Steps for production environments

To enable access control without downtime or interrupting services, use transitional modes to temporarily support applications and users that do not have accounts.

Procedure

  1. Update all applications to provide credentials and ensure that they use the latest HCD driver, see DataStax drivers. When using authentication.transitional_mode, you can provide a blank username and password to log in with the anonymous role.

    When authentication and authorization are disabled, the credentials portion of the connection request is ignored. After authentication is enabled all connections must provide credentials.

  2. Change the replication factor for the security keyspaces, see Configuring the security keyspaces replication factors.

  3. Run a full repair of the system_auth keyspace.

  4. On each node, enable authentication and authorization in transitional mode:

  5. Turn on logging to allow verification that applications can authenticate. See Setting up database auditing.

  6. Enable JMX authentication, see Controlling access to JMX MBeans.

  7. Perform a rolling restart of all nodes in the cluster.

    The transactional nodes are vulnerable to malicious activity following the restart. Anybody can access the system using the default cassandra account with password cassandra. DataStax recommends isolating the cluster until after disabling the cassandra account.

  8. After the restarts are complete, use cqlsh to replace the cassandra default account, see Add a superuser login.

    Using the default cassandra account may impact performance. All requests including login execute with consistency level QUORUM. DataStax recommends using this account only to create your root account.

  9. Switch to the new root account and configure roles and assign permissions, see Set up logins and users.

  10. Use the audit logs to verify that all applications can access the transactional nodes and have the permissions required to execute requests. See Log formats.

  11. In the cassandra.yaml file, set authenticator.parameters.enabled to true and ensure authentication is properly configured.

  12. Perform a rolling restart.

Was this helpful?

Give Feedback

How can we improve the documentation?

© 2025 DataStax | Privacy policy | Terms of use | Manage Privacy Choices

Apache, Apache Cassandra, Cassandra, Apache Tomcat, Tomcat, Apache Lucene, Apache Solr, Apache Hadoop, Hadoop, Apache Pulsar, Pulsar, Apache Spark, Spark, Apache TinkerPop, TinkerPop, Apache Kafka and Kafka are either registered trademarks or trademarks of the Apache Software Foundation or its subsidiaries in Canada, the United States and/or other countries. Kubernetes is the registered trademark of the Linux Foundation.

General Inquiries: +1 (650) 389-6000, info@datastax.com