© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
J. M. LarsonSnowflake Access Controlhttps://doi.org/10.1007/978-1-4842-8038-6_9

9. Role Inheritance

Jessica Megan Larson1  
(1)
Oakland, CA, USA
 

In the last chapter, we covered secondary roles, which allow users to stitch together privileges granted through different roles. This is really powerful in organizations that work cross-functionally, as well as in organizations with a large, complex RBAC system in place. We can use role inheritance in a similar way to empower our users and allow them to utilize privileges from multiple roles during the same transaction. This also means they will not need to switch between roles as frequently. By using role inheritance, ...

Get Snowflake Access Control: Mastering the Features for Data Privacy and Regulatory Compliance now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.