Skip to content

Latest commit

 

History

History
57 lines (39 loc) · 2.13 KB

File metadata and controls

57 lines (39 loc) · 2.13 KB

Security & Identity

This guide covers how to manage identities and access control within the Pangolin UI.

👤 User Management

Manage the lifecycle of human users in your tenant.

  • Invite Users: Create accounts with a default role.
  • Profile Details: View a user's role, home tenant, and recent activity.
  • Revocation: Delete or deactivate users (Root/Admin only).

🎭 Role-Based Access Control (RBAC)

Pangolin uses a dynamic RBAC model to grant precise permissions.

Roles

The UI provides a dedicated Roles dashboard where you can:

  • Define Roles: Create a "Data Scientist" or "Auditor" role.
  • Assign Roles to Users: One user can hold multiple roles simultaneously.

Permissions Interface

When creating or editing a role, the UI provides a granular selector for:

  • Action: READ, WRITE, CREATE, DELETE, LIST, ALL (Full Access), MANAGE_DISCOVERY.
  • Scope Type: System, Tenant, Catalog, Namespace, Table, View.
  • Target: The specific resource (e.g., the finance namespace).

🔑 Token Management

manage your session and programmatic access via JWT tokens.

Personal Tokens

From the Profile menu, users can:

  • List Sessions: See all active web and API sessions.
  • Revoke Tokens: Manually sign out other devices or rotate your current session.

Admin Token Control

Tenant Admins can view and revoke tokens for any user within their tenant to mitigate security incidents or during user offboarding.


🛡️ Authentication & Identity Providers

Pangolin's UI seamlessly handles multiple authentication flows:

1. No Auth Mode (Local Development)

For local testing without an identity provider.

  • Trigger: Set PANGOLIN_NO_AUTH=true and VITE_NO_AUTH=true.
  • Login: Use username root and password root.
  • Behavior: Simulates a Root user session with full system access. Sessions persist across refreshes via local storage.

2. Native Auth

Username and Bcrypt-hashed password management for standard deployments.

3. OAuth

One-click login with Google, GitHub, or Microsoft (configured in System Settings).