This guide covers security administration. First, you will learn how to securely deploy MemSQL in a reduced-privileges, role-separated environment. Second, you will learn how to configure row-level security. Finally, you will learn how to synchronize permissions across your cluster.
Outdated Version
You are viewing an older version of this section. View current production version.