Outdated Version

You are viewing an older version of this section. View current production version.

Introduction min read


This guide covers security administration. First, you will learn how to securely deploy MemSQL in a reduced-privileges, role-separated environment. Second, you will learn how to configure row-level security. Finally, you will learn how to synchronize permissions across your cluster.