Understand groups and privileges

Before people can sign in and use ThoughtSpot, you need to create a username, a password, and a membership in one or more groups for them.

This page describes manual creation of users, groups, and privileges, but you can also manage users through SAML.

Privileges and groups

Privileges determine what kinds of actions users are allowed to do. You assign privileges to groups. Then, you create users and assign them to groups. This is how you grant users access to different capabilities in ThoughtSpot.

Each group includes a set of privileges for its users. The privileges a group has determine the actions that its members are allowed to do. If a user belongs to more than one group, they will have the highest level of the privileges from all the groups they belong to. Plan your groups so that you can use them to assign a common set of privileges to multiple users. Good planning will pay off in ease of administration and a better search experience.

There is a default group called All, which includes every user in ThoughtSpot. When you create a new user, they will be added to the All group automatically. You cannot delete the All group or remove members from it. Only users with either the Can administer ThoughtSpot or Can share with all users privilege can share an object with the All group.

You can also have a hierarchy of groups. That is, groups can belong to (that is, be children of) other groups. When using group hierarchies, permissions are inherited from the parent group. So if you’re a member of a sub-group, you would automatically have the privileges of the parent group.

List of privileges

Here are the different privileges, and the capabilities they enable:

Can administer ThoughtSpot

Can manage users and groups and has view and edit access to all data. Users with this privilege can also download a saved Answer.

Can administer Org

This privilege is only available if your organization is using multi-tenancy with Orgs. Can manage users and groups and has view and edit access to all data. Users with this privilege can also download a saved Answer. If a user has this privilege in the Primary Org, they are also a cluster administrator, and can view and manage users, groups, and data for all Orgs across the cluster. If a user has this privilege in any other Org, they are only an Org administrator, and can only view and manage users, groups, and data for their specific Org(s). Refer to Cluster administrators and Org administrators for more information.

Can upload user data

Can upload their own data from the application’s Data page using Actions > Upload data.

This privilege is only available to Free Trial and Team Edition users.
Can download data

Can download data from search results and Liveboards.

Can share with all users

Can see the names of and share with users outside of the groups the user belongs to. Members of groups with this privilege can also share with groups marked as NOT SHAREABLE.

Can manage data

Can create connections. To view or edit other people’s connections, you must have the Can administer ThoughtSpot privilege.

Can create Worksheets and views. To edit a Worksheet or a view created by another user, you must have the Edit permission on that object, and it must be shared with you.

Can create SQL views.

Can manage sync

Can use ThoughtSpot Sync to set up secure pipelines to external business apps and sync data. Note that users with admin privileges see all pipelines and syncs created by their team through the Sync tab in the Data Workspace, while users without admin privileges see only the syncs and pipelines they personally create.

Can use Sage

Users with this privilege can use the Early Access ThoughtSpot Sage features. These features must first be enabled by your administrator. For more information about Early Access features, see Early Access features. These features include Sage search, AI-suggested searches, and Contextual change analysis. You do not need this privilege for the AI-generated Worksheet synonyms feature.

Can manage catalog

Users with this privilege can set up or edit a connection to a catalog. User setting up the catalog connection can also configure which fields to display or hide on the column and table level knowledge cards.

Can schedule for others

Can create Liveboard schedules for other users and groups.

If a user previously had Can schedule for others privileges and the permission was removed, their existing schedules would continue to send as before. As owners of a Liveboard schedule, they could delete the schedule, but could not add or remove existing users.

Has SpotIQ privilege

Can use the SpotIQ feature.

If this privilege is not enabled for the user, they can still see "Did you know" SpotIQ insights on the ThoughtSpot home page.

Can administer and bypass RLS

Users in groups with this privilege (directly or through group inheritance):

  • Are exempt from row-level security (RLS) rules.

  • Can add/edit/delete existing RLS rules.

  • Can check or uncheck Bypass RLS on a Worksheet.

Your installation configuration may enable or disable the availability of this privilege. By default, it is enabled. Administrators or groups with the privilege Can administer ThoughtSpot can grant this privilege.

Has Developer privilege

Can access and use the ThoughtSpot Developer Portal to explore the ThoughtSpot APIs and developer tools, and build web applications with ThoughtSpot content.

Privileges are additive, meaning that if a user belongs to more than one group, they will have the highest level of privileges from among the groups they are a member of. They are also inherited from the parent, so that a sub-group gets all the same privileges of its parent, all the way up the group hierarchy.

If you add the privilege Has administration privileges to a group, note that all users in that group will be able to see all the data in ThoughtSpot. Administrators can see all data sources, and Row-level security does not apply to them.

Permissions to see and edit tables, Worksheets, and Liveboards are set when you share them with users and groups, as described in the topic Data security.

The following table shows the intersection of user privilege and ability:

Create/Edit WS
Create View
Create Connection
Modify Col. Props.1
Download Data
Share within Group
Share with all users
Manage and bypass RLS rules
CrUD Relationships
Read Relationships
See Hidden Cols
Join with Upload Data
Schema Viewer
Use Scheduler
Use Auto-Analyze
Access Developer Portal
Run Sage queries
Can administer ThoughtSpot Y Y Y Y Y Y Y Y Y2 Y Y Y Y Y Y Y N
Can download data
N N N N Y Y N N N
Y4
N N N N N N N
Can manage data
Y Y Y Y N Y N N
Y4
Y4
Y5
Y N N N N N
Can share with
all users
N N N N N Y Y N N
Y4
N N N N N N N
Has SpotIQ privilege
N N N N N N N N N
Y4
N N N N Y N N
Can Administer and Bypass RLS
N N N N N Y N Y Y N N N N N N N N
Can manage sync Y Y Y Y N Y N N
Y4
Y4
Y5
Y N N N N N
Can use Sage N N N N N N N N N N N N N N N N Y
Can manage catalog Y Y Y Y N Y N N
Y4
Y4
Y5
Y N N N N N
Has Developer privilege N N N N N Y N N N N N N N N N Y N
None N N N N N Y N N N
Y4
N N N N N N N

Table notes:

  1. Applies to non-owners only.
  2. Any tables.
  3. Author of at least one table in relationship.
  4. Only when read permission for columns used in the relationship.
  5. With edit permission.


Was this page helpful?