Exploring Reltio Services

You can access the Reltio platform and the available applications through Reltio Services.

Each Service or Module can be considered as an independent project within the Reltio application. Each Service contains specific Resources and Sub-resources. You can assign privileges at a granular level, thereby ensuring you have complete control of the access you provide to users.

You can access the Reltio platform and the available applications through the following Reltio Services:
  • Authorization (Auth)
  • Console applications
  • DnB Connector
  • Data Validation Function (DVF API)
  • Dataloader Application
  • DTSS
  • External Match
  • Export
  • Life Cycle Actions
  • ML Match
  • Platform (MDM)
  • Reference Data Management
  • Reltio Insights
  • Shield
  • Search and Export Service
  • Salesforce (SFDC Connector)
  • Workflow

Each service listed above is defined by a set of resources. In other words, Resources/Sub-resources are the unique functionalities supported by these services. In addition, you can further define privileges at the resource level. You can associate Create, Retrieve, Update, Delete, and/or Execute privileges with each resource/sub-resource.

The following table lists the purpose of four main resources:

Table 1. Description of the Resources
Resources Purpose
Config To configure and set-up a feature.
Data To perform Create/Read/Update or Delete actions on the service data.
Tasks To access tasks from the service.
Monitoring To have logging and monitoring access.

The Permissions Framework allows you to map services, resources/sub-resources and the required privileges to roles. As a next step, these roles are mapped to tenants and subsequently, the users are granted access.

The Roles Permission management helps you to associate roles with Reltio Services, Resources and their respective privileges. It does not give any tenant access. A Role is basically a set of permissions without any explicit tenant access. You can provide the tenant access at the user/group level when the role is assigned.