Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Metabase Up and Running

You're reading from  Metabase Up and Running

Product type Book
Published in Sep 2020
Publisher Packt
ISBN-13 9781800202313
Pages 332 pages
Edition 1st Edition
Languages
Author (1):
Tim Abraham Tim Abraham
Profile icon Tim Abraham

Table of Contents (15) Chapters

Preface 1. Section 1: Installing and Deploying Metabase
2. Chapter 1: Overview of Metabase 3. Chapter 2: Deploying Metabase with AWS 4. Section 2: Setting Up Your Instance and Asking Questions of Your Data
5. Chapter 3: Setting Up Metabase 6. Chapter 4: Connecting to Databases 7. Chapter 5: Building Your Data Model 8. Chapter 6: Creating Questions 9. Chapter 7: Creating Visualizations 10. Chapter 8: Creating Dashboards, Pulses, and Collections 11. Chapter 9: Using the SQL Console 12. Section 3: Advanced Functionality and Paid Features
13. Chapter 10: Advanced Features, Getting Help, and Contributing 14. Other Books You May Enjoy

Creating permissions

Permissions either allow or prevent groups of users from accessing certain data. Metabase has a simple philosophy around permissions, which they outlined in a blog post back in 2016 when they introduced the feature (https://www.metabase.com/blog/Permissions/). Unlike some analytics products, which give extremely fine-grained and complex permission capabilities down to the individual record, Metabase keeps it high level. They do, however, offer more fine-grained permissions in their Enterprise version.

In Metabase, permissions are not applied at the user level, but rather at the group level. So, before we learn about permissions, let's learn about groups.

Creating user groups

Groups allow you to organize sets of users. The purpose of creating groups is to control permissions around the viewing of certain databases, tables, or columns. For example, a good practice is to restrict the access of Personally Identifiable Information (PII), such as full names...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}