Pentaho Academy Beta site ..

Communities

Fine tune authorization to assets ..

Data Catalog Communities


Data Catalog Default Roles

Data Catalog provides default user roles with role-based permissions that enable administrators to control access as necessary across Data Catalog. These permissions are distributed across two tiers of licensed users: Business Users, and Expert Users, as needed.

Administrators can also fine-tune access by creating communities of users to which they assign permissions, such as access to specific data source types or business glossaries.

A Community is a custom role used to fine-tune access to specific actions or Data Catalog assets. For example, you can use a Community to restrict access for a group of users to a subset of glossaries and data sources.

At least one role or Community must be assigned to a user when the user is created. Multiple roles or Communities can be assigned to a user, if the permissions granted are mutually exclusive and are not derived from the same default role.

Your software license determines user-based entitlement.

Business Users

The first tier of licensed users is Business Users, including two roles with differing permissions.

The following table shows the default access permitted for a user with the Business User or Data User role. For example, a user with the Business User role can view business glossaries but cannot view data sources. The Data User role has all the access of a Business User, plus access to data associated with the user's specific line of business.

The data can be masked when deemed sensitive or confidential.

Role
Permissions

Business User

Can view business glossaries and policies.

Cannot view data sources.

Data User

Can view applications, business glossaries, business intelligence, data sources (view, add content, delete content, view dashboard), and policies.

If every user in the PDC is assigned default-roles-pdc, why bother creating AW custom roles?

You raise an excellent point ..!

The custom roles provide governance and compliance metadata that Communities alone cannot deliver. Your Adventure Works roles contain rich compliance attributes like compliance_scope: ["gdpr", "ccpa"], data_domains: ["sales", "customer"], and retention_policy: ["7_years"]. These attributes can be used by other systems, audit tools, and compliance reporting - not just PDC. Communities are PDC-specific containers, while Keycloak roles can be consumed by multiple applications.

Custom roles enable consistent authorization across your entire ecosystem. If Adventure Works users need to access other applications beyond PDC (reporting tools, databases, APIs), the Keycloak roles provide a consistent identity that travels with the user. Communities only work within PDC, so you'd need separate authorization mechanisms for each additional system.

The approach you're suggesting could work for a PDC-only environment: Users get default-roles-pdc → Join appropriate PDC Communities → Get domain-specific access through Community membership. This would be simpler to manage and reduces the number of moving parts.

However, the hybrid approach (Keycloak roles + PDC Communities) provides maximum flexibility and governance. You get fine-grained business domain control (Communities), compliance metadata (custom roles), functional permissions (PDC roles), and extensibility to other systems. The trade-off is increased complexity.


Adventure Works Communities

PDC uses Keycloak for authentication. Once authenticated PDC, based on your role, authorizes access to the PDC assets and actions. The only way to grant this authorization is through the combination of Communities + mapped to PDC Default Roles.

Community
Schema
PDC Default Role
Description
Users

AdventureWorks_Data_Governance_Council

Data Steward

Cross-domain data stewardship and governance oversight

elena.rodriguez

AdventureWorks_System_Administrators

All the Roles

Full PDC administrative capabilities for system management

james.lock

AdventureWorks_Sales_Analytics

Sales + Person

Data User

Sales team data analysis and customer insights.

sarah.johnson

AdventureWorks_Compliance_Officers

Business Steward

Regulatory compliance monitoring and audit management

david.park

  1. Log into PDC:

Username: [email protected]

Password: Welcome123!

  1. Go to: Management → Users & Communities

  2. Click: Add New → Add Community

Add Communities
  1. Based on the table above, enter the following details - refer to the table above:

  1. Click: Add Users.

  1. Add: sarah.johnson

Select user
  1. Click: Done.

  2. Repeat to create the rest of the Communities ..

AW Communities

Users with multiple PDC Roles

  1. Click on the Pen to edit the User

Edit the User
  1. Click: Add Roles

Add Roles
  1. Select the required Roles > Done - Save.

Note: The initial PDC mapped role isn't displayed ..


Test AW Login

It's going to need fine tuning .. with Permissions & Scope

  1. Log into PDC:

Username: [email protected]

Password: Welcome123!

x

x

x


Last updated

Was this helpful?