Users
SQLite Cloud provides secure access to resources through role-based authorization, which ensures user isolation and enhances security and manageability. In SQLite Cloud, roles serve as the foundation blocks for user access, and the level of user access to the database system is determined by the assigned roles. Users have no access to the system outside the designated roles.
You can manage your cluster’s users via the SQLite Cloud Dashboard under the Users section.
Creating a User
To add a new user to your cluster:
- Navigate to the Users section in the left sidebar.
- Click the + button next to the search bar.
- In the Create User modal, enter the User Name.
- Enter a Password or use the Generate button to create a secure one automatically.
- Confirm the password and click Create.
Managing User Status
Once a user is selected from the list, you can manage their lifecycle using the controls in the top right corner or the context menu (three dots) next to their name in the list.
- Disable User: Click Disable User to temporarily revoke access without deleting the account or its configurations.
- Rename: Change the username while preserving assigned roles and keys.
- Delete: Permanently remove the user from the cluster.
User Configuration & Password Rotation
You can update a user’s password at any time through the Configuration tab.
- Select the user from the list.
- Click on the Configuration tab.
- Enter the New Password and confirm it in the Confirm Password field.
- Click Update Password.
Assigning Roles
The Roles tab allows you to control what a user can do. A user can have multiple roles, and the combination of these roles determines their effective permissions.
Granting a Role
The Grant Roles interface allows you to assign roles with precise scoping (limiting a role to specific databases or tables) directly from the assignment screen.
- Select the user and ensure you are on the Roles tab.
- Click the Grant Roles button.
- Select Scope (Optional): By default, roles apply to all databases (
*) and all tables (*). You can restrict the role by selecting a specific Database and Table from the dropdowns at the top. - Select Roles: Browse the list of roles. You can filter by Built-in or Custom roles using the radio buttons, or use the search bar to find a specific role.
- Check the box next to the role(s) you wish to assign.
- Click Grant.
Revoking a Role
To remove a role from a user:
- In the Roles tab, find the role in the list.
- Click the context menu (three dots) on the right side of the role row.
- Select Delete.
User API Keys
Authentication is primarily handled via API Keys. You can generate multiple keys specific to a user, which inherit that user’s permissions. These keys inherit the user’s permissions and are ideal for programmatic access, SDKs, and REST API usage
Creating an API Key
- Select the user and switch to the API Keys tab.
- Click Create API Key.
- Name: Give the key a descriptive name (e.g., “Production App”, “Testing Script”).
- Expiration: Choose whether the key Never expires or Set expiration date to have it automatically invalidate after a specific time.
- Click Create.
Managing API Keys
Existing keys are listed in the API Keys tab. From here you can:
- View Details: See the key name, masked value, creation date, and expiration status.
- Regenerate: If a key is compromised, use the context menu to Regenerate it. This invalidates the old key string and provides a new one immediately.
- Delete: Permanently remove an API Key to revoke access for any application using it.