Authentication

    How To Configure A ‘Kerberized’ Kafka Deployment For ClickHouse®

    Learn how to configure Kerberos for Kafka and ClickHouse to benefit from a centralized authentication and authorization service. This article explains how to deploy Kafka, Zookeeper and Clickhouse and configure them to authenticate via Kerberos showcasing the process with a…

    Integrating ClickHouse® with LDAP (Part Two)

    This article continues to explore ClickHouse LDAP integration, focusing on how enterprises can unify their ClickHouse installations with the rest of their services that use LDAP.

    Integrating ClickHouse® with LDAP (Part One)

    ClickHouse has traditionally used XML configuration files to define server configuration including all database users. The users.xml configuration file or separate configuration files inside the /etc/clickhouse-server/users.d directory define users and properties associated with them such as profiles, network restrictions, quotas,…

    Goodbye XML, hello SQL! ClickHouse® User Management Goes Pro

    Access control is one of the essential features of database management. Starting in late 2019 ClickHouse contributor Vitaly Baranov began to introduce robust, full-featured Role Based Access Control (RBAC). As a result of this work–which included a huge number of…