Security and Access Control
In this section, we focus on two groups of topics: security and access control.
For security, data can be encrypted using various methods, including TLS and AES. CData Virtuality is committed to protecting the users' data and we comply with the relevant data security regulations.
CData Virtuality supports several types of authentication (LDAP, Kerberos, and SSO) and the use of Azure Key Vault as a credential store.
Access control is ensured using data roles, permissions, and row and column-based security. In addition, it is possible to show or hide any objects - schemas, tables, views, procedures, or columns - in metadata using role permissions.
Finally, CData Virtuality supports audit logging and user activity monitoring.
For more details on each of these topics, see the subpages.