Files
scylladb/docs/operating-scylla/security/authorization.rst
Michał Hudobski 3db2e67478 docs: adjust docs for VS auth changes
We adjust the documentation to include the new
VECTOR_SEARCH_INDEXING permission and its usage
and also to reflect the changes in the maximal
amount of service levels.
2025-10-03 16:55:57 +02:00

597 lines
20 KiB
ReStructuredText

.. highlight:: cql
.. _cql-security:
Grant Authorization CQL Reference
---------------------------------
Authorization is the process by where users are granted permissions, which entitle them to access, or permission to change data on specific keyspaces, tables or an entire datacenter. Authorization for ScyllaDB is done internally within ScyllaDB and is not done with a third-party such as LDAP or OAuth. Granting permissions to users requires the use of a role such as a Database Administrator as well as :doc:`enabling the CassandraAuthorizer </operating-scylla/security/enable-authorization>`. It also requires a user who has been :doc:`authenticated </operating-scylla/security/authentication>`.
This reference covers CQL specification version 3.3.1
.. _db-roles:
Database Roles
^^^^^^^^^^^^^^
.. _database-roles-statement:
Database roles should be used instead of USERS.
CQL uses database roles to represent users and groups of users. Syntactically, a role is defined by:
.. code-block::
role_name: `identifier` | `string`
.. _create-role-statement:
CREATE ROLE
~~~~~~~~~~~
.. _create-role-statment:
Creating a role uses the ``CREATE ROLE`` statement:
.. code-block::
create_role_statement: CREATE ROLE [ IF NOT EXISTS ] `role_name`
: [ WITH `role_options` ]
role_options: `role_option` ( AND `role_option` )*
role_option: PASSWORD '=' `string`
:| LOGIN '=' `boolean`
:| SUPERUSER '=' `boolean`
:| OPTIONS '=' `map_literal`
For instance::
CREATE ROLE new_role;
CREATE ROLE alice WITH PASSWORD = 'password_a' AND LOGIN = true;
CREATE ROLE bob WITH PASSWORD = 'password_b' AND LOGIN = true AND SUPERUSER = true;
CREATE ROLE carlos WITH OPTIONS = { 'custom_option1' : 'option1_value', 'custom_option2' : 99 };
.. include:: /operating-scylla/security/_common/warning-no-pwd.rst
By default, roles do not possess ``LOGIN`` privileges or ``SUPERUSER`` status.
:ref:`Permissions <cql-permissions>` on database resources are granted to roles; types of resources include keyspaces,
tables, functions, and roles themselves. Roles may be granted to other roles to create hierarchical permissions
structures; in these hierarchies, permissions and ``SUPERUSER`` status are inherited, but the ``LOGIN`` privilege is
not.
If a role has the ``LOGIN`` privilege, clients may identify as that role when connecting. For the duration of that
connection, the client will acquire any roles and privileges granted to that role.
Only a client with the ``CREATE`` permission on the database roles resource may issue ``CREATE ROLE`` requests (see
the :ref:`relevant section <cql-permissions>` below) unless the client is a ``SUPERUSER``. Role management in ScyllaDB
is pluggable, and custom implementations may support only a subset of the listed options.
Role names should be quoted if they contain non-alphanumeric characters.
.. _setting-credentials-for-internal-authentication:
Setting credentials for internal authentication
```````````````````````````````````````````````
Use the ``WITH PASSWORD`` clause to set a password for internal authentication, enclosing the password in single
quotation marks.
If internal authentication has not been set up or the role does not have ``LOGIN`` privileges, the ``WITH PASSWORD``
clause is not necessary.
Creating a role conditionally
`````````````````````````````
Attempting to create an existing role results in an invalid query condition unless the ``IF NOT EXISTS`` option is used.
If the option is used and the role exists, the statement is a no-op::
CREATE ROLE other_role;
CREATE ROLE IF NOT EXISTS other_role;
Creating a role with a hashed password
``````````````````````````````````````
When you create a role with a password, the password is hashed by ScyllaDB and only then inserted into the database.
However, there also exists a version of the statement allowing you to create a role with a pre-hashed password; the syntax:
.. code-block::
create_role_statement: CREATE ROLE [ IF NOT EXISTS ] `role_name`
: WITH HASHED PASSWORD `hashed_password`
: ( AND `role_option` )*
hashed_password: `string`
role_option: LOGIN '=' `boolean`
:| SUPERUSER '=' `boolean`
:| OPTIONS '=' `map_literal`
When that statement is executed, ScyllaDB will not hash the provided hashed password; it will be inserted into
the database directly, with no additional processing of it. The statement only works with an authenticator that
uses passwords, e.g. PasswordAuthenticator. It can only be executed by a role with the superuser privilege.
The provided hashed password must be an encrypted string using the library function `crypt(3)` specified by POSIX,
and it must use one of the encryption algorithms that ScyllaDB supports: bcrypt, sha512crypt, sha256crypt, md5crypt.
If the hashed password doesn't satisfy those requirements, logging in as the role may be impossible.
Example how to generate a hashed password using `crypt(3)`:
.. code-block:: c
#include <crypt.h>
#include <stdio.h>
int main(void) {
// Generate a hashed password using sha256.
const char* pwd = crypt("myPassword", "$5$");
printf("The hashed password is %s\n", pwd);
return 0;
}
Example how to create a role with a hashed password:
.. code-block:: cql
cqlsh> CREATE ROLE bob WITH HASHED PASSWORD = '$5$$QdpObVOY40UOyo.BuWdpRq0Cr/DPkw7ckBEs2NqWVn5';
.. _alter-role-statement:
ALTER ROLE
~~~~~~~~~~
.. _alter-role-statment:
Altering role options uses the ``ALTER ROLE`` statement:
.. code-block::
alter_role_statement: ALTER ROLE `role_name` WITH `role_options`
For instance::
ALTER ROLE bob WITH PASSWORD = 'PASSWORD_B' AND SUPERUSER = false;
Conditions on executing ``ALTER ROLE`` statements:
- A client must have ``SUPERUSER`` status to alter the ``SUPERUSER`` status of another role
- A client cannot alter the ``SUPERUSER`` status of any role it currently holds
- A client can only modify certain properties of the role with which it identified at login (e.g. ``PASSWORD``)
- To modify properties of a role, the client must be granted ``ALTER`` :ref:`permission <cql-permissions>` on that role
.. _drop-role-statement:
DROP ROLE
~~~~~~~~~
.. _drop-role-statment:
Dropping a role uses the ``DROP ROLE`` statement:
.. code-block::
drop_role_statement: DROP ROLE [ IF EXISTS ] `role_name`
``DROP ROLE`` requires the client to have ``DROP`` :ref:`permission <cql-permissions>` on the role in question. In
addition, client may not ``DROP`` the role with which it identified at login. Finally, only a client with ``SUPERUSER``
status may ``DROP`` another ``SUPERUSER`` role.
Attempting to drop a role that does not exist results in an invalid query condition unless the ``IF EXISTS`` option is
used. If the option is used and the role does not exist, the statement is a no-op.
.. _grant-role-statement:
GRANT ROLE
~~~~~~~~~~
.. _grant-role-statment:
Granting a role to another uses the ``GRANT ROLE`` statement:
.. code-block::
grant_role_statement: GRANT `role_name` TO `role_name`
For instance::
GRANT report_writer TO alice;
This statement grants the ``report_writer`` role to ``alice``. Any permissions granted to ``report_writer`` are also
acquired by ``alice``.
Roles are modelled as a directed acyclic graph, so circular grants are not permitted. The following examples result in
error conditions::
GRANT role_a TO role_b;
GRANT role_b TO role_a;
GRANT role_a TO role_b;
GRANT role_b TO role_c;
GRANT role_c TO role_a;
.. _revoke-role-statement:
REVOKE ROLE
~~~~~~~~~~~
.. _revoke-role-statment:
Revoking a role uses the ``REVOKE ROLE`` statement:
.. code-block::
revoke_role_statement: REVOKE `role_name` FROM `role_name`
For instance::
REVOKE report_writer FROM alice;
This statement revokes the ``report_writer`` role from ``alice``. Any permissions that ``alice`` has acquired via the
``report_writer`` role are also revoked.
.. _list-roles-statement:
LIST ROLES
~~~~~~~~~~
.. _list-roles-statment:
All the known roles (in the system or granted to the specific role) can be listed using the ``LIST ROLES`` statement:
.. code-block::
list_roles_statement: LIST ROLES [ OF `role_name` ] [ NORECURSIVE ]
For instance::
LIST ROLES;
returns all known roles in the system, this requires ``DESCRIBE`` permission on the database roles resource. And::
LIST ROLES OF alice;
enumerates all roles granted to ``alice``, including those transitively acquired. But::
LIST ROLES OF bob NORECURSIVE
lists all roles directly granted to ``bob`` without including any of the transitively acquired ones.
Users
^^^^^
Prior to the introduction of roles in ScyllaDB 2.2, authentication and authorization were based around the concept of a
``USER``. For backward compatibility, this syntax has been preserved. From ScyllaDB 2.2 and onward, it is recommended to use :ref:`roles <db-roles>`.
.. _create-user-statement:
CREATE USER
~~~~~~~~~~~
Creating a user uses the ``CREATE USER`` statement:
.. code-block::
create_user_statement: CREATE USER [ IF NOT EXISTS ] [ WITH PASSWORD `string` ] [ `user_option` ]
user_option: SUPERUSER | NOSUPERUSER
For instance::
CREATE USER alice WITH PASSWORD 'password_a' SUPERUSER;
CREATE USER bob WITH PASSWORD 'password_b' NOSUPERUSER;
``CREATE USER`` where the ``LOGIN`` option is ``true``. So, the following pairs of
statements are equivalent::
CREATE USER alice WITH PASSWORD 'password_a' SUPERUSER;
CREATE USER IF NOT EXISTS alice WITH PASSWORD 'password_a' SUPERUSER;
CREATE USER alice WITH PASSWORD 'password_a' NOSUPERUSER;
CREATE USER alice WITH PASSWORD 'password_a';
.. CREATE ROLE alice WITH PASSWORD = 'password_a' AND LOGIN = true AND SUPERUSER = true;
.. CREATE ROLE IF EXISTS alice WITH PASSWORD = 'password_a' AND LOGIN = true AND SUPERUSER = true;
.. CREATE ROLE alice WITH PASSWORD = 'password_a' AND LOGIN = true AND SUPERUSER = false;
.. CREATE ROLE alice WITH PASSWORD = 'password_a' WITH LOGIN = true;
.. CREATE ROLE alice WITH PASSWORD = 'password_a' WITH LOGIN = true;
.. include:: /operating-scylla/security/_common/warning-no-pwd.rst
.. _alter-user-statement:
ALTER USER
~~~~~~~~~~
Altering the options of a user uses the ``ALTER USER`` statement:
.. code-block::
alter_user_statement: ALTER USER `user_name` [ WITH PASSWORD `string` ] [ `user_option` ]
For instance::
ALTER USER alice WITH PASSWORD 'PASSWORD_A';
ALTER USER bob SUPERUSER;
.. _drop-user-statement:
DROP USER
~~~~~~~~~
Dropping a user uses the ``DROP USER`` statement:
.. code-block::
drop_user_statement: DROP USER [ IF EXISTS ]
.. _list-users-statement:
LIST USERS
~~~~~~~~~~
Existing users can be listed using the ``LIST USERS`` statement:
.. code-block::
list_users_statement: LIST USERS
.. Note that this statement is equivalent to::
.. ## LIST ROLES;
.. ## but only roles with the ``LOGIN`` privilege are included in the output.
.. _data-control:
Data Control
^^^^^^^^^^^^
.. _cql-permissions:
Permissions
~~~~~~~~~~~
Permissions on resources are granted to users; there are several different types of resources in ScyllaDB, and each type
is modelled hierarchically:
- The hierarchy of Data resources, Keyspaces, and Tables has the structure ``ALL KEYSPACES`` -> ``KEYSPACE`` ->
``TABLE``.
..
- Function resources have the structure ``ALL FUNCTIONS`` -> ``KEYSPACE`` -> ``FUNCTION``
- Resources representing roles have the structure ``ALL ROLES`` -> ``ROLE``
- Resources representing JMX ObjectNames, which map to sets of MBeans/MXBeans, have the structure ``ALL MBEANS`` ->
``MBEAN``
Permissions can be granted at any level of these hierarchies, and they flow downwards. So granting permission on a
resource higher up the chain automatically grants that same permission on all resources lower down. For example,
granting ``SELECT`` on a ``KEYSPACE`` automatically grants it on all ``TABLES`` in that ``KEYSPACE``.
.. Likewise, granting a permission on ``ALL FUNCTIONS`` grants it on every defined function, regardless of which keyspace it is scoped in. It is also possible to grant permissions on all functions scoped to a particular keyspace.
Materialized views and CDC logs cannot be granted separate permissions -
they inherit the permissions from the base table. Specifically,
granting ``SELECT`` on a table allows to read also from all its
materialized views and CDC log. It is not possible to make only
one materialized view of several materialized views readable.
Modifications to permissions are visible to existing client sessions; that is, connections need not be re-established
following permissions changes.
The full set of available permissions is:
- ``CREATE``
- ``ALTER``
- ``DROP``
- ``SELECT``
- ``MODIFY``
- ``AUTHORIZE``
- ``DESCRIBE``
- ``VECTOR_SEARCH_INDEXING``
..
- ``EXECUTE``
.. Not all permissions are applicable to every type of resource. For instance, ``EXECUTE`` is only relevant in the context
.. of functions or mbeans; granting ``EXECUTE`` on a resource representing a table is nonsensical.
Attempting to ``GRANT`` permission on a resource to which it cannot be applied results in an error response. The following illustrates which
permissions can be granted on which types of resources, and which statements are enabled by that permission.
.. list-table::
:widths: 33 33 33
:header-rows: 1
* - Permission
- Resource
- Operations
* - ``CREATE``
- ``ALL KEYSPACES``
- ``CREATE KEYSPACE`` and ``CREATE TABLE`` in any keyspace
* - ``CREATE``
- ``KEYSPACE keyspace_name``
- ``CREATE TABLE`` in specified keyspace
* - ``ALTER``
- ``ALL KEYSPACES``
- ``ALTER KEYSPACE`` and ``ALTER TABLE`` in any keyspace
* - ``ALTER``
- ``KEYSPACE keyspace_name``
- ``ALTER KEYSPACE`` and ``ALTER TABLE`` in specified keyspace
* - ``ALTER``
- ``TABLE table_name``
- ``ALTER TABLE`` on specified table
* - ``DROP``
- ``ALL KEYSPACES``
- ``DROP KEYSPACE`` and ``DROP TABLE`` in any keyspace
* - ``DROP``
- ``KEYSPACE keyspace_name``
- ``DROP TABLE`` and ``DROP KEYSPACE`` in specified keyspace
* - ``DROP``
- ``TABLE table_name``
- ``DROP TABLE``
* - ``SELECT``
- ``ALL KEYSPACES``
- ``SELECT`` on any table
* - ``SELECT``
- ``KEYSPACE keyspace_name``
- ``SELECT`` on any table in specified keyspace
* - ``SELECT``
- ``TABLE table_name``
- ``SELECT`` on specified table
* - ``MODIFY``
- ``ALL KEYSPACES``
- ``INSERT``, ``UPDATE``, ``DELETE`` and ``TRUNCATE`` on any table
* - ``MODIFY``
- ``KEYSPACE keyspace_name``
- ``INSERT``, ``UPDATE``, ``DELETE`` and ``TRUNCATE`` on any table in the specified keyspace
* - ``MODIFY``
- ``TABLE table_name``
- ``INSERT``, ``UPDATE``, ``DELETE`` and ``TRUNCATE`` on specified table
* - ``AUTHORIZE``
- ``ALL KEYSPACES``
- ``GRANT PERMISSION`` and ``REVOKE PERMISSION`` on any table
* - ``AUTHORIZE``
- ``KEYSPACE keyspace_name``
- ``GRANT PERMISSION`` and ``REVOKE PERMISSION`` on any table in the specified keyspace
* - ``AUTHORIZE``
- ``TABLE table_name``
- ``GRANT PERMISSION`` and ``REVOKE PERMISSION`` on specified table
* - ``DESCRIBE``
- ``ALL ROLES``
- ``LIST ROLES`` on all roles or only roles granted to another specified role
* - ``VECTOR_SEARCH_INDEXING``
- ``ALL KEYSPACES``
- ``SELECT`` on all tables with vector search indexes
.. _grant-permission-statement:
GRANT PERMISSION
~~~~~~~~~~~~~~~~
Granting permission uses the ``GRANT PERMISSION`` statement:
.. code-block::
grant_permission_statement: GRANT `permissions` ON `resource` TO `user_name`
permissions: ALL [ PERMISSIONS ] | `permission` [ PERMISSION ]
permission: CREATE | ALTER | DROP | SELECT | MODIFY | AUTHORIZE | DESCRIBE
resource: ALL KEYSPACES
:| KEYSPACE `keyspace_name`
:| [ TABLE ] `table_name`
:| ALL USERS
:| USER `user_name`
For instance::
GRANT SELECT ON ALL KEYSPACES TO data_reader;
This gives any user with the ``data_reader`` role, permission to execute ``SELECT`` statements on any table across all
keyspaces::
GRANT MODIFY ON KEYSPACE keyspace1 TO data_writer;
This gives any user with the ``data_writer`` role, permission to perform ``UPDATE``, ``INSERT``, ``DELETE``,
and ``TRUNCATE`` queries on all tables in the ``keyspace1`` keyspace::
GRANT DROP ON keyspace1.table1 TO schema_owner;
This gives any user with the ``schema_owner`` role, permissions to ``DROP`` ``keyspace1.table1``
.. GRANT EXECUTE ON FUNCTION keyspace1.user_function( int ) TO report_writer;
.. This grants any user with the ``report_writer`` permission to execute ``SELECT``, ``INSERT`` and ``UPDATE`` queries
.. which use the function ``keyspace1.user_function( int )``::
.. GRANT DESCRIBE ON ALL USERS TO role_admin;
.. This grants any user with the ``user_admin`` permission to view any and all users in the system with a ``LIST
.. USERS`` statement
.. _grant-all:
GRANT ALL
`````````
When the ``GRANT ALL`` form is used, the appropriate set of permissions is determined automatically based on the target
resource.
Automatic Granting
``````````````````
When a resource is created, via a ``CREATE KEYSPACE``, ``CREATE TABLE`` or ``CREATE USER`` statement, the creator (the role the database user who issues the statement is identified as) is
automatically granted all applicable permissions on the new resource.
.. _revoke-permission-statement:
REVOKE PERMISSION
~~~~~~~~~~~~~~~~~
Revoking permission from a user uses the ``REVOKE PERMISSION`` statement:
.. code-block::
revoke_permission_statement: REVOKE `permissions` ON `resource` FROM `user_name`
For instance::
REVOKE SELECT ON ALL KEYSPACES FROM data_reader;
REVOKE MODIFY ON KEYSPACE keyspace1 FROM data_writer;
REVOKE DROP ON keyspace1.table1 FROM schema_owner;
REVOKE DESCRIBE ON ALL USERS FROM user_admin;
..
REVOKE EXECUTE ON FUNCTION keyspace1.user_function( int ) FROM report_writer;
.. _list-permissions-statement:
LIST PERMISSIONS
~~~~~~~~~~~~~~~~
Listing granted permissions uses the ``LIST PERMISSIONS`` statement:
.. code-block::
list_permissions_statement: LIST `permissions` [ ON `resource` ] [ OF `user_name` [ NORECURSIVE ] ]
For instance::
LIST ALL PERMISSIONS OF alice;
Show all permissions granted to ``alice``, including those acquired transitively from any other users::
LIST ALL PERMISSIONS ON keyspace1.table1 OF bob;
Show all permissions on ``keyspace1.table1`` granted to ``bob``, including those acquired transitively from any other
users. This also includes any permissions higher up the resource hierarchy, which can be applied to ``keyspace1.table1``.
For example, should ``bob`` have ``ALTER`` permission on ``keyspace1``, that would be included in the results of this
query. Adding the ``NORECURSIVE`` switch restricts the results to only those permissions which were directly granted to
``bob``::
LIST SELECT PERMISSIONS OF carlos;
Show any permissions granted to ``carlos``, limited to ``SELECT`` permissions on any resource.
Related Topics
```````````````
* :doc:`Apache Cassandra Query Language (CQL) Reference </cql/index>`
* :doc:`Role Based Access Control (RBAC) </operating-scylla/security/rbac-usecase>`
.. include:: /rst_include/apache-copyrights.rst
.. Licensed to the Apache Software Foundation (ASF) under one
.. or more contributor license agreements. See the NOTICE file
.. distributed with this work for additional information
.. regarding copyright ownership. The ASF licenses this file
.. to you under the Apache License, Version 2.0 (the
.. "License"); you may not use this file except in compliance
.. with the License. You may obtain a copy of the License at
..
.. http://www.apache.org/licenses/LICENSE-2.0
..
.. Unless required by applicable law or agreed to in writing, software
.. distributed under the License is distributed on an "AS IS" BASIS,
.. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
.. See the License for the specific language governing permissions and
.. limitations under the License.