Skip to main content

Polaris access overview

The Organizational settings console is a web interface for setting up, monitoring, and managing user access to Imply Polaris. It encapsulates access settings across the entire organization. It is also where you configure authentication policies and connect third-party identity providers.

To access the Organizational settings console from the Home page, click the profile menu in the top right corner. Select User management from the list of menu options.

Authentication and authorization

Polaris identifies each authorized user of your account by a unique login tied to their email address. Polaris offers a role-based access control (RBAC) model that allows you to control the level of access available to users in your organization.

In particular, the RBAC model lets you manage the following permissions for Polaris authorized users:

  • Ability to manage projects and other users.
  • Ability to manage data cubes and dashboards.
  • Ability to see visualizations.
  • Ability to query data directly with SQL.
  • Ability to load new data.

You can also create API keys and custom OAuth clients to enable applications to call the Polaris API directly. To learn more about authenticating REST API requests to Polaris, see Authentication overview.

Permissions and groups

Permissions determine the operations a user can perform. For example, the AdministerDashboards permission lets a user view and manage all dashboards within an organization.

You grant permissions to users through groups. Polaris provides predefined groups that correspond to specific use cases, such as Organization Admin, Data Manager, and Viewer. For information on creating and managing groups, see Manage user groups.

Resource-based access control

You can restrict access to individual data cubes, dashboards, alerts, and reports to specific users and groups. This is an optional feature that you can use in conjunction with Polaris permissions, to control access to your resources at a granular level.

For more information on how to restrict access to your resources, see the following topics: