Hi, If you want to just secure OpsCenter itself take a look here: http://www.datastax.com/documentation/opscenter/4.1/opsc/configure/opscAssigningAccessRoles_t.html
If you want to enable internal authentication and still allow OpsCenter access, you can create an OpsCenter user and once you have auth turned within the cluster update the cluster config with the user name and password for the OpsCenter user. Depending on your installation type you will find the cluster config in one of the following locations: Packaged installs: /etc/opscenter/clusters/<cluster_specific>.conf Binary installs: <install_location>/conf/clusters/<cluster_specific>.conf Windows installs: Program Files (x86)\DataStax Community\opscenter\conf\clusters\<cluster_specific>.conf Open the file and update the username and password values under the [cassandra] section: [cassandra] username = seed_hosts = api_port = password = After changing properties in this file, restart OpsCenter for the changes to take effect. Mark On Sat, Apr 5, 2014 at 6:54 AM, Check Peck <comptechge...@gmail.com> wrote: > Hi All, > > We would like to secure our Cassandra database. We don't want anybody to > read/write on our Cassandra database leaving our team members only. > > > > We are using Cassandra 1.2.9 in Production and we have 36 node Cassandra > cluster. 12 in each colo as we have three datacenters. > > > But we would like to have OPSCENTER working as it is working currently. > > > > Is this possible to do anyhow? Is there any settings in yaml file which we > can enforce? > > > > > > *Raihan Jamal* > > >