Skip to main content

Authentication

Dremio ensures secure access and protects sensitive data across various applications. You can easily configure and integrate with various third-party authentication services to increase security and centralize your security controls. Depending on your organization's needs, any one or many of the following may be used in tandem for multi-tiered protection:

  • User Management - Create and manage Dremio users

  • Identity Providers - Configure Identity Providers (IdPs) to authenticate users accessing Dremio Cloud

  • SCIM - Manage users and roles in Dremio Cloud with System for Cross-domain Identity Management (SCIM)

  • Application Authentication - Configure BI tool SSO, OAuth apps, and external token providers

  • Personal Access Tokens - Use Dremio Personal Access Tokens (PATs) for logging in with REST APIs or ODBC/JDBC when SSO is implemented

As the Dremio Cloud Shared Responsibility Model outlines, identity management is a shared responsibility between Dremio and you. The Shared Responsibility Model lays out Dremio's responsibilities for providing Dremio operations and identity management and your responsibilities for identity management. For more information, download the PDF guide of the Dremio Cloud Shared Responsibility Model.