Stardog’s security model is based on standard role-based access control: users have permissions over resources during sessions; permissions can be grouped into roles; and roles can be assigned to users. Read more about permissions in Stardog.
The table below contains the CLI commands to administer users in Stardog. Select any of the commands to view their manual page.
| ||Adds a new user.|
| ||Assigns a role to a user.|
| ||Disables a user so that the username can no longer be used to login.|
| ||Enables a user so that the username can be used for login.|
| ||Grants a user permission to perform a specific action against a resource within Stardog.|
| ||Lists all users.|
| ||Changes user password.|
| ||List a user’s permissions|
| ||Removes a user.|
| ||Removes a role from a user.|
| ||Revoke a permission held by a user.|