Data Observability platform Help

Users & Roles

UserRoles

DQM has two predefined roles:

  • admin - Allows all actions inside DQM and has access to all data sources. Admin users can modify all DQM settings

  • user - Allows all privileges inside DQM and has access to all data sources

Adding a custom role

NewRole
  • Role name - Identifier role name

  • Allowed connections - Allowed data sources for given role

  • Read-only - Defines given role as read-only, which will be assigned to license read-only users

  • Privileges - Access to specific functionalities of DQM. You can also use "All privileges" slider to enable all DQM functionalities or disable specific pages for selected role.

Adding a read-only role

NewRole

For read-only users you can choose specific pages they have access to.

Adding a new user

NewUser
  • Username - Username identifier

  • Display name - Display name which will be displayed throughout DQM

  • Email - User email address used for alerts

  • Password - User password (Password must be between 12 - 72 characters. We recommend using a mix of words, numbers and symbols). For OAuth/LDAP/AD users no password is needed. If these users will be assigned a password, they can access with both OAuth/LDAP/AD authentication and local user.

  • Role - Role determines what the user can do in DQM based on the privileges and allowed connections assigned to that role.

Recovering admin user

If in some case admin user credentials are forgotten, admin user password can be reset from the application machine. DQM container/JAR file should be rerun with parameter “dqm.recovery.password”

docker run -d -e … “JAVA_OPTIONS=-Ddqm.recovery.password=mynewtemppassword” {image}
java -Ddqm.recovery.password=mynewtemppassword … -jar SelectZero.jar

Privileges

The privileges below correspond to the toggles in the role-edit dialog. Each section starts with a top-level "view" privilege that grants access to the page; all sub-privileges in that section additionally require that view privilege to be enabled.

Dashboard

  • View dashboard - Grants access to the dashboard page

  • Add/edit dashboard - Allows creating, editing and deleting dashboard tiles and layout

Connections

  • View connections page - Grants access to the connections page

  • Add/edit connections - Allows creating, editing and deleting data source connections

Catalog

  • View catalog page - Grants access to the data catalog page

  • Add/edit catalog objects - Allows creating, editing and deleting catalog objects

  • Add/edit glossary terms - Allows managing business glossary terms

  • Add/edit business rules - Allows managing business rules

  • Allow catalog imports - Allows running catalog imports from external sources

  • Directories - Allows managing the catalog directory tree

Test cases

  • View test cases page - Grants access to the test cases page

  • Add/edit test cases - Allows creating, editing and deleting test cases

  • Add/edit test case reports - Allows managing test case reports

  • Add/edit dynamic rules - Allows managing dynamic rules used to auto-generate test cases

  • View test case results - Allows viewing test case run results and history

Test suites

  • View test suites page - Grants access to the test suites page

  • Add/edit test suites - Allows creating, editing and deleting test suites

  • Add/edit directories - Allows managing the test suite directory tree

  • View test suite reports - Allows viewing test suite reports

  • Add/edit suite reports - Allows creating, editing and deleting test suite reports

Profiling

General

  • Allow to execute - Allows running test cases, test suites and profilings

  • Add/edit global variables - Allows managing global variables

  • Allow exports - Allows exporting data and configurations from DQM

  • Allow AI assistant - Grants access to the AI assistant (requires the assistant to be enabled in global settings).

  • Add/edit custom fields - Allows managing custom fields on catalog objects and other entities.

  • Allow to view change history - Allows viewing audit history / change diffs on entities.

Example users & roles

The examples below show how roles can be designed for different personas, and how a user inherits the union of privileges from all roles assigned to them.

The first column lists every privilege (grouped by section, matching the role-edit dialog); a checkmark () marks privileges the role grants.

  • R1 - data steward

  • R2 - data analyst

  • R3 - data engineer

  • R4 - product owner

Privilege / role

R1

R2

R3

R4

Allowed connections

C1

C1, C2

C1, C2, C3

C3

Dashboard

Connections

Add/edit connections

Catalog

Add/edit catalog objects

Add/edit glossary terms

Add/edit business rules

Allow catalog imports

Add/edit directories

Test cases

Add/edit test cases

Add/edit test case reports

Add/edit dynamic rules

View test case results

Test suites

Add/edit test suites

Add/edit directories

Profiling

Add/edit profiling objects

Add/edit profiling rules

Allow to execute

Add/edit global variables

Allow exports

Allow AI assistant

When a user is assigned multiple roles, both their allowed connections and their privileges are unioned across those roles.

User

Roles

Explanation

U1

R4

Can only access dashboard and catalog for one specific connection. Basically a reader role for a specific data source.

U2

R1, R2

Can access databases C1, C2 and all functionality, other than editing connections and editing profilings.

U3

R2, R4

Exactly same privileges as just R2 + access to C3 database with these privileges.

U4

R1, R2, R3, R4

Can do everything but access connection editing.

U5

R1, R4

Can execute test cases against C1+C3 database (access privileges are stacked).

07 May 2026