LogoLogo
Home
  • Verb Documentation
  • Release Notes
  • Environment Settings
    • Authentication
      • Authentication Endpoint
  • Data Sources
    • Ingestion Methods
    • Table Sync Intervals
    • Data Source Integrations
      • Network Permissions
      • Microsoft SQL Server
      • PostgreSQL
      • MongoDB
      • Snowflake
      • Elasticsearch
      • DynamoDB
      • Google BigQuery
      • Firebase Cloud Firestore
      • Supabase
      • Cloud Files
      • Flat Files
    • Data Synchronization
      • Synchronization Methods
        • Full Synchronization
        • Incremental Synchronization
        • Change Tracking
        • Change Data Capture
      • Synchronization Intervals
      • Synchronization Status
        • Pausing and Resuming
      • Synchronization History
      • Schema Changes
      • Row Filtering
      • Schemaless & NoSQL
      • Managing Connections
      • Troubleshooting
  • Models
    • What is a Model
      • Elements of a Model
      • Model Management
    • Building a Model
      • Add/Remove Data
      • Relationships
      • Row-Level Security
      • Transformations
    • Advanced Model Information
      • Database Keys
      • Unstructured Data
      • Publishing Updates
      • Troubleshooting
      • Automatic Modeling
  • Data Transformations
    • What is a Transformation
      • Elements of a Transformation
      • Transformation Management
    • Building Transformations
      • Creating Transformations
      • Configure Transformation Steps
      • Transformation Steps
        • Calculator
        • Manipulate Text
        • Map Values
        • Remove Duplicates
        • Date Operation
        • Select Columns
        • Change Type
        • Group Data
        • Filter Data
        • Join Data
        • Append Rows
        • Pivot Data
        • Rank Data
        • Window Data
      • Complete and Publish
  • Collections
    • What is a Collection
      • Elements of a Collection
    • Building Collections
    • API Collections
      • Building API Collections
        • Connect Data Sources
        • Data Model
        • Select Data
        • Authentication and Security
        • Data Access API Keys
        • Data Access API Documentation
      • API Collection Versions
    • Advanced Collection Options
      • Time Zones
      • Currency Symbols
  • Tiles
    • What is a Tile
      • Elements of a Tile
    • Tile Management
      • Tile Data
    • Tile Actions
    • Custom Date Formats
    • Currency Conversion
  • Design Themes
    • What is a Design Theme
    • General Theme Settings
    • Data Visualization Settings
  • Account Settings
    • Integrations
      • Slack
  • Legal
    • Terms of Use
    • Privacy Policy
    • Subscription Agreement Terms
    • Subscription Agreement
    • Data Processing Addendum
Powered by GitBook
On this page
  • Authentication
  • Row Level Security

Was this helpful?

  1. Collections
  2. API Collections
  3. Building API Collections

Authentication and Security

Securing your Data Access API

PreviousSelect DataNextData Access API Keys

Last updated 4 years ago

Was this helpful?

Authentication

If you are only using Verb for API collections please select “API Collections Only” so that the authentication method will only require response mapping values that will be used to define Data Access Key parameters and in the Row Level Security configuration.

The Response Mapping Properties only need to contain the information that will be used to segment data. For example, Most Verb user’s use values such as Organization, Role and/or User ID.

You will select the Property Type to configure the values allowed when creating a Data Access Key.

If you are using Verb for both Visual and API Collections please refer to the Authentication Endpoint documentation.

Row Level Security

You will set the segmentation rules by using the row level security configuration on any table(s) in your model. With the relationship paths drawn, row level security rules will apply from one table across the model to all tables that it is related to.

Using the Response Mapping Properties set on the authentication method you'll be able to create as simple or complex row level security rules necessary.

To create row level security rules, open a table options panel and select Row Level Security. Here is where you set the rules.

Authentication
A simple row level security configuration