Adding Roles for Kerberos Principals
When using Role Management mode internal, create a role that matches the user’s principal name. This allows them to log in and execute CQL requests.
| DSE supports Kerberos authentication with LDAP role management when the principal name matches the email address attribute of the LDAP user.
Configure the group lookup with the  | 
- 
Create a role that matches the principal name, including the Kerberos REALM, with login enabled:CREATE ROLE "<user_name@REALM>" WITH LOGIN = true;- 
<user_name@REALM>- The complete user principal name. Always enclose the role names that include uppercase or special characters in double quotes.
- 
LOGIN = true- Allows the role to access the database.
- 
Optional: SUPERUSER = true- Gives full access to all database objects to the user. See Adding a superuser login.
 
- 
- 
Bind the assignment to an authentication scheme: GRANT EXECUTE ON KERBEROS SCHEME TO '<user_name@REALM>';Enclose the role name in single quotes. The name is case-sensitive. 
- 
To allow another role to manage the new role: GRANT AUTHORIZE FOR ALTER, DROP ON <new_role_name> TO <management_role>; All superusers have authorize permissions on all roles. And the role that created the role is granted all permissions on the role. 
