Governed data movement: Control without constraint

Fivetran enhances the extensibility and automation of governance in the modern data stack with scalable provisioning and full visibility into in-flight data.

ACCESS CONTROL

Secure user access, simplified

Role-based access control

Assign granular account, destination, and connector-level permissions for full command over who can view, create, edit, and delete items in the Fivetran platform.

Learn more

Teams

Pre-configure team access settings to align with goals and tooling to standardize permissions and streamline the onboarding of new users.

Learn more

Organizations

Maintain control and visibility over multiple business units or subsidiaries with uniquely configured Fivetran accounts.

Learn more

Automated user provisioning

Integrate with Okta or Microsoft Entra ID to simplify user onboarding, offboarding, and password policy enforcement across systems.

Learn more
Benefits

Fast

Teams quickly get access to the data they need to make informed decisions every day.

Scalable

Core data teams are relieved of manual pipeline creation and ongoing maintenance.

Secure

Granular permissions can be precisely configured to meet enterprise compliance requirements.

Metadata sharing

Centralize metadata management with Fivetran’s Platform Connector

Gain complete visibility into your data’s journey — where it came from, who accessed it, and how it evolved.

Benefits

Visibility

Achieve complete visibility into the movement and management of your data from every source to every destination.

Auditability

Review a record of changes made to data over time and the source of those changes for easier compliance auditing.

Trust

Ensure consistent awareness and control over who has access to the company’s data and the actions they’re taking.

Catalog integrations

The Fivetran Platform Connector can integrate with industry-leading catalogs.

Skip the swamp with trusted, governed data lakes

Fivetran Managed Data Lake Service combines the governance and consistency of a data warehouse with the scalability and flexibility of a data lake, revolutionizing data lakes and turning them from chaotic, ungoverned repositories into structured, well-managed data stores.

Learn more about governed data lakes

Enterprise-grade security for reliable replication 

The Fivetran platform has all the compliance bells and security whistles baked in — like customer managed keys, private networking, and secure deployment options — to ensure you stay compliant with regulations like HIPAA, GDPR, and SOC 2.

Learn more

Trusted by data driven companies

View all case studies

“Fivetran is at the core for our enterprise data sources. We’re now able to manage data and power our business. Fivetran has brought in revenue data sets so that we can understand our advertising performance with different audiences.”

Ross Gaskell
Manager of Commercial Data Technology at BBC Studios

“Fivetran allows us to dynamically adjust our marketing strategies, find new efficiencies, and ensure our data meets rigorous compliance requirements for international banking.”

Christophe de Cussy
Senior Delivery Manager at Raffeisen Bank International

“Fivetran is at the core for our enterprise data sources. We’re now able to manage data and power our business. Fivetran has brought in revenue data sets so that we can understand our advertising performance with different audiences.”

Ross Gaskell
Manager of Commercial Data Technology at BBC Studios

FAQS

Can I audit the data moved with Fivetran?

Yes! Fivetran generates structured log events from connections, user actions, and API calls, as well as account and destination metadata, via the Fivetran Platform Connector. Additionally, Fivetran adds system columns and audit tables for each connector for visibility into row-level operations. Use the Fivetran Platform Connector to sync metadata to your destination or your internal catalog, where you can conduct audits alongside metadata from the rest of your systems.

How can I ensure users can't access connections to proprietary sources, like Workday?

Fivetran provides granular access control settings, where permissions can be narrowed to the account, destination, or connection level. You can specify which users or teams are allowed to create, view, edit, or delete specific connectors.

Can I manage the onboarding and deactivation of employees to the Fivetran platform with the rest of my company's programs?

Yes! Fivetran supports user provisioning through SCIM (System for Cross-domain Identity Management), allowing you to sync user creation, updates, and deactivations from identity providers like Okta or Microsoft Entra ID. Once SCIM is enabled, user accounts are managed through your identity provider rather than manually in the Fivetran platform.

How can I view metadata from Fivetran alongside metadata from the rest of my systems?

The Fivetran Platform Connector integrates with the leading catalog providers so you can achieve end-to-end visibility across all your systems. Additionally, integrations with external logging services like AWS CloudWatch, Azure Monitor, and Datadog are available on the Enterprise and Business Critical plans.

Can I manage my data movement programmatically to maintain control at scale?

Can I manage my data movement programmatically to maintain control at scale?06Yes! Fivetran provides a REST API that supports actions such as creating, updating, and deleting connectors, destinations, users, teams, roles, and more. You can also use infrastructure-as-code tools (like Terraform) or orchestration frameworks (like Airflow) to manage Fivetran pipelines as part of your larger stack. Enforce guardrails, templates, and repeatable configurations across many environments at scale while maintaining governance control.

Let's get you moving data