object Roles.
Right click on the Content Custodian role and select Duplicate Role.
Enter "Finance Content Custodian" for the Name and "Users who act as content custodians for the Finance systems" in Definition.
No need to pick any additional capabilities and we are only creating this role to assign to the Finance system folder in the Repository.
Click OK.
The License is of type Producer. This is assigned automatically. If a role has any capability type Producer, then it is of type Producer, otherwise if all capabilities for that role are Consumer only, then it is of type Consumer.
Edit an Object Role
One may change the Name, Definition and Capability assignments for any global role.
The capabilities include:
Capability Name | Type | Definition |
---|---|---|
Repository Management | Producer | Allows to create, update, delete repository objects. |
Metadata Import/Export | Producer | Allows to import/export metadata |
Data Management | Producer | Allows to import data profiling and sampling information |
Security Management | Producer | Allows to set roles on repository objects |
Workflow Management | Producer | Allows to enable and configure workflow on model objects |
Certification Management | Producer | Allows to update, delete any certifications on objects |
Endorsement Management | Producer | Allows to update, delete any endorsements on objects |
Warning Management | Producer | Allows to update, delete any warnings on objects |
Comment Management | Producer | Allows to update, delete any comments on objects |
Watcher Management | Producer | Allows to add/remove any watcher assignment |
Metadata Management | Producer | Allows to edit metadata including attribute and relationships local to the model |
Business Documentation Editing | Producer | Allows to set the business name and business definition on an object |
Diagram Editing | Producer | Allows to create / edit diagrams in database models |
Data Classification Editing | Producer | Allows to approve, propose, reject a data class or sensitivity label on an object |
Label Editing | Producer | Allows to update labels on an object |
Attachment Editing | Producer | Allows to add / remove attachments to an object |
Certification Editing | Producer | Allows to create, update, delete your own certifications on objects |
CSV Exporting | Consumer | Allows to export metadata using CSV including attributes and relationships |
Endorsement Editing | Consumer | Allows to create, update, delete your own endorsements on objects |
Warning Editing | Consumer | Allows to create, update, delete your own warnings on objects |
Comment Editing | Consumer | Allows to create, update, delete your own comments on objects |
Watcher Editing | Consumer | Allows a user to add / remove themselves as a watcher on an object |
Repository Viewing | Consumer | Allows to view the repository tree and interact with versions |
Metadata Viewing | Consumer | Allows to view the metadata stored in a model |
Data Viewing | Consumer | Allows to view the imported data including data sampling and all data profiling information |
Workflow Editing | Producer | Allows to assign and adjust workflow processes |
Workflow Reviewing | Producer | Allows to review in workflow processes |
Workflow Approving | Producer | Allows to approve in workflow processes |
Workflow Publishing | Producer | Allows to publish in workflow processes |
Steps |
-
Sign in as a user with at least the Security Management capability object role assignment.
-
Go to MANAGE > Object Roles in the banner.
-
Select a row and click Edit.
-
Update Name and Definition.
-
Use the Capabilities pick list to select capability assignments for the global role.
-
Click OK.
You may simply double-click a cell in the sheet of capabilities vs. roles to set or unset a particular capability assignment (responsibility).
Again, if a role has any capability type Producer, then it is of type Producer, otherwise if all capabilities for that role are Consumer only, then it is of type Consumer.
Example
Sign in as Administrator and go to MANAGE > Object Roles.
Pick the Finance Content Custodian role (added earlier). Edit the Definition by adding "workflow editor" to the list of capabilities. Then add the Workflow Editing capability.
Click SAVE.
Delete an Object Role
You may delete any global role.
If you delete a role that is already assigned to a user or group then they will lose those capabilities.
Steps
-
Sign in as a user with at least the Security Management capability object role assignment.
-
Go to MANAGE > Object Roles in the banner.
-
Select a row and click Delete.
-
Click OK.
Import Object Roles
You may import object roles from a CSV file.
The format of this CSV file may be determined by first exporting to that format.
Steps
-
Sign in as a user with at least the Security Management capability object role assignment.
-
Go to MANAGE > Object Roles in the banner.
-
Click IMPORT.
-
Browse for a file and click OK.
The import action will produce a log and will update and merge, reporting on the number of roles affected.
Export Object Roles
You may export the list of object roles to a CSV file.
Steps
-
Sign in as a user with at least the Security Management capability object role assignment.
-
Go to MANAGE > Object Roles in the banner.
-
Click EXPORT.
-
The file is pushed to your browser.
You may download either CSV files or XLSX files. The XLSX file have special handling which safeguards against CSV Injection, also known as Formula Injection, which is a security vulnerability that occurs when untrusted input is included in a CSV file.
Check Responsibilities
You may see a list of role assignments for users and groups by going to the respective MANAGE > Users and MANAGE > Groups pages.
Insufficient Permissions
A message like the following is presented if you do not have sufficient permissions (object role assignment with the proper object capabilities):
Restricting Viewer Permissions of Objects in the Repository
For viewing rights to a model (or glossary, etc.), the simplest best practice is to control viewing via configuration access, and not through restricting viewer rights to specific objects which may be in a configuration. This suggestion follows from the fact that any user who needs to open a configuration MUST ALSO have view permissions to all of the models in the configuration (either by explicitly assigning the Metadata Viewing capability object role assignment to all the objects contained, or if no such assignment has been made, then the object is by default viewable). So, the easiest way to manage access to a model is to simply not include it in any open configuration.
However, if there is a need to define view restrictions on portions of the repository, limiting viewing (even in the repository manager) to a certain set of users, you may use either the View Restricted or the Metadata Viewing capability object role assignment.
Using View Restricted to Limit Viewing of Objects in the Repository
Generally, one assigns the View Restricted role to the group Everyone for the repository root. Then all users have Metadata Viewing access, unless restricted at a lower level in the repository folder structure.
The advantage of this approach is that access remains for common system type objects like Naming Standards without having to explicitly assign those permissions, as one is only restricting further at lower levels in the folder structure.
Example
Sign in as Administrator and go to MANAGE > Servers.
Select the repository root and the Responsibilities tab.
By default the View Restricted role to the group Everyone for the repository root.
Select the Demo Enterprise Edition folder and the Responsibilities tab.
The View Restricted role is inherited to the group Everyone for the repository root.
To override this role and restrict it to only a subset of users, you may assign the View Restricted to that subset of users. Click EDIT next to the View Restricted role and pick Business Users.
Click OK and then SAVE.
Business Users are now the only users who can see this folder and thus the contained configuration and its models.