Skip to main content

Overview

Entegrata’s access control system works hand-in-hand with our data mapping platform to secure your data. Access control data can be ingested from supported data sources into our standardized models, or you can manage new controls directly in our platform. This centralized management and observability gives you a single pane of glass view into data security across your entire data footprint, making it easy to audit permissions, troubleshoot access issues, and ensure the right people see the right data in the edges supported by Entegrata (i.e Power Bi).

Key Features

Availability and Prerequisites

Access control features require specific prerequisites to be met before they become available. This section outlines what’s needed for each surface area.

Top-Level Requirement

Production Pipeline Required: Access control only works when the “main” production pipeline exists. Below, find additional prerequisites per feature area.

Supported Entities

Access control rules (both System and Ingested) are available for the following canonical data mappings:

Client

Client entity data mappings

Matter

Matter entity data mappings

Person

Person entity data mappings

Prerequisites by Feature

Prerequisites for managing access control groups and actors:To access the Groups and Actors pages:
  • The Person entity must be mapped and deployed
To properly identify actors in your entity OBTs (One Big Tables), the Employment entity must be deployed with the Entra data source as a source that maps Entra’s userPrincipalName field to the canonical username field.

Rule Types

Available for: Client, Matter, and Person entitiesOnce prerequisites are met for an entity:
  • Create custom access rules directly in Entegrata
  • Build groups with static or dynamic membership
  • Define granular permissions for your data
  • Layer controls on top of any existing permissions
System rules provide full control and can be edited or deleted at any time.
Critical: All canonical objects default to Deny (false) permissions. After mapping data sources, you must review and adjust default permissions to ensure users have appropriate base-level access.

Core Concepts

Permission Model

The Entegrata Access Control system uses a hierarchical permission model:
  1. Default Permissions - Base-level permissions applied to all resources of an entity type
  2. Rule-Based Permissions - Specific rules that override defaults for targeted subjects and objects
  3. Permission Precedence - More specific rules take precedence over general ones

Key Terminology

Actor
concept
An individual user in the system who can be granted access permissions
Subject
concept
An actor or group that permissions are applied to (who has access)
Object/Resource
concept
The data entity or specific record being accessed (what is being accessed)
Entity
concept
A canonical data type in your Lakehouse (e.g., Client, Matter, Timekeeper)
Rule
concept
An access control policy that defines permissions for specific subjects and objects
Group
concept
A collection of actors that can be managed together for access control purposes

How Access Control Works

1

Verify Main Pipeline Exists

Ensure your main production pipeline is deployed and has completed at least one successful run. Access control features are only available after this prerequisite is met.
2

Map Data Sources to Canonical Objects

Complete data mapping configuration for Client, Matter, and Person entities. Deploy these entity mappings and ensure the main pipeline processes them successfully.
3

Review Default Permissions

Check and configure default permissions for each entity. Important: All entities default to Deny (false), so this step is critical to ensure proper base-level access.
4

Enable Access Control Ingestion (Optional)

For Aderant or Intapp Walls data sources, optionally enable access control synchronization to import existing rules and groups from these systems (requires specific entity prerequisites).
5

Create Access Groups

Organize users into groups for efficient permission management, using either static membership or dynamic filters. Requires Person entity to be deployed. For best actor identification, also map Employment with Entra for UPN-to-username mapping.
6

Define Access Rules

Create system rules to implement your access control requirements, layering custom permissions on top of defaults and any ingested rules. Requires Person entity to be deployed and run for subject data.
7

Test Permissions

Use the comprehensive testing tools to verify that permissions work as expected before rolling out to users.
8

Monitor and Adjust

Use exploration features to review access patterns, audit permissions, and refine your configuration over time.

Common Use Cases

  • Restrict matter access to assigned attorneys and staff
  • Implement ethical walls for conflict management
  • Control access to sensitive client information

Compliance Requirements

  • Enforce data residency and jurisdiction rules
  • Maintain audit trails of access permissions
  • Implement need-to-know access policies

Organizational Hierarchy

  • Grant department-level access to relevant data
  • Implement role-based access control (RBAC)
  • Manage temporary access for consultants

Best Practices

Start with Deny, Grant Explicitly: Law firms require strict data security. Begin with restrictive defaults (Deny) and explicitly grant access where needed. This ensures no accidental data exposure.
Use Groups Effectively: Create logical groups that reflect your organizational structure to simplify permission management.
Test Before Production: Always use the permission testing tools to verify access configurations before applying them to production data.
Document Your Rules: Use descriptive names and descriptions for rules to make their purpose clear to other administrators.

Next Steps

Need Help?

If you encounter issues or have questions about access control configuration: