Cluster and cache operations can be restricted, intercepted and modifed, or completely blocked based on configured access rights set for the various cluster components.
To use authorization for client/server systems, your client connections must be authenticated by their servers.
Authorizers used during query execution, how to configure them and how to implement your own.
This topic discusses the authorization examples provided in the product under geode-core/src/main/java/org/apache/geode/examples/security
.