The chat responses are generated using Generative AI technology for intuitive search and may not be entirely accurate. They are not intended as professional advice. For full details, including our use rights, privacy practices and potential export control restrictions, please refer to our Generative AI Service Terms of Use and Generative AI Service Privacy Information. As this is a test version, please let us know if something irritating comes up. Like you get recommended a chocolate fudge ice cream instead of an energy managing application. If that occurs, please use the feedback button in our contact form!
Skip to content
Insights Hub and Industrial IoT

Insights Hub drives smart manufacturing through the industrial Internet of Things. Gain actionable insights with asset and operational data and improve your processes.

Understanding Policy effects¶

Once the policies are in force, access restrictions are applied to the resources (Assets, Files, Events, Timeseries data) through various services and applications.

Prerequisites¶

  • SDS should be provisioned for the environment.
  • Toggle switch for "Resource Access Management" in the "Settings" application should be turned ON.

Policy effects¶

By activating the policies, application and service users (apart from Tenant Administrators, Data Lake Managers and Techusers - without Interactive User Impersonation) will be allowed controlled access as defined in the Policy, while accessing the resources as mentioned above. The nature of access restrictions depends on which fine-grained actions are specified in policy definitions.

The list of APIs from various services that support fine-grained access management are listed in Services & Required Actions.

Note

After creating/updating an "active" policy, it takes up to 5 minutes to reflect this change for the access checks in Insights Hub platform services. Similarly, any changes in Usergroup operations (like move, rename, add/remove users, etc.) also takes up to 5 minutes to take effect.

Note

When creating/updating a policy, the validations applied to policy fields will vary based on the policy's active or inactive status. If a policy is marked as active, comprehensive validations will be performed, whereas if a policy is marked as inactive, most validations will be skipped/bypassed.

*[SDS]: Secure Data Sharing