
Note:
Ensure that users who want to access the integrated tools from within the Calibo Accelerate platform are already added to the relevant tools before syncing their tool-specific roles and permissions from the Calibo Accelerate platform.
This section is visible if you are creating a Product role.
As an Administrator, on the Cloud Platforms, Tools & Technologies screen, you configure the connection details for various tools and technologies integrated with the Calibo Accelerate platform. In the Tools section, you can decide which tools your custom role can access, and the actions the role can perform on each tool.
When you assign a custom role to a user at a product level, the roles and permissions you specify in this section are assigned to the user for the tools associated with that product.
For details on how access control and permissions work for these tools, refer to the vendor documentation for each respective tool.
To assign tools-related permissions for your custom role, refer to the following sections for your desired tools.
JiraEnable Access : To allow your custom role to access your configured Jira instance from the Calibo Accelerate platform, and to assign the required Jira roles to the custom role, turn on the toggle.
Roles: To assign the desired Jira roles to your custom role, do either of the following:
Alternatively, click connect to a Jira instance and from the list of configured instances, choose the one from which you want to fetch the configured roles. Click Get Roles to retrieve all the roles configured in the selected Jira instance. Select the checkboxes for the desired roles and click Add Roles.
ConfluenceEnable Access : To allow your custom role to access your configured Confluence instance from the Calibo Accelerate platform, and to assign the required Confluence permissions to the custom role, turn on the toggle.
Space Permissions
Select the appropriate Confluence space permissions for your custom role. The following options are available.
All | |
Pages | |
Blog | |
Attachments | |
Comments | |
Restrictions | |
Space | |
Page Permissions
BitbucketEnable Access : To allow your custom role to access your configured Bitbucket instance from the Calibo Accelerate platform, and to assign the required Bitbucket permissions to the custom role, turn on the toggle.
Permissions
Select the appropriate Bitbucket Server project permissions and repository permissions for your custom role. The following options are available.
Project Access | |
Repo Access | |
Bitbucket CloudEnable Access : To allow your custom role to access your configured Bitbucket Cloud instance from the Calibo Accelerate platform, and to assign the required Bitbucket Cloud permissions to the custom role, turn on the toggle.
Permissions
Select the appropriate Bitbucket Cloud project permissions and repository permissions for your custom role. The following options are available.
Project Access | |
Repo Access | |
JenkinsEnable Access : To allow a custom role to access your configured Jenkins instance from the Calibo Accelerate platform, and to assign the required Jenkins permissions to the custom role, turn on the toggle.
Permissions
Select the appropriate Jenkins permissions for your custom role. The following options are available.
Job | Build Delete Create Configure Workspace Cancel Move Discover Read
|
View | Delete Configure Create Read
|
Credentials | View Update Manage Domains Create
|
Run | |
SCM | |
JFrogEnable Access : To allow a custom role to access your configured JFrog instance from the Calibo Accelerate platform, and to assign the required JFrog permissions to the custom role, turn on the toggle.
Permissions
Select the appropriate JFrog permissions for your custom role. The following options are available.
Repository Permissions | Read Annotate Deploy/Cache Delete Manage XRay Metadata Manage
|
SonarQubeEnable Access : To allow a custom role to access your configured SonarQube instance from the Calibo Accelerate platform, and to assign the required SonarQube permissions to the custom role, turn on the toggle.
Permissions
Select the appropriate SonarQube permissions for your custom role. The following options are available.
DatabricksEnable Access : To allow a custom role to access your configured Databricks instances from the Calibo Accelerate platform, and to assign the required Databricks permissions to the custom role, turn on the toggle.
Permissions
Select the appropriate Databricks permissions for your custom role. The following options are available.
Databricks Instance - Select a Databricks instance for which you want to assign permissions to the custom role.
Cluster Access Permissions
Select one of the following cluster access permissions for your custom role:
Can Manage
Can Restart
Can Attach To
Workspace/Folder Permissions
Select one of the following Databricks workspace or folder permissions for your custom role:
Can Run
Can Manage
Can Read
Can Edit
Click Add.
SnowflakeEnable Access : To allow your custom role to access your configured Snowflake instance from the Calibo Accelerate platform, and to assign the required Snowflake permissions to the custom role, turn on the toggle.
You can map an already configured role in your Snowflake account to your custom role or create a new role.
Map existing roleTo map an existing Snowflake role to your custom role, do the following:
Snowflake Instance
Select the Snowflake instance on which you want to grant access to the custom role.
Role
From the list of roles existing on the selected Snowflake account, select the desired role that you want to map.
Object
Select the desired object from the list.Depending on the object you choose, the following options are available. Select the option required for your custom role.
WAREHOUSE | - The list of available warehouses is displayed. Select the warehouse on which you want to grant access to the custom role.
- Review the list of privileges assigned to the selected Snowflake role on the selected warehouse and click Add.
|
SCHEMA | - Select the database and the schema on which you want to grant privileges to the custom role.
- Review the privileges assigned to the selected Snowflake role on the selected database and schema and click Add.
|
DATABASE | - Select the database on which you want to grant privileges to the custom role.
- Review the privileges assigned to the selected Snowflake role on the selected database and click Add.
|
TABLE | - Select the database, schema, and the table on which you want to grant privileges to the custom role.
- Review the privileges assigned to the selected Snowflake role on the selected table and click Add.
|
Create new roleTo create a new role in Snowflake and map it to your custom role in the Calibo Accelerate platform, do the following:
Snowflake Instance
Select the Snowflake account on which you want to create a new role.
Object
Select the desired object from the list.Depending on the object you choose, the following options are available. Select the option required for the new Snowflake role.
WAREHOUSE | - The list of available warehouses is displayed. Select the warehouse on which you want to grant access to the custom role.
- For the selected warehouse, assign the desired privileges to the new Snowflake role.
|
SCHEMA | - Select the database and the schema on which you want to grant privileges to the custom role.
- For the selected schema, assign the desired privileges to the new Snowflake role.
|
DATABASE | - Select the database on which you want to grant privileges to the custom role.
- For the selected database, assign the desired privileges to the new Snowflake role.
|
TABLE | - Select the database, schema, and the table on which you want to grant privileges to the custom role.
- For the selected table, assign the privileges to the new Snowflake role.
|
GitHub ServerEnable Access : To allow your custom role to access your configured GitHub Server instance from the Calibo Accelerate platform, and to assign the required GitHub Server role to the custom role, turn on the toggle.
Roles:
To assign the desired GitHub Server role to your custom role, do either of the following:
Alternatively, click connect to a configuration and from the list of configured GitHub Server instances, choose the one to grant access to the role being created. Click Get Roles to retrieve all the roles configured in the selected GitHub Server instance. Choose the role that best fits your custom role and click Add Role.
GitHub CloudEnable Access : To allow a custom role to access your configured GitHub Cloud instance from the Calibo Accelerate platform, and to assign the required GitHub Cloud permissions to the custom role, turn on the toggle.
Roles:
To assign the desired GitHub Cloud role to your custom role, do either of the following:
Alternatively, click connect to a configuration and from the list of configured GitHub Cloud instances, choose the one to grant access to the role being created. Click Get Roles to retrieve all the roles configured in the selected GitHub Cloud instance. Choose the role that best fits your custom role and click Add Role.
GitLabEnable Access : To allow your custom role to access your configured GitLab instance from the Calibo Accelerate platform, and to assign the required GitLab permissions to the custom role, turn on the toggle.
Roles:
Select the desired GitLab role that you want to assign to your custom role. The following Project roles are available:
Guest
Reporter
Developer
Maintainer
Owner
A user assigned the Guest role has the least permissions, and the Owner has the most. For more information about permissions and roles in GitLab, refer to the GitLab documentation.
Qlik SenseEnable Access : To allow your custom role to access your configured Qlik Sense instance from the Calibo Accelerate platform, and to assign the required Qlik Sense permissions to the custom role, turn on the toggle.
Permissions:
Qlik Sense Instance
From the list of configured Qlik Sense instances, select the instance on which you want to grant access to your custom role.
Object
Select Space.
Space
All the spaces created in the selected Qlik Sense instance are available in the dropdown list. You can select specific spaces or select all to grant access to your custom role.
Permission
Select one or more of the following permissions on the selected Qlik Sense spaces for your custom role:
Can consume data
Can edit
Can edit data in apps
Can manage
Can view