The gist of access management in Beneath is as follows: users and services can be granted permissions on resources like tables, projects and organizations. Different resources have different permissions, like
write for tables. Additionally, projects can be marked
public, which lets anyone access their tables.
You issue and use secrets to authenticate as a user or a service from your code, notebook, command-line, or similar. User secrets are useful during development to connect to Beneath from your code. Service secrets should be used in production systems or publicly-exposed code to more strictly limit access permissions and monitor usage.
You can issue and copy a new secret from the “Secrets” tab of your profile page in the Beneath Console.
There are three types of secrets:
viewpermissions on all the resources you have access to
viewpermissions on public projects and tables on Beneath
Never share your user secrets! You should not share or expose user secrets nor use them in production systems. Use a service secret if you need a secret in a production system or if you need to expose a secret (e.g. in a shared notebook or in your frontend code).
Services are useful when deploying or publishing code that reads or writes to Beneath. You can control their access permissions, and monitor and limit their usage. Read “Services” for more details.
By default, a service cannot read any tables, and you must set all service permissions manually, including permissions for public tables (unlike users).
You can create services in the web console or using the CLI. For example, to create a service and grant read and write permissions to a table from the CLI, run (change or remove the flags depending on your use case):
beneath service create ORGANIZATION/PROJECT/NEW_SERVICE --read-quota-mb 100 --write-quota-mb 100 beneath service update-permissions ORGANIZATION/PROJECT/NEW_SERVICE ORGANIZATION/PROJECT/STREAM --read --write
You’re now ready to issue a secret for the service.
You can create secrets for services using the web console or the CLI. For example, to create a service secret from the CLI, run the following command:
beneath service issue-secret ORGANIZATION/PROJECT/SERVICE --description "YOUR SECRET DESCRIPTION"
You can now use the secret to connect to Beneath from your code. Most client libraries will automatically use your secret if you set it in the
BENEATH_SECRET environment variable (see the documentation for your client library for other ways of passing the secret).
Think carefully before sharing service secrets! If you need to expose a secret publicly (e.g. in your front-end code or in a notebook), make sure it belongs to a service with sensible usage quotas and only
read permissions. In all other cases, keep your secret very safe and do not commit it into Git.
Note: When you invite a user to your organization, you take over the full billing responsibility for the user’s activity. If you just want to grant the user access to view stuff in your organization (but not pay their bills), see Granting a user access to an organization.
First, an organization admin should send an invitation to the user (the flags designate the invitees new permissions). From the CLI, run:
beneath organization invite-member ORGANIZATION USERNAME --view --create --admin
Second, the invited user should accept the invitation, also using the CLI:
beneath organization accept-invite ORGANIZATION
Note: When you grant a user access to your organization, they remain responsible for paying the bills for their own usage on Beneath. If you also want to pay for their usage on Beneath, see Inviting a user to an organization.
Run the following command (change the flags to configure permissions):
beneath organization update-permissions ORGANIZATION USERNAME --view --create --admin
The user doesn’t have to be a part of the organization in advance.
In Beneath, user access to tables is managed at the project-level. You cannot grant a user access to only one table (however, if you need a secret with permissions for just a single table, use a service).
To add a user to a project, use the Beneath CLI to run the following command (change the flags to configure permissions):
beneath project update-permissions ORGANIZATION/PROJECT USERNAME --view --create --admin
The user doesn’t have to be a part of the same organization as you or the project to get access.