Skip to main content
Version: v3.0 print this page

Role

Role-Based Access Control (RBAC) in Amorphic is a feature that helps system administrators manage user access to sensitive information and reduce the risk of data breaches. This feature allows administrators to control which users have access to which services within the application, making it more efficient to authorize users and align with user management compliance. Amorphic RBAC is designed to be adaptable and support any new services that are added to the application, making it more versatile and useful.

Amorphic RBAC provides the following capabilities:

  • User can have multiple roles attached and has the ability to switch between them to perform various actions based on their responsibilities.
  • Customize user role permissions to a granular level. User can select from three levels of permissions: full access, manage and view.
  • Flexibility to choose the type of Amorphic view upon login.

Roles

What is a Role?

In Amorphic, a role determines the level of access a user has in the Amorphic application.

RBAC improves data security by limiting users' access to sensitive information and helps with compliance. Additionally, it allows users to switch between different roles to perform different tasks.

Role has the following properties:

  • A Role can have multiple users attached to it.
  • A Role can have many permissions.
  • A Role can have multiple role managers who can perform update and delete operations on the role

Types of Roles in Amorphic

In Amorphic, we have two types of Roles:

  • System Roles: Pre-defined roles provided by the application by default.
  • Custom Roles: Created by users to meet specific organizational needs.

System Roles

Amorphic offers seven system roles with predefined permission sets to accommodate various user types across organizations:

RolePrimary FocusKey Permissions
System AdministratorComplete system controlFull access to all features and services
Data EngineerData pipeline managementFull control over datasets, jobs, pipelines, and ML models
IT AdminSystem configuration and user managementManages users, system settings, roles, and infrastructure
Business UserData consumption and analysisFull access to datasets, tenants, and insights
Data ScientistAdvanced analytics and model developmentWorks with datasets, pipelines, and ML models
Business AnalystReporting and basic analyticsFocus on datasets and insights with view access to advanced features
Default UsersBasic application accessLimited view access with ability to manage templates
Role Precedence

Roles in Amorphic have a precedence that affects user experience:

  • Administrator and IT Admin roles have the highest precedence by default.
  • For all other roles, precedence is calculated based on the number of full access, manage, and view permissions.
  • When a user is assigned multiple roles, the highest precedence role becomes their default role.

Detailed System Role Permissions

System Administrator Role

Complete administrative control with unrestricted access to all services and features in the Amorphic platform.

System Data Engineer Role

Has full control over most resources, including datasets, jobs, data pipelines, and ML models. Can manage lifecycle configurations and templates but has only view access to catalog and roles.

System IT Admin Role

Manages users, system settings, roles, and tags with full access. Has control over jobs, data warehouses, and templates but does not handle datasets or ML models.

System Business User Role

Has full access to datasets, tenants, and insights, with management rights for data labs and templates. Limited to viewing data sources, code repositories, and shared libraries.

System Data Scientist Role

Works extensively with datasets, data pipelines, and ML models. Can manage jobs, schedules, and data labs while having limited access to catalog and parameters.

System Business Analyst Role

Focuses on datasets and insights with full access while having view access to ML models, parameters, and the catalog. Can manage templates.

System Default Users Role

Provides basic view access to catalog, datasets, and domains, with the ability to manage templates.

First User Privilege

For a fresh deployment of Amorphic, the first user to sign up will automatically become the Role Manager for all seven system roles.

Role Manager Authority

When a user first signs in, they receive the Default Role. The Role Manager can update any user's role based on their responsibilities, and the user's default role will be determined based on role precedence.

Custom Roles

User can create a custom role for a user by selecting permissions from a list of specific access permissions for each service. To create a role see, how to create a Custom Roles

For Example, A user can create custom Data scientist role and provide access to only ML notebooks.

IMPORTANT

Users are not allowed to create custom roles that start with the word "System".

Role Metadata Information

Amorphic RBAC Role contains the following information:

TypeDescription
Role NameThe unique name identifying the role's functionality.
Role DescriptionA brief explanation of the role's purpose.
PermissionsSpecific actions defined for a particular service. Permissions determine the level of access within Amorphic. Permissions can be assigned to multiple roles and vice versa.
Role ManagersThe list of users who can update or delete the role
UsersAttachedThe list of users to whom the role is attached.
CreatedByThe user who created the role.
LastModifiedByThe user who last updated the role.
LastModifiedTimeThe timestamp of the last time the role was updated.

Role Operations

Along with Amorphic RBAC, user can perform basic CRUD operations (shown in the below table) on a role if user has sufficient permission.

Role operations

FunctionalityDescription
Create RoleCreate a custom role by choosing from a list of permissions and attach to a User.
View RoleView existing Role Metadata Information
Update RoleUpdate an existing role.
Delete RoleDelete an existing role.
Switch RoleThis functionality helps user to switch between multiple roles attached.
Update User Default-RoleHelps user to customize the landing page view. Example: if User frequently uses Machine learning services, one can pick say a "Data scientist Role" as default login view for quicker access.
Role Manager Permissions
  • Role's managers can update the role or delete it. The user who creates a role automatically becomes a role manager. Users can list or view a role only if they are a role manager or if they are attached to the role. Even if a user's role has the roles.update and roles.delete permissions, they will not be able to update/delete a particular role unless they are a role manager for that role.
  • If there is an update to v3.0 from the previous version then managers of system administrator role will become the managers of new system default roles that is being provided.

Create Role

Create roles

To create a new role in Amorphic, follow these steps:

  1. Go to the Management menu and select Roles.
  2. Click on the New Role button.
  3. Fill in the information required, such as role permissions and user names who will be attached to the role.
  4. Drag and Rearrange the order of your resources to be accessible in the sidenav.(User Persona)
  5. Click on Create to create the new role.

User Persona

User Persona

This section lets a user customize their sidenav to display only the resources that will be used by the user using the corresponding role that is being created/updated.

  • User can drag and drop and rearrange the resources according to the user's preferences.
  • User can toggle on/off submenus or individual resources to be shown in the sidenav.
  • Resources will be displayed only if the user have their respective permissions.
  • User can reset the order of the resources by using the Reset to default menu button.
Note

There are no permissions specifically for Bulk Management. Currently we only manage datasets so the bulk management page is only available for users with the datasets.update permission

Switch Role

Switch Role functionality is enabled for users with more than one Role attached to them.

How to switch roles in Amorphic:

  1. Click on the User Profile icon
  2. Select Switch Role from the dropdown menu.
  3. Pick a role from the list to switch to.

RBAC Switch role

How to update user default-role?

Schedule details

The Update Default Role feature allows users who have more than one role to choose which role they want as their main role.

  1. Click on the User Profile icon located on the top right corner of the page.
  2. Select the Profile & Settings option from the drop-down menu.
  3. User will be taken to the User Profile page, where user will find the Default Role field.
  4. Click on the Change button beside the Default Role field.
  5. A drop-down list of roles that the user is attached to will appear.
  6. Select one of the roles from the list to switch to it as the default role.
RBAC v3 Role Permissions Update

To simplify the process of creating, updating, and managing roles, the permissions structure has been streamlined. Instead of using multiple fine-grained permissions, users now select from three predefined permission levels for each service: View: Grants basic access to view and list resources. Manage: Allows for operational tasks like running jobs and generating reports. Full Access: Provides complete control, including the ability to create, update, and delete resources.

Migration to the New Permissions Model

All existing roles will be automatically transitioned to the new permissions model, ensuring uninterrupted user activity. Please note that this migration is irreversible, and the previous detailed permissions will no longer be supported.

As part of the RBAC v3 update, several services have been consolidated into unified permissions to streamline complexity and improve the user experience. The table below presents a comparison of the old and new permissions:

Old Service (Replaced)New Service (Replacement)
datasets, views, data-quality-checksdatasets
notebooks, studiosdatalabs
notebooks-lifecycleconfigurationsdatalabs-lifecycleconfigurations
workflowsdata-pipelines
connections, streams, appflowsdatasources
costmgmt-tagscost-mgmt

Retired Permissions

The following permissions have been retired in this update:

  • deepsearch-indices, dashboards
Note
  • There are no separate 'manage' permissions for roles. If a user has 'roles.view' access and is designated as a role manager for a specific role, they will have the ability to manage all aspects of that role.
  • The 'users.view' permission has been removed, as listing basic user details is accessible to all users. To manage all users in the system and view their associated resources, a user must have the 'users.manage' permission.
  • Following the migration, roles may potentially have no permissions if all previous permissions have been deprecated or replaced. Users are required to update the permissions for these roles in accordance with the new V3 model.

AWS Role

AWS Roles is a feature in Amazon Web Services (AWS) that allows an administrator to control access to specific resources and actions within AWS for different users or groups. The Amorphic team can set up custom roles for customers based on their needs.

AWS-Roles in Amorphic used to switch to the AWS console from Amorphic. This feature helps the users to view their resources in AWS.

In amorphic we have some pre-defined system generated Aws-Roles. User can have multiple AWS-Roles attached and has the ability to switch to AWS console using these roles. In AWS console, these Roles only have View Permissions.

Types of System AWS-Roles

These are Roles created by Amorphic in AWS.

In Amorphic we have three types of system AWS-Roles:

  • DMS View Role : System generated AWS-Role with view only permissions for DMS service.
  • Glue View Role : System generated AWS-Role with view only permissions for Glue service.
  • All System View Role : System generated AWS-Role with view only permissions for All AWS services which are part of Amorphic.

AWS-Roles has the following properties:

  • An AWS-Role can have multiple users attached to it.
  • A System generated AWS-Role only have view permissions in AWS console and these can't be deleted.
  • With v2.0 users can have custom AWS roles which helps them to switch to AWS console with set of permissions defined by them.

DMS View Role

DMS view role only has view permissions of DMS service in AWS. Once user switches to AWS console using this Role, user will see resources in DMS and its logs from a particular log group of cloudwatch.

Log groups that are part of this AWS-Role:

  • log-group:/...replicationTaskCreation
  • log-group:/...connections

Glue View Role

Glue view role only has view permissions of glue service in AWS. Once user switches to AWS console using this Role, user will see all resources associated with the Glue service and its logs from a particular log group of cloudwatch.

Log groups that are part of this AWS-Role:

  • log-group:/aws-glue/jobs/error
  • log-group:/aws-glue/jobs/logs-v2
  • log-group:/aws-glue/jobs/output

All System View Role

This AWS-Role only have view permissions of AWS services that are supported by Amorphic. Once the user switch to AWS console using this Role, user will be able to see resources of all AWS services which are part of Amorphic.

For now, list of AWS Services supported by All System View role:

  • Amazon Athena
  • Amazon Comprehend
  • Amazon Comprehend Medical
  • AWS Database Migration Service(DMS)
  • Amazon DynamoDB
  • Amazon Forecast
  • AWS Glue
  • Amazon Kendra
  • Amazon Kinesis
  • Amazon Kinesis Data Analytics
  • Amazon Kinesis Data Firehose
  • AWS Lake Formation
  • Amazon RDS
  • Amazon Redshift
  • Amazon Rekognition
  • Amazon SageMaker
  • AWS Step Function
  • Amazon Textract
  • Amazon Transcribe
  • Amazon Translate

AWS-Role Metadata Information

TypeDescription
Role NameRole Name, which uniquely identifies the functionality of the role.
Role DescriptionA brief explanation of the aws-role typically the functionality for what it is used.
Consolidated AWS PermissionsPermission is an action defined for a particular AWS service. Each aws-role consists of a group of permissions. These permissions determines the level of access within AWS.
UsersAttachedThe list of users to whom the role is attached.
CreatedByWho created the role.
LastModifiedByWho has recently updated the role.
LastModifiedTimeTimestamp when the role was recently updated.

Role Operations

If a users has sufficient permission they can perform the below operations on AWS-Roles.

FunctionalityDescription
View RoleView existing Role Metadata Information.
Update RoleUpdate users attached on existing AWS-Roles.
Switch To ConsoleThis functionality helps user to switch to AWS console using these AWS-Roles.

Aws-Roles View role

The below gif shows Switch to Console feature. Switch to console

Custom AWS Roles use case

An administrator wants to create a role with full read access to the DynamoDB service and assign this role to a set of users. The users who access the AWS console using this custom role will only have access to the DynamoDB service and will not be able to access other resources or perform other actions within AWS.

Step 1

The administrator will need to provide an IAM policy template in .txt file to the Amorphic team. This policy template should contain access to full dynamodb view permission. The Amorphic team will use this policy template to create the role in your AWS account.

Step 2

After receiving the IAM policy template, the Amorphic team will verify the policy to ensure it meets the user's needs and the security requirements. Once the policy is verified, the team will create the role in the user's Amorphic account.

Step 3

The administrator can view the newly created role and assign users to it through the Amorphic interface.

Step 4

Once a user has been assigned a role, they will be able to access the AWS console by selecting the "Switch to AWS Console" option under the profile section. The user will only have access to the resources and actions defined in the role's permissions.

Custom AWS Roles and Operations

The custom roles created through Amorphic are unique to the user's account and can be managed by the user's administrator. The user will have access to the resources and actions defined in the role's permissions and it is important to keep the permissions updated as per the requirement.

Custom AWS Role

Sync Custom Roles Option

If the user wants to update the IAM permissions for a role, they will need to provide an updated policy document to the Amorphic team. Once the Amorphic team updates the policy document in S3, the user will need to click the "Sync Custom Roles" button to apply the updated permissions.

SAML Mapping

SAML (Security Assertion Markup Language) is an XML-based standard for exchanging authentication and authorization data between an identity provider (IdP) such as Okta, and a service provider (SP) such as Amorphic In Amorphic, Users/API calls get authenticated using Cognito. The authentication token received has the groups embedded in it. These groups will have role assigned to it Amorphic application. User will be granted access to the role based on the groups assigned to him in identity provider(IdP) such as Okta.

Amorphic provides SAML Groups with access to application resources through its roles. SAML Groups are the groups in an Idp which contains a list of users. To delegate the users in the group with certain set of permissions in the Amorphic application, map the group with the application role. To know more about the roles in Amorphic application roles click on the link Role Base Access Control - (RBAC)

What is a SAML Mapping?

A SAML mapping is a way of assigning a SAML Group with a role in Amorphic application. An administrator in the Amorphic application will have permissions to perform this operation.

SAML Mapping Metadata Information

TypeDescription
SamlGroupIdSAML Group name which the administrator has to enter manually.
RoleIdId of the role which will be used by the users of the group. Administrator selects the name of the role from the drop down.
CreationTimeTimestamp when the mapping was created.
CreatedByAdministrator who created the mapping.

SAML Mapping Operations

Administrator of the Amorphic Application can add a mapping, edit or delete an existing mapping.

Add New Mapping

User can add a new mapping in the Amorphic application by using the "Add New Mapping" functionality.

In order to add a new mapping, user need to be an administrator in the application. Below is the image that shows how to add a new mapping.

Create SAML Mapping

Edit Mapping

User can edit an existing mapping. User can change the role associated with the group but not the other way. To change the group name delete the existing mapping and add a new one.

Below is the image that will show how to edit a mapping.

Edit SAML Mapping

Delete Mapping

User can delete an existing mapping.

Below is the image that will show how to delete a mapping.

Delete SAML Mapping

Note

Below are some the important points that the Amorphic administrator needs to keep in mind when a mapping is added or deleted.

  • If a user is a part of a SAML group and there is a mapping of the SAML group to an application role which the user already has access to will loose the access to role when the mapping is deleted or when the user is removed from the SAML group.
  • This only doesn't apply to default-role i.e., if there is a mapping between a SAML group and a default-role and when a user has been removed from the SAML group or the mapping in the Amorphic application is deleted. Access to the default role will not be lost. If it were some other role, access to it would have been lost.
  • If a user tries to make a /users/{id} call for themselves using a PAT Token, user will get removed from the role attached to their SAML mapping.