Security and CDC
Security for CDC is applied through Access Control Expressions (ACEs). In addition, if a secure cluster configuration is implemented, then additional setup may be needed depending on the configuration.
Access Control Expressions (ACEs)
Since Change Data Capture (CDC) changed data records are propagated from a HPE Data Fabric Database source table to a HPE Data Fabric Streams stream topic, use the access control expressions (ACEs) on the source table and destination stream for establishing permissions.
Once a HPE Data Fabric Streams stream is created for purposes of receiving change data records, it is dedicated for that sole purpose. For example, a producer application should not perform CRUD operations on the topics in the stream.
The following permissions are applicable depending on the scenario:
- If you are a normal user and you want to create a changelog from a source table and to a
          destination stream topic, the following permissions are required: 
replpermon the source table in the source clustertopicpermon the destination stream in the destination cluster
 - If you are a normal user and want to create a changelog between your own HPE Data Fabric Database table
          and someone else's stream topic, you must be granted 
topicpermpermissions on the destination stream. - If you are a normal user and want to receive or read the data in a stream topic, you
          must be granted 
consumepermpermission on the destination topic. 
For more information about ACEs, see Managing Access Control Expressions
Secure Clusters
The destination HPE Data Fabric Streams stream could be in same cluster as the HPE Data Fabric Database source table or it could be on a remote Data Fabric cluster. The configuration setup depends on the purpose for using CDC.
- If your destination stream is on the same cluster as the source table and the cluster is secure, then additional configurations are not required.
 - If your destination stream is on a remote secure cluster, then a gateway and secure configuration must be setup. See Table Replication, Administering Data Fabric Gateways, and Configuring Secure Clusters for Cross-Cluster Mirroring and Replication