User Access Management
TigerGraph’s user access management features are based on the role-based access control (RBAC) model, on top of which there are additional features that give users finer-grain data access control. Particularly, users can use access control lists (ACL) to govern access to GSQL queries and even override RBAC.
|User authentication is not enabled by default. To secure your database and the underlying system, we strongly suggest that you enable authentication.|
Below is a list of the key features of TigerGraph’s user access management system:
Users and Credentials
A TigerGraph user is a database-level security principal on the TigerGraph platform. When user authentication is enabled, only clients who can provide credentials that identify themselves as a user can interact with the TigerGraph database.
The TigerGraph platform offers two options for credentials:
A username-password pair used to log in to GSQL and make HTTP requests.
A token - a unique 32-character string with an expiration date, used for REST++ requests.
An ACL password used to run commands to alter the ACL privileges of a query.