Security¶
Warning
Important note about copy.fail (CVE-2026-31431)
Like all Linux-based machines since 2017, virtual machines and containers running Dataiku are affected by the copy.fail vulnerability. This notably affects the isolation provided by UIF, allowing regular users to break out of the isolated Unix user.
For Dataiku Cloud, the mitigation has already been applied on our whole infrastructure. No further action is required.
For Dataiku Custom installs, the OS is not managed by Dataiku. Please liaise with your OS provider. The “rmmod” mitigation shown at https://copy.fail/#mitigation may work. Note that it’s known not to work on RedHat 9 and derived distributions since the module is builtin
For Dataiku Cloud Stacks installs, please use the following procedure:
Run, as root:
dnf update --security
reboot
Note that if you reprovision, you must run it again.
For containerized execution and Dataiku itself running in containers, please refer to instructions from your Kubernetes cluster provider.
Warning
Important note about dirtyfrag.io / Copy Fail 2 (CVE-2026-43284 / CVE-2026-43500)
Like all Linux-based machines since 2017, virtual machines and containers running Dataiku are affected by the dirtyfrag.io vulnerabilities. This notably affects the isolation provided by UIF, allowing regular users to break out of the isolated Unix user.
For Dataiku Cloud, the mitigation has been applied on our whole infrastructure. No further action is required.
For Dataiku Custom installs, the OS is not managed by Dataiku. Please liaise with your OS provider. The mitigations shown at https://dirtyfrag.io may work.
For Dataiku Cloud Stacks installs, please use the following procedure:
Run, as root:
dnf update --security
reboot
Note that if you reprovision, you must run it again.
For containerized execution and Dataiku itself running in containers, please refer to instructions from your Kubernetes cluster provider.
- Authentication
- Multi-Factor Authentication
- Configuring LDAP authentication
- Single Sign-On
- Azure AD
- Custom Authenticator and/or User Supplier
- Authentication and user provisioning
- Supported authenticators and user suppliers
- Mapping profiles and groups
- Synchronizing user attributes
- Advanced functionalities
- Project Access
- Project folders - defaults and access
- Main project permissions
- Connections security
- User profiles
- Shared objects
- Authorized objects
- User secrets
- Audit Trail
- Govern Security: Permissions
- Passwords security
- Advanced security options
- Hiding error stacks
- Hiding version info
- Using secure cookies
- Expiring sessions
- Forcing a single session per user
- Restricting visibility of groups and users
- Redirecting to a custom URL after logout
- Example general-settings.json file
- Restricting types of files that can be uploaded in wikis
- Restricting exports
- Setting security-related HTTP headers
- Allowing DSS to be hosted inside an iframe
- Preventing links to be clickable in data tables
- Allowing DSS users to edit their display names and emails
- Stories security
- Messaging Channels Permissions