User Access Management
TigerGraph’s user access management features are based on the role-based access control (RBAC) model, on top of which are additional features that give users finer-grain data access control. Particularly, users can use access control lists (ACL) to govern access to GSQL queries and even override RBAC.
| User authentication is not enabled by default. To secure your database and the underlying system, we strongly suggest that you enable authentication. |