tencent cloud

Tencent Cloud WeData

Release Notes
Dynamic Release Record (2026)
Product Introduction
Product Overview
Product Advantages
Product Architecture
Product Features
Application Scenarios
Purchase Guide
Billing Overview
Product Version Purchase Instructions
Execute Resource Purchase Description
Billing Modes
Overdue Policy
Refund
Preparations
Overview of Account and Permission Management
Add allowlist /security groups (Optional)
Sign in to WeData with Microsoft Entra ID (Azure AD) Single Sign-On (SSO)
Operation Guide
Console Operation
Project Management
Data Integration
Studio
Data Development
Data Analysis
Data Science
Data Governance (with Unity Semantics)
API Documentation
History
Introduction
API Category
Making API Requests
Smart Ops Related Interfaces
Project Management APIs
Resource Group APIs
Data Development APIs
Data Asset - Data Dictionary APIs
Data Development APIs
Ops Center APIs
Data Operations Related Interfaces
Data Exploration APIs
Asset APIs
Metadata Related Interfaces
Task Operations APIs
Data Security APIs
Instance Operation and Maintenance Related Interfaces
Data Map and Data Dictionary APIs
Data Quality Related Interfaces
DataInLong APIs
Platform Management APIs
Data Source Management APIs
Data Quality APIs
Platform Management APIs
Asset Data APIs
Data Source Management APIs
Data Types
Error Codes
WeData API 2025-08-06
Service Level Agreements
Related Agreement
Privacy Policy
Data Processing And Security Agreement
Contact Us
Glossary

Tables I Manage

PDF
Modo Foco
Tamanho da Fonte
Última atualização: 2026-03-13 18:57:02
Log in to Tencent Cloud and enter the WeData Console. Select a project to access the Data Security > Table Managed by Me page.
Note:
User permissions configured through policies have a higher priority than database/table permissions authorized in permission audit, my permission functionality, and application approval. Since policy management is modified at the Ranger engine layer and has higher permissions than individual user authorization and applications, the user's database table authorization information will be overwritten. Specifically, when the project administrator role configures a user's database table access permissions in policy management, the corresponding user's database/table permissions obtained through others' authorization or application approval in "Tables I Applied For" or "Table Managed by Me" will be overwritten and no longer display.

EMR

Permission policy configuration based on the underlying engine Ranger is only supported for operation management by root accounts or CAM-authorized sub-accounts.

Tables/Databases Managed by Me

Show the database/table information that the current logged-in user can grant to others, and perform "grant" and view "permission details" operations.
Role
Table owner: Show database table information where the current logged-in user acts as the table owner.
Project administrator: Show database table information owned by the project administrator role.


Authorization

Grant permissions on tables or fields to individuals or projects.



Ajuda e Suporte

Esta página foi útil?

comentários