About permissions
Available permissions
Permissions are granted on a resource to a role; grant a privilege at any level of the resource hierarchy. The full set of available privileges is:
- 
ALL PERMISSIONS 
- 
ALTER 
- 
AUTHORIZE 
- 
CREATE 
- 
DESCRIBE 
- 
DROP 
- 
EXECUTE 
- 
MODIFY 
- 
PROXY.EXECUTE 
- 
PROXY.LOGIN 
- 
SEARCH.ALTER 
- 
SEARCH.COMMIT 
- 
SEARCH.CREATE 
- 
SEARCH.DROP 
- 
SEARCH.REBUILD 
- 
SEARCH.RELOAD 
- 
SELECT 
- 
role_name 
Database resource structure
DataStax Enterprise database resources are objects to which permissions are applied, and hierarchy applies. Grant permissions on a resource higher in the chain will automatically grant that same permission on all resources lower down.
| Not all privileges apply to every type of resource.
For instance,  | 
Available objects:
- Functions
- 
- 
ALL FUNCTIONS - 
ALL FUNCTIONS IN KEYSPACE <keyspace_name> - 
FUNCTION <keyspace_name.function_name> 
 
- 
 
- 
 
- 
- Data
- 
- 
ALL KEYSPACES - 
KEYSPACE <keyspace_name> - 
TABLE <table_name> - 
Rows ('<filtering_data>' ROWS IN <table_name> ) 
- 
Indexes (other than search indexes) belong to a table but permission cannot be directly assigned. ALTER permission on a table allows users to CREATE and DROP indexes. 
 
- 
- 
Types belong to a keyspace but permissions cannot be directly assigned. To manage types set the keyspace permissions to CREATE, DROP or ALTER which also gives the user the same permissions for tables. 
 
- 
 
- 
 
- 
- Search index
- 
- 
ALL SEARCH INDICES - 
SEARCH INDICES [<keyspace_name>.]<table_name> 
 
- 
 
- 
- JMX
- 
- 
ALL MBEANS - 
MBEAN <mbean_name> - 
MBEANS <pattern> 
 
- 
 
- 
 
- 
- Roles
- 
- 
ALL ROLES - 
ROLE <role_name> 
 
- 
 Roles are both an assignable permission set and a database resource. GRANT <role_name> TO <role_name>gives all the permissions of the first role in the statement to the second role. Use roles to create your own hierarchical permissions structures.
- 
- Remote procedure calls (RPC)
- 
- 
ALL OBJECTS - 
OBJECT <object_name> - 
METHOD 
 
- 
 
- 
 
- 
- Authentication schemes
- 
- 
ALL SCHEMES - 
(LDAP | KERBEROS | INTERNAL) SCHEME 
 
- 
 
- 
