Authorization Overview
Authorization in Promethium
Authorization specifies what accesses an authenticated user has within a system. Once the identity of a user or service has been established, Promethium determines what accesses the authenticated request has.
This is done by checking what operation a given user/service wants to perform within Promethium & whether it is allowed to do so.
There are two core pillars of authorization:
- UI Authorization – Controls which users can access what capabilities within Promethium UIs
- Data Authorization – Controls which data users can see and query what data across connected platforms
Understanding both is essential for properly securing your environment and scaling access across teams.
1. UI Authorization
UI authorization in Promethium is based on role-based access control (RBAC). Roles determine which features and actions are available to a user in the UI.
For example:
| Capability | Who Can Access (Example Roles) |
|---|---|
| Manage connected data sources | admin only |
| Modify a column description | data_steward, lead_analyst |
Administrators can define and assign roles during onboarding or within the admin console.
2. Data Authorization
While UI roles control which users can do, data authorization controls what data they can see and query.
This is enforced through:
- Data access policies on individual objects or groups of objects (Domains)
- Row- and column-level access polices for fine grained access
This ensures that if a user accesses data via a Promethium UI or a 3rd party product, they’ll only receive results from datasets they’re allowed to see.
Why Authorization Matters
Authorization protects:
- Sensitive information (e.g., HR, finance, customer PII)
- Compliance requirements (e.g., GDPR, HIPAA, SOC 2)
- Team boundaries (e.g., marketing can't query engineering data)
It also improves user experience by showing people only what’s relevant to them — reducing clutter and minimizing errors.
Authorization Components
1. Users
Users are individuals or systems who access the Promethium platform.
2. Permission Sets
Permission Sets are a logical grouping of privileges. They control access to:
- Application screens and features
- Functional capabilities (e.g., create tables, view dashboards)
- System operations (e.g., manage data sources, configure connections)
3. Roles
Roles are collections of Permission Sets assigned to users.
4. Domains
Domains are logical groupings of data objects (tables, views, datamaps).