Kinetica's security model is similar to most SQL databases. Permissions are defined on individual tables, collections of tables, and the Kinetica instance itself. Users can be added to the database and assigned these permissions. Roles can be created and assigned permissions, with all users added to those roles getting the related permissions. Roles can also be added to a role, with the lower level role inheriting the permissions of the higher level role. The permissions a user has is the union of all permissions granted individually to the user and through roles. In all these ways, security in Kinetica is similar to what you have seen in most databases.
Where Kinetica security differs, is in the creation of users and some specifics about the permissions.
[a-z_][a-z_0-9]\*
NOTE: Once authenticated, user authorization does not distinguish between internal and external users
[a-z_][a-z_0-9]\*
Kinetica has two separate sets of permissions: system-level and table-level.
Role endpoints require system_admin permission
Reminder: Users can't grant access to tables they create; need a 3rd party user with system_admin permission