What’s New in Vertica 9.0.1: Security and Authentication

This blog post was authored by Soniya Shah. In this release, we introduce some security enhancements. We’ve added the ability to grant and revoke privileges on system tables, using the same syntax as you would for granting and revoking on tables. However, there are some limitations about the types of privileges you can use with […]

Building a Secure Vertica Environment

This blog post was authored by Soniya Shah. Vertica has a client-server architecture system, where applications that reside on the client access the Vertica cluster through drivers including ODBC, JDBC, OLEDB and ADO.NET. This post discusses secure client to server communications, authenticating access to Vertica, and administrator access. Method Vertica Options Authentication: Validate user credentials […]

LDAP and User Accounts

This blog post was authored by Soniya Shah. If you are a database administrator, you probably need to authenticate users in Vertica. There are many methods users can use to authenticate, including Ident, Kerberos, LDAP, and hash. This blog walks you through the steps to take if you want to authenticate some users using LDAP […]

Customize Your Security Authentication in Vertica

Learn more about authentication methods in Vertica.

Best Practices for Using LDAP Link with Vertica

There are a few best practices that you should follow to make sure that you don’t accidentally lose any users or data. This blog explains how to keep your LDAP Link service working smoothly.

Classified: FAQs on Access Policies

In Vertica 7.2.2 we?ve added more security features, including a row-level access policy option. Combined with our previously existing column access policy, Vertica verifies that your data is more secure than ever.

User Security Auditing in Vertica

Are you a database administer who manages users and roles in your Vertica database? Do you need to keep track of who has permission to access certain database objects?

If so, here’s a quick guide to queries that help you review the users, roles, privileges, and permissions that you have configured in your database. These queries access one or more Vertica system tables to retrieve this information.

Data-Centric Security: Vertica and SecureData

Take advantage of the recent integration of Vertica and SecureData. This integration allows you to keep your data protected when it flows across multiple systems spread across multiple data centers on premise or in the cloud.

Using Inherited Privileges

New to Vertica 7.2.0, the inherited privileges feature provides a one-step method for enabling privileges at the schema level.

Kerberos Authentication for Hadoop Integration: Keeping your data safe

Like all Vertica releases, 7.1.2 includes a bunch of new features. One specific feature can help make your HDFS data safer: Kerberos integration for Hadoop. This blog will give you an overview of using Kerberos authentication with Vertica for SQL on Hadoop.

What is a Lock Anyway?

We talk a lot about database security and how you can protect your sensitive data from outside threats. But what about internal, unintentional data corruption? What if the data you are trying to analyze or manipulate is simultaneously being manipulated by another transaction? A scenario such as this could lead to data loss and inconsistency. In some cases, this can be as bad as an external threat. This is where locks come into the picture.

Configuring Vertica for a Multi-Tenant Solution

One of the more interesting and popular Vertica solutions that I’ve come across is the so-called multi-tenant implementation. A multi-tenant database is simply a database designed to support multiple unique customers. Often, these customers interact with the database through some sort of web interface which uses an Vertica database in the backend.

For Your Eyes Only: Using Vertica Access Policies

Everyone knows there?s virtually no limit to the amount of data you can store, manage, and query in Vertica. But you may not be aware of how easy it is to control who sees what in your database. In this blog, Alexey Kireyev, the lead security developer for Vertica, explains how you can use the new Access Policies feature to manage your private and sensitive data.