Building Event Streaming Architectures on Scylla and Kafka | June 17, 2021

Save Your Seat >


Access-control in Scylla: What You Can Do, How It Works, and Why It’s Worth the Trouble

Jesse Haber-Kucharsky, Software Engineer, ScyllaDB

23:00December 20, 2018

The security of data managed by Scylla is crucial. There are many aspects of systems and information security and Scylla includes features to address an important selection of them. In this talk, we'll discuss Scylla's support for managing identities and for defining schemes for limiting access to resources based on roles. We will discuss how these features tie in to principles of secure systems, briefly describe how the functionality is implemented, and finally demonstrate the user perspective.

Share this


Let’s do this

Getting started takes only a few minutes. Scylla has an installer for every major platform. If you get stuck, we’re here to help.