Skip to content

Self Service Data Access

  • Streamline access to data through secure self-service data access workflows.
  • Manage access for support technicians to production databases securely and efficiently.
  • Provide just-in-time and time-based access controls that automatically expire as needed.

Learn more about Satori’s self-service data access capabilities and Schedule a demo meeting

The Problem

In most organizations, data consumers must perform a multi-step process to receive access to datasets:

  1. Access Request - Data consumers must search for the dataset they want to access, and submit an access request.
  2. Approval Flow - Access requests require an approval flow, usually involving the business unit that owns the dataset.
  3. Implementation - Approved requests are implemented by a technical team, either in the Identity and Access Management (IAM) system or the data store.

This is a slow and cumbersome process and generates a lot of overhead on the IT or data engineering teams who must respond to each ticket separately in order to implement and approve all access requests.

The Solution

Satori provides you with a quick and simple solution to this problem by leveraging automation and workflows to streamline this process. When data consumers try to access restricted Datasets with no permission, Satori allows them to trigger an approval workflow.

Access requests are reviewed by pre-defined data stewards that define the scope and level of access of each request. Once the request is approved, it is automatically implemented by Satori, allowing data consumers to query the data.


  1. Datasets can include one or more tables across any number of data stores.
  2. A Dataset can have several data stewards.
  3. Data stewards can assign permissions to users or groups.
  4. Permissions can be time limited.
  5. Permissions can be revoked automatically if unused.
  6. Users without permissions can submit an access request to data stewards.
  7. Data stewards can define which users or groups are allowed to receive access to datasets without requiring approval.
  8. Every access request, approval or rejection is audited.
  9. Additional security policies like dynamic masking can be applied in conjunction with dataset permissions.