This page was last edited on April 26, 2017, at 21:01.
Comments or questions about this documentation? Contact us for support!
This article describes how to tune secure access from your Co-browse Server to external Cassandra. Starting from 8.5.1, you can secure the following when using external Cassandra:
You can secure your access interfaces based on an authentication and authorization scheme. In other words, Cassandra needs to know:
With the default setup, anybody can access any data. To secure access interfaces from Co-browse Server to external Cassandra, you must:
Configure Cassandra by editing <Cassandra installation directory>/conf/cassandra.yaml.
To set up a new Cassandra user, use a Cassandra client tool like dbeaver or cqlsh:
Start by connecting to Cassandra using the default superuser name and password, cassandra/cassandra. The following examples use dbeaver and cqlsh as examples but you can use a different Cassandra client:
Use the CREATE USER CQL statement to create another superuser. For example:
CREATE USER IF NOT EXISTS <new_cobrowse_user> WITH PASSWORD 'new_password' SUPERUSER
Use the GRANT CQL statement to grant access permisions. For example:
GRANT ALL PERMISSIONS ON <cobrowse_keyspace> TO <new_cobrowse_user>
CQL also supports the authorization statements GRANT, LIST PERMISSIONS, and REVOKE.
Optionally, you can now deactivate the default superuser cassandra:
Use the login information of the superuser you created to configure the Cassandra Resource Access Point: