Data Access¶
Guance allows restricting access to RUM data for workspace members at the application level. By introducing regular expressions and desensitization fields, it effectively enhances security protection for different application data, ensuring information security.
Start Creating¶
- Enter the Create page;
- Input the rule name;
- Optionally input a description for the rule;
- Select the application ID (only applications from the current workspace can be selected). You can apply to all applications or select single/multiple applications, covering Web, iOS, Android, etc.;
-
Define the access scope for RUM data under the current rule;
-
Add single or multiple fields that need to be desensitized;
-
Use regular expressions to desensitize sensitive information in the field content;
- Select single or multiple member roles to which the current access rule can be applied, including system default roles and custom roles;
- Click Save.
Configuration Notes¶
When configuring data access rules, pay attention to three major logics:
- Data Access Scope: Members within the access rule can only access data that matches the filter conditions.
- Regular Expression Desensitization: If you need to add an additional layer of data protection within the defined data scope, you can set regular expressions or desensitization fields to externally shield sensitive data;
- Role Scenarios and Query Permissions: Different roles and different rules, whether single or combined, will produce different results for the final presentation of data access rules.
Manage List¶
For more details, refer to List Operations.
Notes¶
Cross-Workspace Query: If two workspaces contain the same application, based on the permission settings in the data access rules, specific roles can only view the filtered data of the application in the authorized workspace.
Prerequisite: Workspace A
and Workspace B
both have the whytest-android
application, and Workspace B
has authorized RUM application data viewing permissions to Workspace A
.
When configuring data access rules (as shown below), Workspace A
restricts the "Custom Management" role to only view data under source:kodo
for the whytest-android
application.
The following scenarios exist:
Since the explorer does not currently support cross-workspace queries, the "Custom Management" role can only view RUM data for the whytest-android
application in Workspace A
in the RUM Explorer.
When selecting both Workspace A
and Workspace B
for data query, and simultaneously querying data for the whytest-android
and whytest-ios
applications in DQL. Since the current data access restriction rules limit access for the "Custom Management" role, and the whytest-android
application data in Workspace B
and the whytest-ios
application data in both Workspace A
and Workspace B
are not configured with access permissions.
Therefore, the "Custom Management" role can only access the whytest-android
application data in Workspace A
.