Introduction min read


This guide covers security administration. First, you will learn how to securely deploy MemSQL in a reduced-privileges, role-separated environment. Second, you will learn how to configure row-level security. Finally, you will learn how to synchronize permissions across your cluster.