Granting Authorization Access to Namespaces

You can add and one or more namespaces to your store, create tables within them, and grant permission for users to access namespaces and tables. These are the applicable permissions to supply developers and other users:
Privilege Description

CREATE_ANY_NAMESPACE

DROP_ANY_NAMESPACE

Grant permission to a role to create or drop any namespace:
GRANT CREATE_ANY_NAMESPACE TO user_role;
GRANT DROP_ANY_NAMESPACE TO user_role;

CREATE_TABLE_IN_NAMESPACE

DROP_TABLE_IN_NAMESPACE

EVOLVE_TABLE_IN_NAMESPACE

Grant permission to a role to create, drop, or evolve tables in a specific namespace:
GRANT CREATE_TABLE_IN_NAMESPACE ON NAMESPACE namespace TO user_role; 
GRANT DROP_TABLE_IN_NAMESPACE ON NAMESPACE  namespace TO user_role;
GRANT EVOLVE_TABLE_IN_NAMESPACE ON NAMESPACE namespace TO user_role;

CREATE_INDEX_IN_NAMESPACE

DROP_INDEX_IN_NAMESPACE

Grant permission to a role to create or drop an index in a specific namespace:
GRANT CREATE_INDEX_IN_NAMESPACE ON NAMESPACE namespace TO user_role; 
GRANT DROP_INDEX_IN_NAMESPACE ON NAMESPACE namespace TO user_role;

READ_IN_NAMESPACE

INSERT_IN_NAMESPACE

DELETE_IN_NAMESPACE

Grant permission to a role to read, insert, or delete items in a specific namespace. Currently, this applies only to tables in namespaces, but could apply to other objects in future releases::
GRANT READ_IN_NAMESPACE ON NAMESPACE namespace TO user_role; 
GRANT INSERT_IN_NAMESPACE ON NAMESPACE  namespace TO user_role;
GRANT DELETE_IN_NAMESPACE ON NAMESPACE namespace TO user_role;

MODIFY_IN_NAMESPACE

Grant or revoke permission to a role to all DDL privileges for a specific namespace:
GRANT MODIFY_IN_NAMESPACE ON NAMESPACE namespace TO user_role; 
REVOKE MODIFY_IN_NAMESPACE ON NAMESPACE namespace TO user_role;