Roles, permission sets, and model sets are used together to manage what users can do and what they can see. The Roles page in the Users section of the Admin panel lets you view, configure, and assign roles, permission sets, and model sets.
You can search for specific roles, permission sets, and model sets by entering a search term into the search box in the upper right and pressing Enter.
Definitions
- A role defines the privileges that a user or group will have for a specific set of models in Looker. You create a role by combining one permission set with one model set.
- A permission set defines what a user or group can do. You select a combination of permissions that you want to assign to a user or group. It must be used as part of a role to have any effect.
- A model set defines what data and LookML fields a user or group can see. You select a combination of LookML models to which a user or group should have access. It must be used as part of a role to have any effect.
Assigning roles
A role is a combination of one permission set and one model set. It’s a common convention to name roles after types of people or groups of people in your organization — administrator, Looker developer, Finance team — although you can certainly follow your own naming conventions.
A user can have more than one role in Looker. This can be useful when you have users who play multiple roles in your company or when you want to create complex systems of access to your models.
Adding users to multiple roles has important implications for how their permissions are applied. For example, if you allow someone to
save_content
(an instance-wide permission) in only one of their roles, they will be allowed to save content from any model. In contrast, if you allow someone toaccess_data
(a model-specific permission) in only one of their roles, they can access only the models that are specified in that role.Multiple roles can also cause unexpected effects on dashboards. See the Managing business user features documentation page for information about dashboards and multiple roles.
To create a role, click the New Role button at the top of the Roles page. Looker will display a page where you can enter a name for the role, choose a permission set, and choose a model set. You will also be able to assign the role to a set of users or groups. Once you’ve configured the role as desired, click the New Role button at the bottom of the page.
After a role has been created, you can edit it by clicking the Edit button to the right of the role on the Roles page. This will take you to that role’s page, where you can:
- Rename the role
- Assign or edit the permission set associated with that role
- Assign a model set to the role
- Assign the role to users and/or groups
To delete a role, click the Delete button to the right of the role on the Roles page.
Default roles
For new instances, Looker creates the following default roles, each of which includes a default permission set of the same name:
- Admin
- Developer
- User
- Viewer
Permission sets
A permission set defines what a user or group can do. Admins can use Looker’s default permission sets or create original permission sets, keeping in mind permission dependencies.
All the available permissions, and their types, are discussed in more detail below.
Default permission sets
For new installations, Looker includes several default permission sets that you can start with:
You’ll see these permission sets appear as options when you create a new role. If you select one of these permission sets, Looker will display the list of permissions it includes.
The Admin permission set cannot be edited or deleted, and cannot be assigned to a role. It is assigned only to the Admin role, which also cannot be edited or deleted. The only way to grant the Admin permission set to a user or group is to add the Admin role to that user or group.
Creating permission sets
To create a permission set, click the New Permission Set button at the top of the Roles page. Looker will display a page where you can enter a name for the permission set and select the permissions it should include. Once you’ve configured the set as desired, click the New Permission Set button at the bottom of the page.
After a permission set has been created, you can edit or delete it by clicking the Edit or Delete buttons to the right of the permission set on the Roles page.
Permissions and dependencies
Some permissions depend on others to work properly. For example, it makes sense that someone who wants to develop in LookML must first be able to see LookML.
When you create a permission set you’ll see the available permissions in an indented list. If a privilege is indented under another (parent) privilege, you must select the parent privilege first. Consider this example:
In this case Looker uses indentation to indicate that:
- The
access_data
privilege can be selected at any time. - The
see_lookml_dashboards
andsee_looks
privileges require theaccess_data
privilege to be selected first. - The
see_user_dashboards
privilege depends on thesee_looks
privilege, which in turn depends onaccess_data
privilege.
You cannot select a child privilege without first selecting its parent.
Permissions and Looker licenses
Looker licenses classify users into three types:
- Developer (Admin)
- Standard (Creator)
- Viewer
The permissions granted to a user determine how that user is classified under the Looker license:
A user is classified as a Developer (Admin) user if they have the Admin default role, or at least one of the following permissions:
A user is classified as a Standard (Creator) user if they have none of the Developer (Admin) permissions, but at least one of the following permissions:
A user is classified as a Viewer if they have the
access_data
permission, but none of the Developer (Admin) permissions and none of the Standard (Creator) permissions.
Permissions list
The
develop
andsee_lookml
permissions interact with model sets in a potentially unexpected way. In Looker’s IDE, a single project can contain multiple model files. If you assigndevelop
orsee_lookml
permissions to a user, and you’ve allowed that user to see any model that is a part of a project, they will be able to develop or see the LookML for all models in that project. However, they will still not be able to query models that you have not allowed.
Permissions can be classified as one of three types:
- Model Specific: This type of permission is applied only to the model sets that are part of the same role. This permission is applied to individual models or model sets, rather than across the entire Looker instance.
- Connection Specific: This type of permission is applied at the connection level. A user with this type of permission will see content on pages in the Admin panel that uses a connection associated with a model to which they have data access, even if that connection is used with another model to which they do not have data access.
- Instance Wide: This type of permission applies to the Looker instance as a whole and has three types:
- nn = No content, No menu: These permissions allow users to perform certain functions across the entire Looker instance, but do not allow users to access content based on models not included in their role’s model set.
- cn = Content, No menu: These permissions allow users to access content and query information across the entire Looker instance — even for content and queries based on models not included in their role’s model set.
- cm = Content, Menu: These permissions may expose parts of the Admin menu to non-admin users and allow users to see information about content and queries based on models not included in their role’s model set.
The following list describes all the permissions that are available in Looker, in the order in which they appear on the New Permission Set page in the Admin section:
Permission | Depends On | Type | Definition |
---|---|---|---|
access_data |
None | Model Specific | Users can access data from Looker, but only the data that admins specify. This permission is necessary for almost all Looker functions. A user with this permission, if given access to any model in a given project, can access any file in the Data section of that project (such as a JSON custom map file). |
see_lookml_ dashboards |
access_data |
Model Specific | Users can see the LookML Dashboards folder, which includes all LookML dashboards. Users must have explore permission for any relevant models to explore those dashboards. Users that also have the develop permission can create LookML dashboards. |
see_looks |
access_data |
Model Specific | Users can see saved Looks (but not dashboards) within folders. Users must have explore permission for any relevant models to explore those Looks. Users will also need the View content access level to see Looks in folders. |
see_user_ dashboards |
see_looks |
Model Specific | Users can view user-defined dashboards in folders but must have explore permission for any relevant models to explore those dashboards. Users also need View content access to see dashboards in folders. Users who also have both the save_content permission and the Manage Access, Edit content access to a folder can create user-defined dashboards in that folder. |
explore |
see_looks |
Model Specific | Users can access and use the Explore page to generate reports. Without this permission, users can only view saved dashboards (if see_lookml_dashboards or see_user_dashboards has been granted). |
create_table_ calculations |
explore |
Instance Wide nn | Users can view, edit, or add table calculations; users with only the explore permission can only view table calculations. |
create_custom_ fields |
explore |
Instance Wide nn | ADDED22.4 Users can view, edit, or add custom fields; users with only the explore permission can only view custom fields. |
save_content |
see_looks |
Instance Wide nn | Users can save and edit Looks and dashboards. Users must have explore permission for any relevant models to explore from those Looks and dashboards. Users must have download_with_limit and/or download_without_limit permissions to download the content. |
create_public_ looks |
save_content |
Model Specific | Users can mark a saved Look as public, which will then generate URLs granting access to that report without authentication. |
download_with_ limit |
see_looks |
Model Specific | Users can download queries (as CSV, Excel, and other formats) but must specify a row limit of 5,000 or fewer to avoid memory problems from large downloads on the instance. |
download_without_ limit |
see_looks |
Model Specific | The same as download_with_limit , but does not require the user to specify a row limit. Downloading all results for some types of queries may require substantial memory, potentially causing performance issues or even crashing the Looker instance. |
schedule_look_ emails |
see_looks |
Model Specific | Users can deliver any Looks, dashboards, and queries with visualizations to which they have data access to email. Users can schedule delivery to occur after a datagroup has been triggered, has managed the cache, and has rebuilt relevant PDTs. To send or schedule System Activity dashboards, users must have access to all models. Users who also have create_alerts permissions can send email alert notifications. If no email domains are specified in the Email domain allowlist on the Settings page of the Admin panel, the user can deliver to any email domain. There are additional considerations for embed users. This permission is applied to individual models or model sets, rather than across the entire Looker instance. |
schedule_external_ look_emails |
schedule_look_ emails |
Model Specific | The same as schedule_look_emails . If any email domains are specified in the Email domain allowlist on the Settings page of the Admin panel, the user can deliver to any email domain.Users who also have create_alerts permissions can set alerts that send notifications to emails with any domain.There are additional considerations for embed users. This permission is applied to individual models or model sets, rather than across the entire Looker instance. |
create_alerts |
see_looks |
Instance Wide nn | From the dashboard tile, users can create, duplicate, and delete their own alerts; and can see and duplicate alerts marked Public by other users. The user must be signed in to Slack to see dashboard tile alerts that send Slack notifications. Users can view, edit, disable, and enable alerts that they own on the Manage Alerts user page. |
follow_alerts |
see_looks |
Instance Wide nn | Users can view and follow alerts. View the alerts they have followed or for which they are listed as a recipient from the Manage Alerts user page. |
send_to_s3 |
see_looks |
Model Specific | Users can deliver any Looks, dashboards, and queries with visualizations to which they have data access to an Amazon S3 bucket. Users can schedule delivery to occur after a datagroup has been triggered, has managed the cache, and has rebuilt relevant PDTs. This permission is applied to individual models or model sets, rather than across the entire Looker instance. |
send_to_sftp |
see_looks |
Model Specific | Users can deliver any Looks, dashboards, and queries with visualizations to which they have data access to an SFTP server. Users can schedule delivery to occur after a datagroup has been triggered, has managed the cache, and has rebuilt relevant PDTs. This permission is applied to individual models or model sets, rather than across the entire Looker instance. |
send_outgoing_ webhook |
see_looks |
Model Specific | Users can deliver any Looks, dashboards, and queries with visualizations to which they have data access to a webhook. Users can schedule delivery to occur after a datagroup has been triggered, has managed the cache, and has rebuilt relevant PDTs. This permission is applied to individual models or model sets, rather than across the entire Looker instance. |
send_to_ integration |
see_looks |
Model Specific | Users can deliver any Looks, dashboards, and queries with visualizations to which they have data access to the third-party services integrated with Looker via the Looker Action Hub. If using custom actions with user attributes, users must have this permission and have a non-null and valid user attribute value for the specified user attribute to deliver Looker content to that action destination. This permission is not related to data actions. Users can schedule delivery to occur after a datagroup has been triggered, has managed the cache, and has rebuilt relevant PDTs. This permission is applied to individual models or model sets, rather than across the entire Looker instance. |
see_sql |
see_looks |
Model Specific | Users can access the SQL tab while exploring and any SQL errors caused by their queries. |
see_lookml |
see_looks |
Model Specific | Users have read-only access to LookML. Users must have this permission to see the Go to LookML link in the Admin panel. If you want a user to be able to edit LookML you must also grant them the develop permission. This permission interacts with model sets in a potentially unexpected way, as described in the note at the beginning of the Permission list section. |
develop |
see_lookml |
Model Specific | Users can make local changes to LookML but will not let them make those changes available to everyone unless they also have the deploy permission. This permission interacts with model sets in a potentially unexpected way, as described in the note at the beginning of the Permission list section.This permission is required to see the Chat option in the Help menu, and to see metadata in the Looker IDE. Users also need this permission to access the Rebuild Derived Tables & Run option in the Explore gear menu. Note that this is not model-specific, so if a user has this permission in one model, they will have access to Rebuild Derived Tables & Run in all models. |
deploy |
develop |
Instance Wide nn | Users can push their local LookML changes to production so that those changes become available to everyone. |
support_access_toggle |
develop |
Instance Wide nn | Users can enable or disable access by Looker analysts to your Looker instance. |
use_sql_runner |
see_lookml |
Model Specific | Users can use SQL Runner to run raw SQL against their allowed connections. |
clear_cache_ refresh |
access_data |
Model Specific | Users can clear cache and refresh internal and embedded dashboards, legacy dashboards, dashboard tiles, Looks, and Explores. The Clear cache and refresh permission Labs feature first must be enabled for this permission to be enabled. The clear_cache_refresh permission is automatically added to any pre-existing permission sets that contain any of the following permissions: see_user_dashboards , see_lookml_dashboards , or explore . The clear_cache_refresh permission is not automatically applied to any embedded roles. |
see_drill_ overlay |
access_data |
Model Specific | Users can see the results of drilling into a dashboard tile but cannot explore those results. If explore is granted, this permission is also automatically granted (even if it isn’t checked). Users must also have explore permissions to download drill results in PNG format. |
manage_spaces |
None | Instance Wide cn | Users can create, edit, move, and delete folders. Users will also need the Manage Access, Edit content access permission. |
manage_homepage |
None | Instance Wide nn | Users can edit and add content to the sidebar that all Looker users see on the pre-built Looker homepage. |
manage_models |
None | Instance Wide cn | Each LookML model is mapped to a specific set of database connections on the Manage LookML Projects page. With this permission, users can configure these mappings and create new projects. Non-admin users who are granted this permission will have access to all connections that are allowed by the models to which they have access. |
create_prefetches |
None | Instance Wide | Allows API calls to the prefetch API endpoint. Prefetching is strongly discouraged. We recommend using datagroups instead. |
login_special_ email |
None | Instance Wide | Users can log in with traditional email/password credentials, even if other login mechanisms (such as Google, LDAP, or SAML) have been enabled on your instance. This can be useful for consultants or others who may not be a part of your normal authentication system. |
embed_browse_spaces |
None | Instance Wide nn | Enables the content browser for single sign-on (SSO) embeds. If you are using SSO embeds you should grant this permission to users who have the save_content permission. |
embed_save_shared_space |
None | Instance Wide | ADDED21.4 Allows user with the save_content permission to save content to the organization’s Shared folder, if there is one. Users who have the save_content permission but not the embed_save_shared_space permission will only have the option to save content to their personal embed folder. |
see_alerts |
None | Instance Wide cm | ADDED21.16 Users can access the Alerts and Alert History pages in the Admin section, allowing users to see all alerts on a Looker instance. Users can view, follow, edit, self-assign, and disable alerts that are owned by other users from the Alerts admin page. Users must have permissions to access the alert’s underlying content to view or explore from the alert’s visualization (in the Alert Details page) or to navigate to its dashboard. This permission does not grant users the ability to view, create, follow, or delete alerts from the dashboard tile. |
see_queries |
None | Instance Wide cm | Users can see the Queries page in the Admin section of Looker. This privilege does not give a user the ability to terminate a query on the Queries page. |
see_logs |
None | Instance Wide cm | Users can see the Log page in the Admin section of Looker. |
see_users |
None | Instance Wide cm | Users can see the Users page (but not the Groups page) in the Admin section of Looker. This privilege does not give a user the ability to create new users, see or create API credentials, reset passwords, or otherwise modify users or privileges. A user granted this permission can see all users in all groups on an instance, even on a closed system. A user can see all group names and all role names, which some companies may consider sensitive. |
sudo |
see_users |
Instance Wide cm | Users can sudo (in other words, act as and temporarily inherit the permissions of) another user by clicking the Sudo button on the Users page. The sudo permission does not allow a non-admin to sudo as an admin, but a non-admin could potentially escalate their privileges by using sudo, so exercise caution. |
see_schedules |
None | Instance Wide cm | Users can see the Schedules and Schedule History pages from the Admin panel in Looker. This privilege does not give a user the ability to reassign, edit, or delete other users’ schedules on the Schedules and Schedule History pages. |
see_pdts |
None | Connection Specific | Users can see the Persistent Derived Tables page in the Admin section of Looker and view information about PDTs from projects that use any connection associated with models for which they have data access. ADDED21.18 This permission is included in the Developer default permission set for new Looker installations. ADDED6.22 This permission is applied to connections to which users have data access, rather than across the entire Looker instance or to individual models or model sets. |
see_datagroups |
None | Model Specific | Users can see the Datagroups page in the Admin section of Looker. Users can see connection names, model names, and other information about datagroups defined in a model for which they have data access. ADDED7.8 This permission is applied to individual models or model sets, rather than across the entire Looker instance or to connections. |
update_datagroups |
see_datagroups |
Model Specific | Users can trigger a datagroup, or reset its cache, via the Datagroups page in the Admin section of Looker. Like users with the see_datagroups permission, users with update_datagroups can see datagroups defined in projects that use a model for which they have data access.ADDED7.14 This permission is applied to individual models or model sets, rather than across the entire Looker instance or to connections. |
see_system_activity |
None | Instance Wide cm | Users can access the System Activity Explores and dashboards and the internal i__looker database to view usage, history, and other metadata about a Looker instance. |
mobile_app_access |
None | Instance Wide nn | ADDED21.16 Users can sign in to your instance on a mobile device using the Looker mobile app. For users to be able to sign in to the Looker mobile app, the Mobile Application Access option in the General Settings page in the Admin section of Looker first must be enabled. The mobile_app_access permission can be added to a new or existing permission set, and it is part of all of Looker’s default permission sets. |
Model sets
A model set defines what data and LookML fields a user or group can see. Each set is a list of LookML models to which a user or group should have access. You can think of a model set as performing two functions:
- A model set controls which models in your LookML the permissions apply to (if those permissions are model specific).
- A model set limits what data and LookML fields a user can see, because each model is connected to a specific database connection and contains certain LookML fields.
Creating a model set
To create a model set:
Click the New Model Set button at the top of the Roles page.
Looker displays the New Model Set page. Enter a name for the new model set.
Select the model or models that should be included in the new model set.
Click the New Model Set button at the bottom of the page. The new model set will appear on the Roles page.
Models that are included in pending projects appear in the Models list on the New Model Set and Edit Model Set pages.Deleting or renaming a model will not change any model sets that include that model. When a model is removed or renamed, we recommend that Looker admins also remove that model’s name from any associated model sets, using the Edit Model Set page. Removing a deleted model’s name from a model set prevents a new model with the same name from unintentionally being included in that model set.
To learn more about models, see the Model parameters documentation page.
Creating multiple models and model sets
As an example of using multiple model sets to limit access to data, imagine you have two teams, Marketing and Support. These two teams should not have access to the entire model. You can create two different models, thelook_marketing
and thelook_support
, that include only the views and fields that are appropriate for their respective teams:
Then, create a model set for each team and grant access to the appropriate model:
Next, create a new role for that group of users and limit their model set to one you just created:
Editing a model set
After a model set has been created, to edit it:
On the Roles page, click the Edit button to the right of the model set you want to edit.
Looker displays the Edit Model Set page. If desired, enter a new name for the model set.
Add or remove any models from the model set.
Click the Update Model Set button at the bottom of the page.
Models that are included in pending projects appear in the Models list on the New Model Set and Edit Model Set pages.Deleting or renaming a model will not change any model sets that include that model. When a model is removed or renamed, we recommend that Looker admins also remove that model’s name from any associated model sets, using the Edit Model Set page. Removing a deleted model’s name from a model set prevents a new model with the same name from unintentionally being included in that model set.
Deleting a model set
To delete a model set, on the Roles page, click Delete to the right of the model set you want to delete: