Security Methods in
User Management and Authentication Methods¶
Authenticates a user to a database.
Changes an existing user's password.
Creates a new user.
Removes a single user.
Deletes all users associated with a database.
Returns information about the specified user.
Returns information about all users associated with a database.
Grants a role and its privileges to a user.
Deprecated. Removes a user from a database.
Removes a role from a user.
Updates user data.
Prompts for the password as an alternative to specifying passwords directly in various
Role Management Methods¶
Creates a role and specifies its privileges.
Deletes a user-defined role.
Deletes all user-defined roles associated with a database.
Returns information for the specified role.
Returns information for all the user-defined roles in a database.
Assigns privileges to a user-defined role.
Removes the specified privileges from a user-defined role.
Specifies roles from which a user-defined role inherits privileges.
Removes inherited roles from a role.
Updates a user-defined role.
Security Reference Documentation¶
- Describes the content of the collection that stores user-defined roles.
- Describes the content of the collection that stores users' credentials and role assignments.
- Resource Document
- Describes the resource document for roles.
- Privilege Actions
- List of the actions available for privileges.