Skip to main content
Skip table of contents

Security and Access Control

In this section, we focus on two groups of topics: security and access control.

For security, data can be encrypted using various methods, including TLS and AES. CData Virtuality is committed to protecting the users' data and we comply with the relevant data security regulations.

CData Virtuality supports several types of authentication (LDAP, Kerberos, and SSO) and the use of Azure Key Vault as a credential store.

Access control is ensured using data roles, permissions, and row and column-based security. In addition, it is possible to show or hide any objects - schemas, tables, views, procedures, or columns - in metadata using role permissions.

Finally, CData Virtuality supports audit logging and user activity monitoring.

For more details on each of these topics, see the subpages.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.