OceanBase logo

OceanBase

A unified distributed database ready for your transactional, analytical, and AI workloads.

DEPLOY YOUR WAY

OceanBase Cloud

The best way to deploy and scale OceanBase

OceanBase Enterprise

Run and manage OceanBase on your infra

TRY OPEN SOURCE

OceanBase Community Edition

The free, open-source distributed database

OceanBase seekdb

Open source AI native search database

Customer Stories

Real-world success stories from enterprises across diverse industries.

View All
BY USE CASES

Mission-Critical Transactions

Global & Multicloud Application

Elastic Scaling for Peak Traffic

Real-time Analytics

Active Geo-redundancy

Database Consolidation

Resources

Comprehensive knowledge hub for OceanBase.

Blog

Live Demos

Training & Certification

Documentation

Official technical guides, tutorials, API references, and manuals for all OceanBase products.

View All
PRODUCTS

OceanBase Cloud

OceanBase Database

Tools

Connectors and Middleware

QUICK START

OceanBase Cloud

OceanBase Database

BEST PRACTICES

Practical guides for utilizing OceanBase more effectively and conveniently

Company

Learn more about OceanBase – our company, partnerships, and trust and security initiatives.

About OceanBase

Partner

Trust Center

Contact Us

International - English
中国站 - 简体中文
日本 - 日本語
Sign In
Start on Cloud

A unified distributed database ready for your transactional, analytical, and AI workloads.

DEPLOY YOUR WAY

OceanBase Cloud

The best way to deploy and scale OceanBase

OceanBase Enterprise

Run and manage OceanBase on your infra

TRY OPEN SOURCE

OceanBase Community Edition

The free, open-source distributed database

OceanBase seekdb

Open source AI native search database

Customer Stories

Real-world success stories from enterprises across diverse industries.

View All
BY USE CASES

Mission-Critical Transactions

Global & Multicloud Application

Elastic Scaling for Peak Traffic

Real-time Analytics

Active Geo-redundancy

Database Consolidation

Comprehensive knowledge hub for OceanBase.

Blog

Live Demos

Training & Certification

Documentation

Official technical guides, tutorials, API references, and manuals for all OceanBase products.

View All
PRODUCTS
OceanBase CloudOceanBase Database
ToolsConnectors and Middleware
QUICK START
OceanBase CloudOceanBase Database
BEST PRACTICES

Practical guides for utilizing OceanBase more effectively and conveniently

Learn more about OceanBase – our company, partnerships, and trust and security initiatives.

About OceanBase

Partner

Trust Center

Contact Us

Start on Cloud
编组
All Products
    • Databases
    • iconOceanBase Database
    • iconOceanBase Cloud
    • iconOceanBase Tugraph
    • iconInteractive Tutorials
    • iconOceanBase Best Practices
    • Tools
    • iconOceanBase Cloud Platform
    • iconOceanBase Migration Service
    • iconOceanBase Developer Center
    • iconOceanBase Migration Assessment
    • iconOceanBase Admin Tool
    • iconOceanBase Loader and Dumper
    • iconOceanBase Deployer
    • iconKubernetes operator for OceanBase
    • iconOceanBase Diagnostic Tool
    • iconOceanBase Binlog Service
    • Connectors and Middleware
    • iconOceanBase Database Proxy
    • iconEmbedded SQL in C for OceanBase
    • iconOceanBase Call Interface
    • iconOceanBase Connector/C
    • iconOceanBase Connector/J
    • iconOceanBase Connector/ODBC
    • iconOceanBase Connector/NET
icon

OceanBase Tugraph

V3.3.3Enterprise Edition

  • Guide
    • What is a graph
    • What is a graph database
    • TuGraph Quick Start
  • Operating
    • Introduction
    • Installation
    • Data Importing
    • Service configuration
    • Service operations
    • Tools
      • tugraph_cypher Instructions
      • TuGraph Browser
      • TuGraph DataX Instructions
      • TuGraph Explore Instructions
    • High Availability mode
    • Database Management
    • User rights Management
  • Developer Document
    • TuGraph RESTful API
    • TuGraph-Cypher
    • TuGraph Stored Procedure Guide
    • Graph Analytics Engine
      • Bootstrap program
      • OlapBase API
      • OlapOnDB API
      • OlapOnDisk API
      • TuGraph Built-in Algorithm Description
  • Client
    • TuGraph Java SDK
    • TuGraph Python SDK
    • TuGraph C++ SDK
  • Supplement
    • Update the content description
  • Community
    • TuGraph Contribution Guide
    • TuGraph community roles
    • TuGraph Open source planning
    • Ant_Group_Open_Source_Individual_CLA_English_Chinese_2021
    • Ant_Group_Open_Source_Corporate_CLA_English_Chinese_2021

Download PDF

What is a graph What is a graph database TuGraph Quick Start Introduction Installation Data Importing Service configuration Service operations tugraph_cypher Instructions TuGraph Browser TuGraph DataX Instructions TuGraph Explore Instructions High Availability mode Database Management User rights Management TuGraph RESTful API TuGraph-Cypher TuGraph Stored Procedure Guide Bootstrap program OlapBase API OlapOnDB API OlapOnDisk API TuGraph Built-in Algorithm Description TuGraph Java SDK TuGraph Python SDK TuGraph C++ SDK Update the content description TuGraph Contribution Guide TuGraph community roles TuGraph Open source planningAnt_Group_Open_Source_Individual_CLA_English_Chinese_2021Ant_Group_Open_Source_Corporate_CLA_English_Chinese_2021
OceanBase logo

The Unified Distributed Database for the AI Era.

Follow Us
Products
OceanBase CloudOceanBase EnterpriseOceanBase Community EditionOceanBase seekdb
Resources
DocsBlogLive DemosTraining & Certification
Company
About OceanBaseTrust CenterLegalPartnerContact Us
Follow Us

© OceanBase 2026. All rights reserved

Cloud Service AgreementPrivacy PolicySecurity
Contact Us
Document Feedback
  1. Documentation Center
  2. OceanBase Tugraph
  3. V3.3.3
iconOceanBase Tugraph
V 3.3.3Enterprise Edition

User rights Management

Last Updated:2023-06-25 03:23:24  Updated
share
What is on this page
Introduce
Level of permissions
Permission keyword
Common permission operations
User action
# Role actions
Assign roles to users
Role empowerment

folded

share

Introduce

The permissions of TuGraph are managed based on role-based access control. The permissions that define access control are assigned to roles, and the roles are then assigned to users.

Level of permissions

  • Global layer: indicates global permissions, which have permissions for management and graph operations.
  • Graph layer: control permissions on each graph;
  • Property level (Commercial version only) : control permissions on a property

Permission keyword

At present, the control of permissions is relatively simple

  • The Global layer currently has admin permission, and the admin user is preset.
  • The Graph layer has four operation permissions: none, read, write, and full
  • none: No permission, no operation permission for the graph
  • read: Read-only permission, only has read permission for the graph
  • write: Read and write permission, not only has read permission for the graph, but also has write permission
  • full: All permissions, not only have read and write permissions for graphs, but also have permissions to delete graphs, modify graphs, and modify schemas
  • The Property layer (Commercial version only) has the following permissions: none, read, and write
  • none: No permission, no operation permission for the property
  • read: Read-only permission, only has read permission for the property
  • write: Read and write permission, not only has read permission for the property, but also has write permission

Common permission operations

User action

  • Creating a user
CALL dbms.security.createUser(user_name::STRING,password::STRING)
  • Deleting a user
CALL dbms.security.deleteUser(user_name::STRING)
  • Change the password of the current user
CALL dbms.security.changePassword(current_password::STRING,new_password::STRING)
  • Changes the password of a specified user

CALL dbms.security.changeUserPassword(user_name::STRING,new_password::STRING)
  • Disable or enable a user
CALL dbms.security.disableUser(user::STRING,disable::BOOLEAN)
  • List all users
CALL dbms.security.listUsers()
  • Lists the current user information
CALL dbms.security.showCurrentUser()
  • Obtain user details
CALL dbms.security.getUserInfo(user::STRING)

# Role actions

  • Create a role
CALL dbms.security.createRole(role_name::STRING,desc::STRING)
  • Delete a role
CALL dbms.security.deleteRole(role_name::STRING
  • List all characters
CALL dbms.security.listRoles()
  • Disable or enable the role
CALL dbms.security.disableRole(role::STRING,disable::BOOLEAN)

Assign roles to users

  • Adds the association between the user and the role
CALL dbms.security.addUserRoles(user::STRING,roles::LIST)
  • Deletes the association between the user and the role

CALL dbms.security.deleteUserRoles(user::STRING,roles::LIST)

  • Clears the relationship between user roles and rebuilds them
CALL dbms.security.rebuildUserRoles(user::STRING,roles::LIST)

Role empowerment

  • Modifies the access permission of a role to a specified graph
CALL dbms.security.modSpecifiedAccessLevel(role::STRING,access_level::MAP)

Previous topic

Database Management
Last

Next topic

TuGraph RESTful API
Next
What is on this page
Introduce
Level of permissions
Permission keyword
Common permission operations
User action
# Role actions
Assign roles to users
Role empowerment