Security

This section provides the following database security-related information.

    Authentication: This topic covers SingleStore user configuration and authentication, including:

  • Password-based authentication.

  • Passwordless third-party user authentication with SAML 2.0 and Kerberos.

  • Authentication via pluggable authentication module (PAM).

  • Troubleshooting steps for common authentication-related issues.

  • Connection Links to store data source connection details.

  • General account security implementations, such as password policy, password resets, account lockout policy, host-based security, and file access restrictions.

Administration: This topic covers database security administration, such as role-based access control (RBAC) and row-level security (RLS) deployment. It also provides information about synchronizing user permissions across the SingleStore cluster.

Audit Logging: This topic discusses how SingleStore logs all database activities and writes the generated logs to an external location. It covers how to set up audit logging at different logging levels, audit log file formats supported, schemas for log file entries, common troubleshooting tips, and disabling audit logging.

Encryption: This section provides information about SingleStore’s support for secure connections over SSL. It demonstrates how to generate SSL certificates, configure SingleStore server for secure client and intra-cluster connections, and mandate SSL connection between the server and clients.

In this section

Last modified: March 4, 2024

Was this article helpful?