Ensuring control and security over your data is a paramount concern. In this article, we will walk you through two straightforward methods to revoke access from the OWOX BI service account, providing you with the confidence that your data in Google BigQuery remains secure.
Revoke access at the GCP project level
Step 1. In OWOX BI, navigate to the ‘Shared datasets’ page and copy the name of the service account associated with OWOX BI.
Step 2. On the GCP left panel, locate IAM & admin. From the drop-down menu, select IAM.
Step 3. Identify your OWOX BI service account within the list of project members.
Step 4. Select the service account from the list and click the ‘Revoke access’ button.
Confirm your action in the modal dialog.
Done. From this moment onward, the OWOX BI service account no longer has any access to your data in Google BigQuery.
Revoke access at the specific BigQuery dataset level
Step 1. In OWOX BI, access the ‘Shared datasets’ page to review the list of datasets with OWOX BI access. Note the name of the OWOX BI service account for later use.
Step 2. For a specific dataset, click on its name to proceed to the Google Cloud interface.
Step 3. Click the ‘Sharing’ button and select the ‘Permissions’ link in the popover menu.
Step 4. In the opened pop-up window, expand the ‘BigQuery Data Editor’ row to view the list of accounts. Locate the OWOX BI service account and click the ‘Delete’ icon.
Confirm the action in the modal dialog.
Done. The OWOX BI service account loses access to this dataset in Google BigQuery. Repeat the operation for other datasets if necessary.
Revoke access for the Ad Service account
The access granted for importing ad campaign costs can be easily revoked by changing the password in the account settings of the advertising service. After a password change, the next data import will fail, causing the Pipeline to be blocked. In this scenario, you will able to delete the current Pipeline and create a new one with different advertising service credentials.
By following these simple yet effective steps, you maintain control over your data, ensuring that access is granted only where it's needed when it's needed. If you have any more questions or need help, feel free to contact email@example.com.