diff --git a/docs/operations/security-user-auth.md b/docs/operations/security-user-auth.md index 31815995d3c..dad2a6b7cc8 100644 --- a/docs/operations/security-user-auth.md +++ b/docs/operations/security-user-auth.md @@ -50,6 +50,8 @@ In practice, most deployments will only need to define two classes of users: It is important to note that WRITE access to DATASOURCE grants a user broad access. For instance, such users will have access to the Druid file system, S3 buckets, and credentials, among other things. As such, the ability to add and manage datasources should be allocated selectively to administrators. +`WRITE` permission on a resource does not include `READ` permission. If a user requires both `READ` and `WRITE` permissions on a resource, you must grant them both explicitly. For instance, a user with only `DATASOURCE READ` permission +might have access to an API or a system schema record that a user with `DATASOURCE WRITE` permission would not have access to. ## Default user accounts