Stardog’s security model is based on standard role-based access control: users have permissions over resources during sessions; permissions can be grouped into roles; and roles can be assigned to users. Read more about permissions in Stardog.
The table below contains the CLI commands to administer roles in Stardog. Select any of the commands to view their manual page.
| ||Adds a new role.|
| ||Grants a permission to a role.|
| ||Lists all roles.|
| ||Lists the permissions associated to a role.|
| ||Removes an existing user role.|
| ||Revokes a permission associated to a role|