Users and roles

Authentication

Users can connect to a central server using these authentication methods:

  • Password
  • GSSAPI
  • SSPI
  • Kerberos
  • LDAP
  • RADIUS
  • PAM
  • SSL Certificate

This authentication information is contained on central servers hosted in a secure data centre environment and is never propagated to an edge server.

Individual users can be allowed/denied login access as and when required.

user.jpg

 

Roles

Uses can be granted zero, one or more roles to permit them particular management abilities and/or query access to particular database objects and/or regions of the network. 

key.jpg

Have more questions? Submit a request

Comments

Article is closed for comments.

Powered by Zendesk