In the last chapter, we covered secondary roles, which allow users to stitch together privileges granted through different roles. This is really powerful in organizations that work cross-functionally, as well as in organizations with a large, complex RBAC system in place. We can use role inheritance in a similar way to empower our users and allow them to utilize privileges from multiple roles during the same transaction. This also means they will not need to switch between roles as frequently. By using role inheritance, ...
9. Role Inheritance
Get Snowflake Access Control: Mastering the Features for Data Privacy and Regulatory Compliance now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.