Adding Roles for Kerberos Principals
When using Role Management mode internal, create a role that matches the user’s principal name. This allows them to log in and execute CQL requests.
|
DSE supports Kerberos authentication with LDAP role management when the principal name matches the email address attribute of the LDAP user.
Configure the group lookup with the |
-
Create a role that matches the principal name, including the Kerberos
REALM, with login enabled:CREATE ROLE "<user_name@REALM>" WITH LOGIN = true;-
<user_name@REALM>- The complete user principal name. Always enclose the role names that include uppercase or special characters in double quotes. -
LOGIN = true- Allows the role to access the database. -
Optional:
SUPERUSER = true- Gives full access to all database objects to the user. See Adding a superuser login.
-
-
Bind the assignment to an authentication scheme:
GRANT EXECUTE ON KERBEROS SCHEME TO '<user_name@REALM>';Enclose the role name in single quotes. The name is case-sensitive.
-
To allow another role to manage the new role:
GRANT AUTHORIZE FOR ALTER, DROP ON <new_role_name> TO <management_role>;
All superusers have authorize permissions on all roles. And the role that created the role is granted all permissions on the role.