Skip to main content
Skip table of contents

Source Security

Applicable to MongoDB and HBase only.

The Security section describes the permission set detected in the sources and helps to understand which permissions were granted to security principals and on which objects.

The information is displayed based on the source-specific hierarchy available for permission sets.

The Security section for the MongoDB source

HBase Security

For HBase sources, the hierarchy is:

  1. Username

  2. Namespace

  3. Table Name

  4. Column Family Name

  5. Column Qualifier Name

  6. Permissions

The user permissions are represented as a concatenated string from the RWXCA set, with each character representing one of the privileges. If a particular privilege is not granted, it will not appear in the permission field value.

  • R - Read privilege

  • W - Write privilege

  • X - Execute privilege

  • C - Create privilege

  • A - Admin privilege

For more details about the permissions, see https://hbase.apache.org/book.html#_permissions .

MongoDB Security

For MongoDB sources, the hierarchy is:

  1. Database

  2. Role

  3. Users in that role

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.