DQC Logo
|

User management and access rights

1. Introduction

The DQC Platform uses a two-layer access model: Tenant Roles control what users can do platform-wide, while Object-Level permissions control access to specific data sources (connectors, tables, rulesets).

This model balances flexibility, safety, and ease of understanding, allowing you to grant broad capabilities while restricting access to sensitive data where needed.


2. Tenant Roles — Global Capabilities

Tenant roles define global administrative and operational capabilities across the entire platform. They do not automatically grant access to specific connectors, tables, or rulesets.

The DQC Platform has three tenant roles: Owner, Manager, and Member.

Capability

Owner

Manager

Member

Manage general settings

undefined

undefined

undefined

Manage LLM settings

undefined

undefined

undefined

Invite users

undefined

undefined

undefined

Change roles & remove users

undefined

undefined

undefined

Create & manage groups

undefined

undefined*

undefined*

Manage quality dimensions

undefined

undefined

undefined

Manage tags

undefined

undefined

undefined

Access to BI connection & API token

undefined

undefined

undefined

Manage company rules

undefined

undefined

undefined

Add data sources

undefined

undefined

undefined

Add channels & catalogs

undefined

undefined

undefined

Manage missions & alerts

undefined

undefined**

undefined**

*Only if they are assigned as group owners
'**Only if they have access rights to the respective ruleset

Note on BI Connection & API Token: This capability allows Owners to generate API tokens for programmatic access and connect the platform to external Business Intelligence tools.

Note on Groups: For detailed information on creating and managing groups, see the separate Groups documentation.


3. Object-Level Access Rights

Object-level access rights control visibility and editability of data objects (Connectors, Tables, and Rulesets) for Managers and Members.

Owners always have full access to all objects and are not restricted by object-level permissions.

Access Rights Levels

Access Right Level

Meaning

No access

Hidden — object does not appear in lists or navigation

View

Object is visible, read-only

Coordinate*

Object is visible and allows limited modifications

Edit

Object can be modified

* Only available at the ruleset level. Specific capabilities are defined in Section 6.


4. Hierarchy and Inheritance

The DQC Platform's authorization model is based on Google's Zanzibar access control system, adapted for data quality management workflows.

Object Hierarchy

The platform organizes objects in a hierarchy:

  • Connectors contain Tables

  • Tables contain Rulesets

Core Permission Model

Connectors: Setting Permissions During Connection

When connecting a new connector, you define two types of access:

  1. Connector Access – Controls who can see and modify the connector itself

  2. Default Table Access – Sets the baseline permissions that all tables within this connector will inherit

This design allows you to configure access for future tables at connection time, rather than managing each table individually afterward.

You can edit both Connector Access and Default Table Access at any time after the initial connection. Changes to Default Table Access will affect all tables in inherited state.

Tables: Primary Inheritance from Default Table Access

Tables primarily inherit their permissions from Default Table Access, which is configured at the connector level. This default acts as a template that automatically applies to all tables within a connector and is used to set up permissions

Key Inheritance Rule:

  • If Default Table Access is unrestricted (no users assigned), tables remain unrestricted for all users, regardless of any Connector Access restrictions

  • If Default Table Access has explicit assignments (users are assigned), all tables are restricted to Managers/Members that are explicitly assigned

Note:

  1. Default table permissions can also be overwritten on the table level by explicitly assigning users

  2. When Default table permissions are assigned, those will be combined with the connector access permissions as well. The highest permission level from either source applies to the table

Rulesets: Inherit from Parent Table

Rulesets inherit permissions from their parent table. If a table has View access for a user, the user also has View access to all rulesets within that table (unless overridden by explicit ruleset permissions).

Permission States

Every table and ruleset exists in one of two states:

Inherited Access (Default State)

  • No explicit permissions are assigned to this object

  • The object automatically inherits permissions from its inheritance sources

  • For tables:

    • Inherits from Default Table Access (always)

    • Also inherits from Connector Access (only when Default Table Access has explicit assignments)

  • For rulesets: Inherits from parent table

  • Changes to parent permissions automatically flow down to inherited objects

Explicit Access (Locked State)

  • Specific permissions have been manually assigned to this object

  • Inheritance is broken – the object no longer receives updates from parent permissions

  • All access must be manually managed until explicit permissions are cleared

Default Behavior for New Objects

Important: If no explicit access rights are assigned during connector setup:

  • Newly connected connectors and tables are accessible to all users without restrictions

  • All users (Members, Managers, and Owners) can edit these objects by default

  • This includes the default ruleset automatically created for each newly connected table

Example: How Inheritance Works

Example 1: Unrestricted Default Table Access

Setup:

  • Connector Access: Edit for Member A

  • Default Table Access: Unrestricted (no assignments)

  • Table X Access: no users assigned

Result:

  • Connector: Tenant Owner and Member A have Edit access

  • Table X: The table is in inheritance state, but did not inherit any limiting permissions from default table access. Therefore all users have edit rights.

Example 2: Restricted Default Table Access (Dual Inheritance)

Setup:

  • Connector Access: View for User A

  • Default Table Access: Edit for User A, View for User B

  • Table X: no users assigned

  • Table Y: Explicit View for User A

  • Table Z: Explicit View for User B

Result:

  • Table X: User A has Edit access (highest of: View from connector + Edit from default)

  • Table X: User B has View access (highest of: no connector access + View from default)

  • Table Y: User A has View access to (explicit permission locks this access level)

  • Table Z: User A has No access (explicit permission only grants access to User B who has View access)

Modifying Default Table Access

You can edit Default Table Access at any time to change the baseline permissions for tables.

  • Tables in inherited state – They immediately receive the updated permissions

  • Tables with explicit access – They are unaffected and maintain their explicitly assigned permissions

Important: If you change Default Table Access from unrestricted to having explicit assignments (or vice versa), this affects whether Connector Access permissions flow down to tables.

Navigation Visibility

Minimum hierarchy for navigation: If a user has access to a lower-level object but not to its parent, the platform displays the minimum required hierarchy for navigation purposes.

Example: If a user has No Access to a connector and table, but View access to a specific ruleset within that table, the user will see:

  • The connector name (but cannot access it)

  • The table name (but cannot view table configurations)

  • The ruleset they can view

This ensures users can navigate to objects they have permission to access, even if parent objects are restricted.


5. How Effective Access is Determined

When a user attempts to access an object, the DQC Platform evaluates access in this order:

1. Check tenant role

Does the user have the global capability to perform this type of action?

  • If the user is an Owner: grant full access (skip object-level checks)

  • If not: proceed to step 2

2. Collect all applicable permissions

  • Check for individual permissions assigned directly to the user

  • Check for group permissions from all groups the user belongs to

Note: A user can be in one or multiple groups

3. Determine effective access on the object

If the object is in inherited state (no explicit permissions set):

  • For tables: Merge permissions from both the connector AND default table permissions

  • For rulesets: Use the parent table's effective permissions

  • Apply the highest permission level when merging

If the object is locked (explicit permissions are set):

  • Use only the explicitly defined permissions; ignore parent permissions

4. Apply the highest permission level

When multiple permissions apply (individual + multiple groups), the highest access level takes precedence.

Example: User has individual View access + belongs to a group with Edit access → Effective access is Edit

Example: User belongs to Group A (View) + Group B (Edit) → Effective access is Edit

5. Apply the access level

Based on the effective access (No access, View, Coordinate, Edit), allow or restrict the action.


6. Specific Access Rights per Object Level

This section defines exactly what each access level allows at each object type.

If a user does not have View, Coordinate, or Edit permissions, access defaults to No access, and an Access denied message is shown.

Edit access automatically includes all View access rights. Therefore, the following section only lists the additional permissions granted with Edit access.

Connector Level

View

  • See connector name in the connectors overview

  • See all connected tables and ruleset

Edit

  • Resync connector

  • Edit connector credentials (only available for non-static connectors)

  • Select tables to sync

  • Manage connector permissions (users and groups)

  • Manage default table permissions (users and groups)

  • Delete connector

Table Level

View

  • See table in tables overview

  • See all rulesets of the table

  • View tabs: Overview, Rules, Issues, Sample, Profiling

  • Download issues

Edit

  • Create and delete rulesets

  • Add data catalog information

  • Manage table permissions

Ruleset Level

View

  • See ruleset

  • Use the DQ-AI Assistant for explanations and answers (no rule creation)

Coordinate

  • Create, edit, and delete rules (manual or via DQ-AI Assistant)

  • Change dimensions and tags on rules

  • Activate or deactivate rules

  • Predict data quality rules

  • Apply company rules

  • Start quickstart guide

  • Run rule checks

  • Create and edit missions and alerts

  • Create and edit improvement workflows

Edit

  • Adjust quality scores

  • Change schedule of ruleset checks

  • Edit ruleset scope

  • Manage ruleset permissions

  • Delete, import, and add new rulesets

Note: The Coordinate access level is only available for rulesets. It allows users to work with rules and quality checks without modifying structural settings or permissions.

7. Realistic Example: Access setup for a tenant with HR, Finance, and Sales data

A company uses the DQC Platform to validate data from three departments: HR, Finance, and Sales. The tenant has one Tenant Owner, several Business Users, and two groups: HR Team and Finance Team.

The Tenant Owner configures the DQC Platform, invites users, creates the groups, and manages global settings. The Business Users only receive access to the objects they need for their work.

Example setup:

- The Tenant Owner connects three data sources: HR Data, Finance Data, and Sales Data

- The HR Team receives Edit access to the HR connector and its tables

- The Finance Team receives Edit access to the Finance connector and its tables

- All Business Users receive View access to the Sales tables, because the data is not sensitive and should be visible across teams

- Default Table Access is configured for each connector so that new HR tables are automatically restricted to the HR Team and new Finance tables are automatically restricted to the Finance Team

Example inheritance:

- A new table called Employee Master Data is added under the HR connector

- Because the table is still in inherited access state, it automatically receives the HR connector’s Default Table Access

- Members of the HR Team can edit the table and its rulesets

- Members of the Finance Team cannot see the table unless access is explicitly granted

Example explicit override:

- A ruleset on the Employee Master Data table checks whether employee cost centers are valid

- The Finance Team needs to review these rules but should not edit the table itself

- The Tenant Owner or HR editors grants the Finance Team Coordinate access on this specific ruleset

- The Finance Team can now create, edit, activate, and run rules in this ruleset, but cannot change table permissions, ruleset scope, or delete the ruleset

Example result:

- HR Team: Can manage HR data and HR rulesets

- Finance Team: Can manage Finance data and coordinate selected HR rulesets where finance input is needed

- Business Users: Can view Sales data but cannot modify access rights or sensitive HR/Finance objects

- Tenant Owner: Has full access to all connectors, tables, rulesets, users, and tenant settings

This setup keeps sensitive HR and Finance data restricted, while still allowing cross-team collaboration on selected rulesets where needed.


undefined Notes

  • Tenant roles define global capabilities, not data access

  • Object permissions control access to connectors, tables, and rulesets

  • Explicit permissions override inheritance and must be managed manually

  • Learn more: Invitation of New Users, Creation of Groups

User management and access rights | DQC