User Access Management
TigerGraph’s user access management features are based on the role-based access control (RBAC) model, on top of which are additional features that give users finer-grain data access control. Particularly, users can use access control lists (ACL) to govern access to GSQL queries and even override RBAC.
User authentication is not enabled by default. To secure your database and the underlying system, we strongly suggest that you enable authentication. |