Adding Roles for Kerberos Principals
When using Role Management mode internal, create a role that matches the user’s principal name. This allows them to log in and execute CQL
requests.
DSE supports Kerberos authentication with LDAP role management when the principal name matches the email address attribute of the LDAP user.
Configure the group lookup with the |
Procedure
-
Create a role that matches the principal name, including the Kerberos
REALM
, with login enabled:CREATE ROLE "<user_name@REALM>" WITH LOGIN = true;
-
<user_name@REALM>
- The complete user principal name. Always enclose the role names that include uppercase or special characters in double quotes. -
LOGIN = true
- Allows the role to access the database. -
Optional:
SUPERUSER = true
- Gives full access to all database objects to the user. See Adding a superuser login.
-
-
Bind the assignment to an authentication scheme:
GRANT EXECUTE ON KERBEROS SCHEME TO '<user_name@REALM>';
Enclose the role name in single quotes. The name is case-sensitive.
-
To allow another role to manage the new role:
GRANT AUTHORIZE FOR ALTER, DROP ON <new_role_name> TO <management_role>;
All superusers have authorize permissions on all roles. And the role that created the role is granted all permissions on the role.
What is Next
Assign permissions to the role, see Assigning permissions.