Skip to main content

Set up Starburst Enterprise

Setting up Starburst Enterprise authentication enables Atlan to securely connect to your instance and extract metadata. This process configures the necessary credentials and permissions for Atlan to discover and catalog your SQL assets (catalogs, schemas, tables, views) and data product assets (domains, data products, datasets).

Prerequisites

Before you begin, make sure you have:

  • Administrative access to your Starburst Enterprise instance or contact with your Starburst administrator
  • HTTPS enabled on the Starburst Enterprise instance (port 443 by default)
  • Built-in access control or file-based access control configured on your cluster

Set up authentication

Atlan supports two authentication methods for Starburst Enterprise. Choose the method that matches your organization's security requirements:

Use Starburst Enterprise password file authentication with username and password credentials.

  1. Create a dedicated user for Atlan in your Starburst Enterprise password file by following the password file authentication documentation. For example, create a user named atlan.

  2. Configure access control permissions for the user (see below).

  3. Click Test Authentication in the Atlan setup wizard to verify the credentials.

Configure access control

Atlan extracts metadata exclusively from INFORMATION_SCHEMA tables and the system.metadata catalog. It never queries or accesses actual user data in your tables. The permissions below reflect this least-privilege approach.

If your cluster uses built-in access control, create a dedicated role for the Atlan user and grant the minimum required privileges.

Create role

Create a custom role for the Atlan user:

CREATE ROLE atlan_metadata_reader;

Grant the role to the Atlan user:

GRANT atlan_metadata_reader TO USER atlan;

Grant table visibility

The connector queries INFORMATION_SCHEMA tables (.information_schema.schemata, .information_schema.tables, .information_schema.columns, .information_schema.views) to discover metadata. In BIAC, INFORMATION_SCHEMA only returns rows for objects the user has at least one privilege on. The SHOW privilege is the minimum privilege that makes objects visible in INFORMATION_SCHEMA without granting access to actual table data.

The grant pattern follows the format catalog.schema.table_or_view, where * is a wildcard matching all objects at that level.

To grant access to all catalogs at once:

GRANT SHOW ON TABLE *.*.* TO ROLE atlan_metadata_reader;

To grant access to specific catalogs only:

GRANT SHOW ON TABLE your_catalog.*.* TO ROLE atlan_metadata_reader;
GRANT SHOW ON TABLE another_catalog.*.* TO ROLE atlan_metadata_reader;

For details on the GRANT syntax, see the GRANT privilege documentation.

Least privilege principle enforcement

Atlan only reads metadata from INFORMATION_SCHEMA. It never runs SELECT on your data tables. The SHOW privilege makes tables visible in INFORMATION_SCHEMA and enables SHOW TABLES and SHOW CREATE TABLE, which is all the connector needs. This follows the principle of least privilege by not granting read access to actual data.

Grant system catalog access

The connector queries two tables in the system catalog:

  • system.metadata.catalogs: discovers available catalogs and their connector types
  • system.metadata.materialized_views: detects materialized views (which INFORMATION_SCHEMA misclassifies as BASE TABLE)

Grant SELECT on these specific tables:

GRANT SELECT ON TABLE system.metadata.catalogs TO ROLE atlan_metadata_reader;
GRANT SELECT ON TABLE system.metadata.materialized_views TO ROLE atlan_metadata_reader;
Third-party access control

If your cluster uses third-party access control (Apache Ranger, Immuta) instead of or alongside BIAC, you must explicitly create a policy granting access to system.metadata, system.jdbc, and system.runtime.

Grant domain and data product privileges

The connector calls the data products API to discover domains, data products, datasets, and dataset columns. In BIAC, domains and data products share a single set of entity privileges: SHOW, ALTER, CREATE, DROP, and PUBLISH. The connector only needs SHOW.

Grant SHOW on all domains and data products:

GRANT SHOW ON DATA PRODUCTS TO ROLE atlan_metadata_reader;

Or grant SHOW on a specific domain and all its data products:

GRANT SHOW ON DOMAIN your_domain TO ROLE atlan_metadata_reader;

No ALTER, CREATE, DROP, or PUBLISH privileges are needed—Atlan only reads domain and data product metadata.

For the full list of data product privileges, see the BIAC privileges documentation.

Verify permissions

After configuring access control, verify the Atlan user has the required permissions by running the following queries as the Atlan user:

-- Verify catalog discovery
SELECT catalog_name, connector_name FROM system.metadata.catalogs;

-- Verify INFORMATION_SCHEMA access (for each target catalog)
SELECT table_schema, table_name, table_type
FROM your_catalog.information_schema.tables
WHERE table_schema != 'information_schema'
LIMIT 10;

-- Verify column metadata access (for each target catalog)
SELECT table_schema, table_name, column_name, data_type
FROM your_catalog.information_schema.columns
WHERE table_schema != 'information_schema'
LIMIT 10;

-- Verify materialized view detection
SELECT catalog_name, schema_name, name
FROM system.metadata.materialized_views
LIMIT 10;

To verify data products access, test the following endpoint with the Atlan user's credentials:

curl -u atlan:password https://<your-starburst-host>/api/v1/dataProduct/domains \
-H "X-Trino-Role: system=ROLE{atlan_metadata_reader}"

Create Atlan API token

The connector requires an Atlan API token to interact with the Atlan platform during workflow execution. Enter this token in the Atlan API Token field of the credential form when configuring the crawler.

Why is API token needed?

The connector uses the Atlan API to publish extracted metadata back into your Atlan tenant. Specifically, the token is used to:

  • Run Asset Import workflows: Submit and monitor the import of Data Domains and Data Products into Atlan.
  • Search existing assets: Look up Data Domain and Data Product qualified names to establish parent-child relationships.
  • Update Data Products: Link Data Products to their parent Data Domains after import.
  • Manage Custom Metadata: Check for and autocreate the "Starburst Data Product Ratings" Custom Metadata set and its color-coded badges on first run.

Required permissions

The token must be created by a user with the Admin role in Atlan. By default, API tokens inherit admin-level API privileges (excluding connection admin), which covers all operations the connector performs:

OperationAtlan capability
Submit and monitor Asset Import workflowsWorkflow execution
Search Data Domains and Data Products by nameAsset read
Update Data Products with parent domain linksAsset write
Check and create Custom Metadata type definitionsTypedef read and write
Create Badge assets for source rating indicatorsAsset write (global governance)
Admin role required

A token created by a non-Admin user won't have sufficient privileges to run Asset Import workflows or create Custom Metadata definitions. See the FAQ for details on what happens when the token lacks the required permissions.

Create token

Follow the steps in API tokens to create a token. When configuring the token:

  1. Use a descriptive name, for example starburst-enterprise-connector.
  2. No personas are required. The connector only needs the default admin-level API privileges that every token inherits.
  3. Copy the token immediately after creation and store it securely. You can't retrieve it later.

Next steps