Reference | Security model overview#
How do Dataiku users securely access the platform with the right permissions? Dataiku’s security model consists of the following components.
First, Dataiku relies on both user identity and user authentication:
user identity to uniquely identify users of the platform and
user authentication to prove that the user is who they claim to be.
Second, Dataiku has a groups-based permissions model to allow users to perform actions on the platform. By default, permissions are linked to two elements:
user profiles and
Users can belong to an arbitrary number of groups. Groups can have one or several permissions, which may be global or per-resource group permissions. Administrators can also configure security permissions for other resources such as data connections.
Note
In addition to the resources linked here, visit Security in the reference documentation for more information.