Access permissions
This article describes the clique access rules and how to request them.
Authentication
Users are authenticated in CHYT in the same way as in YTsaurus — using a token from YTsaurus (for more information, see Authentication).
Access types
Upon receiving a query, CHYT checks for two types of permissions:
- 
Permissions to access clique resources
When receiving a query, the clique checks whether the user that made the query has the permission to use the clique.- To execute SQL queries, you need the 
usepermission. - To modify, view, and delete a clique configuration, you need the 
manage,read, andremovepermissions. 
Clique permissions are stored in a dedicated system node called Access Control Object. It's located at the path
//sys/access_control_object_namespaces/chyt/<alias>/principaland is generated automatically for each clique created with the CHYT Controller.Clique permissions only control access to the computational resources of the cliques themselves.
 - To execute SQL queries, you need the 
 - 
Data access permissions
When accessing any data in YTsaurus, the user's read/write access to all referenced tables is verified according to the standard ACL mechanism implemented in YTsaurus. This verification ensures secure data access.