Skip to main content
Version: 2.0

Authorization Overview

Control access to your Vectara resources with role-based, attribute-based, and multi-tenant access control.

Vectara provides multiple authorization mechanisms to control who can access what data and perform which operations. From role-based permissions that define broad access patterns to attribute-based filters that enable fine-grained control, Vectara's authorization framework helps you build secure, scalable applications.

Authorization approaches

Vectara supports several complementary authorization strategies:

Choosing the right approach

Different scenarios call for different authorization strategies:

  • Role-Based Access Control (RBAC): Best for defining broad access patterns like "developers can query" or "admins can manage corpora"
  • Attribute-Based Access Control (ABAC): Ideal for fine-grained control based on user attributes or document properties
  • Multi-Tenant Isolation: Essential for SaaS applications where complete data separation is required
  • Hybrid Approaches: Combine multiple mechanisms for layered security and flexibility

Next steps

  1. Start with Enterprise Access Patterns to understand typical user roles and needs
  2. Review Role-Based Access Control for account-level permissions
  3. Explore Attribute-Based Access Control for document-level filtering
  4. Consider Multi-Tenant Corpus Isolation for complete data separation
  5. See Combine Access Control for real-world implementation patterns