The Unison platform employs two core entities to streamline data management: data sources and workspaces.
A data source represents an actual database within the Unison platform. It includes associated access rules, related workspaces, authorised users, and their runners. Data sources can be either private or public:
- Private data sources are accessible only to users from the custodian company or other users who are approved by the custodian company to access the data via the Data Explorer.
- Public data sources are available to any registered company on the platform.
Data custodians manage a master workspace, where they can define structure and value mappings to either standard or custom Common Data Models (CDMs) without requiring data transformation. This setup enables users to start utilising the data efficiently.
Consumers create a workspace from the data source, which initially mirrors the master workspace. They can then modify mappings within their granted access levels, ranging from full access to fully protected mappings.
Each user who wants to access a specific dataset for which they have access must create a workspace. This workspace will be available for sign-in to any user from his company or a subset of approved users from their company. To get access, each user should create a runner token and send it to the data custodian. After the data custodian deploys a runner with access to the source database, users from the company will receive access to work with the data in the Unison platform.
The Unison platform connects to databases using DBMS user credentials. All restrictions and access permissions set at the DBMS level apply within the platform. Users cannot access or utilise data beyond the permissions granted to the DBMS account. Each user connects through these credentials.
This approach allows for flexible and precise access control:
- Custom DBMS Permissions: Set specific access permissions at the DBMS level for individual users, enabling detailed control.
- Shared Company Account: To simplify and standardise access management, use a single DBMS account for all user runners within a company.
- Access Profiles: Create predefined access profiles for different user types and assign them to specific groups, ensuring consistent permissions across teams.
User roles in the Unison platform define access to specific parts of the product:
- Organisation Admin: Has full access to manage and edit all resources available to the company.
- Editor: Can edit mappings, vocabularies, and CDMs, as well as execute pipelines.
- Viewer: Can view mappings, utilise the cohort playground, and execute pipelines.
Each data source on the Unison platform requires mapping access to manage editing permissions. There are four access profiles:
- Full Access: Users can make any edits to default mappings.
- SQL Protected: Users cannot edit or view SQL code but can adjust other mappings as needed. This is useful for setting up data extraction structures while concealing SQL details from consumers.
- Structure Protected: Users can view but not edit structure mappings. This option is ideal for safeguarding configured structure mappings while allowing value mappings to be customised for specific research needs.
- Fully Protected: Users cannot make any edits to mappings. This ensures the integrity of mappings when providing data as a product, preventing any modifications.
Mapping access must be configured for every user, whether they are part of the data custodian or consumer organisation.
Mapping access controls the ability to edit and manage mappings for specific companies or users.
User roles define which platform sections are accessible and which entities a company or user can modify.
Mapping access rules take precedence over user roles. For example, an editor without mapping edit access cannot make mapping changes, regardless of their role permissions.
To grant access to your data on the Unison platform, follow these steps:
- Connect your database to the Unison platform using the master token.
- Set up DB access for the intended user at the DBMS level (or create shared access for multiple users).
- Make your data source public on the Unison platform.
- For each user requiring access, install a runner with the DB access settings created in step 1.
This guide assumes your data source is already connected to the Unison platform.
As a data custodian, you grant access to your data and provide the infrastructure necessary for research.
Responsibilities include:
- Installing runners on your infrastructure to enable data access and analysis.
- Providing resources for users to execute analysis pipelines.
- Managing DBMS-level access to ensure secure data handling.
- Configuring access at the Unison platform level for users and workspaces.
- Updating runner versions to maintain compatibility and performance.
Typically, the Unison runner operates within the custodian’s infrastructure and must have direct access to the database and analysis pipelines.
- Navigate to Settings > Company > Data Repositories.
- Click the Settings button next to the desired data source (your data sources are marked with a settings button).
- Under General Settings, change the visibility to Public (this makes the data source visible to everyone on the Explorer page).
- Set default mapping access to define user permissions for the data source.
This process ensures your data source is accessible while maintaining control over who can interact with it.
- Create a DBMS account for the new user (or use a shared DBMS account for multiple users).
- Obtain the runner instance from the approved Git repository version.
- Verify that the runner token includes the “consumer” identifier, not the “master” token.
- Install the runner on your infrastructure with network access to the database.
- Notify the user that they can now start working with the data.
- Navigate to Settings > Company > Data Repositories.
- Click the Settings button for the relevant data source.
- Under the Consumer section, locate the user’s company and click on it.
- Find the specific user requesting access and configure their personal mapping permissions.
- Open the Data Explorer.
- Locate the data source you wish to use for research.
- Verify that your company hasn’t already created a workspace for this data source (the count of existing workspaces is displayed below the data source description).
- Click Create Workspace.
- Set up the workspace by entering a name, unique code, and a description outlining its purpose.
Data consumers utilise data to achieve research goals. They work within workspaces to:
- Create and customise specific mappings.
- Build and refine cohorts.
- Execute pipelines for analysis and insights.
- Open the Explorer and locate the data source you want to use.
- If you don’t have a DBMS account, contact the data custodian to obtain one.
- If no workspaces exist for the data source, click Create Workspace.
- Provide a unique code, name, and description that clearly outlines the research purpose for easy identification by you and your colleagues.
Note: The first scan of the data, based on the structure mapping, will apply to all users. Ensure the first scan is performed by the user with the most comprehensive access.
- Open the Converter and locate the data source you want to use.
- Click the Sign In button.
- Obtain the runner token.
- Send the token to the data custodian with a request to add a new runner for your use.
The Unison platform generates a token for you, which you must send to the data custodian with a request to connect you to the platform.
Some repositories at the Unison Explorer are marked with tags, like “demo” or “shared”.
These tags mean that you can make a workspace and test the dataset without making a request to a data custodian. Just create a workspace and add members of your team to it.
The Unison platform uses two token types: master and consumer.
- Any user can add a data source as a custodian. The platform does not manage or restrict this action.
- When a user creates a data source, a master-prefixed runner token is assigned, granting full control over mapping access rules and user permissions.
As a data custodian, it’s crucial to verify that consumers do not attempt to create data sources. This would allow them to manage access rules and grant permissions to users from other organisations.
Alternatively, if you wish to delegate data management, you can allow a trusted third party, such as a general partner, to act as a custodian. They would then create the data source and manage access on your behalf.





