Mark Johnson

Mark Johnson Dremio Author & Contributor
Principal Solution Engineer, Dremio

Mark Johnson's Articles and Resources

impersonation 2impersonation 2

Security

How To Use Inbound Impersonation

Requirements Configure Dremio for Inbound Impersonation Step 1: Create ‘depta__user’ and ‘deptb_user’ as ‘User’ role within Dremio. These users will only be able to Query the datasets to which they should have permissions. Step 2: Create a service account (in this case ‘tpcds_service’) as the generic access for the specific datasource or dataset. Step 3: […]

Read more ->
get started

Get Started Free

No time limit - totally free - just the way you like it.

Sign Up Now
demo on demand

See Dremio in Action

Not ready to get started today? See the platform in action.

Watch Demo
talk expert

Talk to an Expert

Not sure where to start? Get your questions answered fast.

Contact Us

Ready to Get Started?

Enable the business to create and consume data products powered by Apache Iceberg, accelerating AI and analytics initiatives and dramatically reducing costs.