This page received its last significant update on 2/20/2020
The most up to date information can be found on the homepage, as well as any pages that don't show this warning.
This feature is experimental and subject to change.
In the current architecture of Meltano, authorization is technically always enabled because every installation of Meltano comes with a single user that has administrative rights to everything. In other words, there are no restrictions as far as what the user can do and there is no difference between users who are logged in to Meltano.
While this functionality is still in alpha, you can enable RBAC by setting the environment variable
# Set in your .env file export MELTANO_AUTHENTICATION=true
Now you can start your Meltano installation with:
You should see the following login page whenever you open Meltano.
There are two primary ways to authenticate:
Meltano uses a RBAC (role-based access control) to expose resources to the current authenticated user.
In this system, any permission is assigned a "Context" which represent a pattern upon which resources will be tested for. Currently, the context tests for the
name attribute of resources.
Here's an example, let's say we have a
finance.month_over_month and a
Permission with a context
finance.*, then this
Design would be available to all users that have any role having this
This system allows you to create any kind of hierarchical system: