...
Operation | Database Read Access | Database Write Access | Table Read Access | Table Write Access |
---|---|---|---|---|
LOAD |
|
|
| X |
EXPORT |
|
| X |
|
IMPORT |
|
|
| X |
CREATE TABLE |
| X |
|
|
CREATE TABLE AS SELECT |
| X | X |
|
DROP TABLE |
| X |
|
|
SELECT |
|
| X |
|
ALTER TABLE |
|
|
| X |
SHOW TABLES | X |
|
|
|
Caution: This authorization model does not prevent malicious users from doing bad things, because of the way authorization is currently implemented in Hive. See the Known Issues section below.
...