Add roles for Kerberos principals
When using Role Management mode internal, create a role that matches the user’s principal name.
This allows them to log in and execute CQL requests.
DSE supports Kerberos authentication with LDAP role management when the principal name matches the email address attribute of the LDAP user.
Configure the group lookup with the user_memberof_attribute option.
-
Create a role that matches the principal name, including the Kerberos
REALM, with login enabled:CREATE ROLE "<user_name@REALM>" WITH LOGIN = true;-
<user_name@REALM>: The complete user principal name. Always enclose the role names that include uppercase or special characters in double quotes. -
LOGIN = true: Allows the role to access the database. -
SUPERUSER = true(optional): Gives full access to all database objects to the user. See Adding a superuser login.
-
-
Bind the assignment to an authentication scheme:
GRANT EXECUTE ON KERBEROS SCHEME TO '<user_name@REALM>';Enclose the role name in single quotes. The name is case-sensitive.
-
To allow another role to manage the new role:
GRANT AUTHORIZE FOR ALTER, DROP ON <new_role_name> TO <management_role>;All superusers have
AUTHORIZEpermissions on all roles. The role that created the role is also granted all permissions on that role.