Vertica Blog


What’s New in Vertica 9.0.1: Security and Authentication

This blog post was authored by Soniya Shah. In this release, we introduce some security enhancements. We’ve added the ability to grant and revoke privileges on system tables, using the same syntax as you would for granting and revoking on tables. However, there are some limitations about the types of privileges you can use with […]

Building a Secure Vertica Environment

This blog post was authored by Soniya Shah. Vertica has a client-server architecture system, where applications that reside on the client access the Vertica cluster through drivers including ODBC, JDBC, OLEDB and ADO.NET. This post discusses secure client to server communications, authenticating access to Vertica, and administrator access. Method Vertica Options Authentication: Validate user credentials […]

LDAP and User Accounts

This blog post was authored by Soniya Shah. If you are a database administrator, you probably need to authenticate users in Vertica. There are many methods users can use to authenticate, including Ident, Kerberos, LDAP, and hash. This blog walks you through the steps to take if you want to authenticate some users using LDAP […]

Customize Your Security Authentication in Vertica

Learn more about authentication methods in Vertica. 

Best Practices for Using LDAP Link with Vertica

There are a few best practices that you should follow to make sure that you don’t accidentally lose any users or data. This blog explains how to keep your LDAP Link service working smoothly.

What’s New in 8.0: FIPS Compliance

Data security is an important part of managing your big data. Learn more about FIPS compliance with Vertica 8.0. 

Classified: FAQs on Access Policies

In Vertica 7.2.2 we’ve added more security features, including a row-level access policy option. Combined with our previously existing column access policy, Vertica verifies that your data is more secure than ever.

User Security Auditing in Vertica

Are you a database administer who manages users and roles in your Vertica database? Do you need to keep track of who has permission to access certain database objects?

If so, here’s a quick guide to queries that help you review the users, roles, privileges, and permissions that you have configured in your database. These queries access one or more Vertica system tables to retrieve this information.

Data-Centric Security: Vertica and SecureData

Take advantage of the recent integration of HPE Vertica and HPE SecureData. This integration allows you to keep your data protected when it flows across multiple systems spread across multiple data centers on premise or in the cloud.

Using Inherited Privileges

New to Vertica 7.2.0, the inherited privileges feature provides a one-step method for enabling privileges at the schema level.