The Fivetran integration enables security and compliance teams to automate User Access Reviews (UAR) by syncing user access data directly from Fivetran. This helps organizations review who has access to Fivetran and maintain accurate access records for compliance monitoring.
Key Capabilities
User Access Review Data Sync: Import Fivetran user access data into Drata
Access Governance: Monitor which users have access to your Fivetran environment
Compliance Monitoring: Maintain visibility into system access to support audit and compliance workflows
This integration supports User Access Review workflows, helping demonstrate compliance with access control policies.
Prerequisites & Data Access
Fivetran Access Requirements
You must have Admin privileges in your Fivetran account.
You must generate Fivetran API credentials.
Drata Role Requirements
To create or modify connections, you must have one of the following Drata roles with write access: Admin, Workspace Manager, or DevOps Engineer
Access Reviewers can view the connection page but cannot create or modify connections
Permissions & Required Access
Permission / Access | Why It’s Needed |
API Key | Identifies the Fivetran API credentials used for authentication |
API Secret | Authenticates the Fivetran API credentials and allows Drata to retrieve user access data |
Step-by-Step Setup
Step 1: Generate Fivetran API Credentials
Log in to your Fivetran account.
In the left navigation menu, expand your account settings.
Select API Key.
Generate a new API key.
Copy the following credentials and store them securely:
API Key
API Secret
Expected outcome:
You have generated the API Key and API Secret required to authenticate the integration.
Step 2: Connect Fivetran in Drata
Log in to Drata → go to the Connections page.
Navigate to your Available Connections.
Search for and start the Fivetran connection process.
Enter the following information when prompted:
API Key
API Secret
Expected outcome:
Fivetran is successfully connected and user access data begins syncing to Drata.
Important Notes
Authentication method: The Fivetran integration uses API credentials (API Key and API Secret).
Security best practice: Store API credentials securely and rotate them according to your organization’s security policies.
Network restrictions: If your organization uses a Web Application Firewall (WAF), ensure required Drata IP addresses are allowlisted so the connection can be established.
