diff --git a/client/tarantool/main.h b/client/tarantool/main.h
index fd809f6d3611ae2d1e68506aabd30eb905db6ac4..cd77b9d65773134ac214a6029fa5db3641c2f212 100644
--- a/client/tarantool/main.h
+++ b/client/tarantool/main.h
@@ -33,7 +33,7 @@
 #define TC_VERSION_MINOR "3"
 
 #define TC_DEFAULT_HOST "localhost"
-#define TC_DEFAULT_PORT 33013
+#define TC_DEFAULT_PORT 3301
 #define TC_DEFAULT_ADMIN_PORT 33015
 #define TC_DEFAULT_HISTORY_FILE ".tarantool_history"
 
diff --git a/extra/schema_erase.lua b/extra/schema_erase.lua
index ce0d2f094a1785d5a727f168cfd12d67c975cd31..6ee9acfee3d7e9cb7e70b39e1a94d3e6277ff820 100644
--- a/extra/schema_erase.lua
+++ b/extra/schema_erase.lua
@@ -1,6 +1,9 @@
 _schema = box.space[box.schema.SCHEMA_ID]
 _space = box.space[box.schema.SPACE_ID]
 _index = box.space[box.schema.INDEX_ID]
+_user = box.space[box.schema.USER_ID]
+_func = box.space[box.schema.FUNC_ID]
+_priv = box.space[box.schema.PRIV_ID]
 -- destroy everything - save snapshot produces an empty snapshot now
 _schema:run_triggers(false)
 _schema:truncate()
@@ -8,4 +11,9 @@ _space:run_triggers(false)
 _space:truncate()
 _index:run_triggers(false)
 _index:truncate()
-
+_user:run_triggers(false)
+_user:truncate()
+_func:run_triggers(false)
+_func:truncate()
+_priv:run_triggers(false)
+_priv:truncate()
diff --git a/extra/schema_fill.lua b/extra/schema_fill.lua
index b9170c45828a31bd01ac802bd0506a80fb7885ac..0fc6caf1debf1d6d41b580189683967cb911b1bc 100644
--- a/extra/schema_fill.lua
+++ b/extra/schema_fill.lua
@@ -1,20 +1,52 @@
+-- Super User ID
+GUEST = 0
+ADMIN = 1
 _schema = box.space[box.schema.SCHEMA_ID]
 _space = box.space[box.schema.SPACE_ID]
 _index = box.space[box.schema.INDEX_ID]
+_func = box.space[box.schema.FUNC_ID]
+_user = box.space[box.schema.USER_ID]
+_priv = box.space[box.schema.PRIV_ID]
 -- define schema version
 _schema:insert{'version', 1, 6}
 -- define system spaces
-_space:insert{_schema.n, 0, '_schema'}
-_space:insert{_space.n, 0, '_space'}
-_space:insert{_index.n, 0, '_index'}
+_space:insert{_schema.n, ADMIN, '_schema', 0}
+_space:insert{_space.n, ADMIN, '_space', 0}
+_space:insert{_index.n, ADMIN, '_index', 0}
+_space:insert{_func.n, ADMIN, '_func', 0}
+_space:insert{_user.n, ADMIN, '_user', 0}
+_space:insert{_priv.n, ADMIN, '_priv', 0}
 -- define indexes
 _index:insert{_schema.n, 0, 'primary', 'tree', 1, 1, 0, 'str'}
 
+-- stick to the following convention:
+-- prefer user id (owner id) in field #1
+-- prefer object name in field #2
+-- index on owner id is index #1
+-- index on object name is index #2
+--
 -- space name is unique
 _index:insert{_space.n, 0, 'primary', 'tree', 1, 1, 0, 'num'}
-_index:insert{_space.n, 1, 'name', 'tree', 1, 1, 2, 'str'}
+_index:insert{_space.n, 1, 'owner', 'tree', 0, 1, 1, 'num'}
+_index:insert{_space.n, 2, 'name', 'tree', 1, 1, 2, 'str'}
 
 -- index name is unique within a space
 _index:insert{_index.n, 0, 'primary', 'tree', 1, 2, 0, 'num', 1, 'num'}
-_index:insert{_index.n, 1, 'name', 'tree', 1, 2, 0, 'num', 2, 'str'}
+_index:insert{_index.n, 2, 'name', 'tree', 1, 2, 0, 'num', 2, 'str'}
+-- user name and id are unique
+_index:insert{_user.n, 0, 'primary', 'tree', 1, 1, 0, 'num'}
+_index:insert{_user.n, 2, 'name', 'tree', 1, 1, 2, 'str'}
+-- function name and id are unique
+_index:insert{_func.n, 0, 'primary', 'tree', 1, 1, 0, 'num'}
+_index:insert{_func.n, 1, 'owner', 'tree', 0, 1, 1, 'num'}
+_index:insert{_func.n, 2, 'name', 'tree', 1, 1, 2, 'str'}
+--
+-- space schema is: grantor id, user id, object_type, object_id, privilege
+-- primary key: user id, object type, object id
+_index:insert{_priv.n, 0, 'primary', 'tree', 1, 3, 1, 'num', 2, 'str', 3, 'num'}
+_index:insert{_priv.n, 1, 'owner', 'tree', 0, 1, 1, 'num'}
+
 -- 
+-- Pre-create user and grants
+_user:insert{GUEST, '', 'guest'}
+_user:insert{ADMIN, '', 'admin'}
diff --git a/src/CMakeLists.txt b/src/CMakeLists.txt
index a4f6990bca3615131c65289d38f97e4df15187d0..d1f8cac069e55235baf727a9e507f0bd2ff71501 100644
--- a/src/CMakeLists.txt
+++ b/src/CMakeLists.txt
@@ -72,6 +72,8 @@ set (common_sources
      say.c
      fio.c
      crc32.c
+     random.c
+     scramble.c
      tbuf.c
      opts.c
      cpu_feature.c
diff --git a/src/admin.cc b/src/admin.cc
index bcb22099ed37a5e9db18a5c8d7f4cec8fe0a14aa..15ee0af3249ff3c82d572079d33946be69ac68e0 100644
--- a/src/admin.cc
+++ b/src/admin.cc
@@ -88,7 +88,9 @@ admin_handler(va_list ap)
 	 * a remote client: it's used in Lua
 	 * stored procedures.
 	 */
-	(void) session_create(coio.fd, *(uint64_t *) addr);
+
+	session_set_user(session_create(coio.fd, *(uint64_t *) addr),
+			 ADMIN, ADMIN);
 
 	for (;;) {
 		if (admin_dispatch(&coio, iobuf, L) < 0)
diff --git a/src/bootstrap.snap b/src/bootstrap.snap
index c392eda096eb41250bec15c2e5d69636511e60a6..71d7828c44f874099567fc642e08e603799c4622 100644
Binary files a/src/bootstrap.snap and b/src/bootstrap.snap differ
diff --git a/src/box/CMakeLists.txt b/src/box/CMakeLists.txt
index 0dac09813a5628e03946c0167fd40954ae6617c6..980678e2f7cb40ed45900db3095211b43a5551f1 100644
--- a/src/box/CMakeLists.txt
+++ b/src/box/CMakeLists.txt
@@ -32,6 +32,8 @@ tarantool_module("box"
     request.cc
     txn.cc
     box.cc
+    access.cc
+    authentication.cc
     ${lua_sources}
     lua/call.cc
     lua/tuple.cc
diff --git a/src/box/access.cc b/src/box/access.cc
new file mode 100644
index 0000000000000000000000000000000000000000..a541a32345621e1883ad39323371adba77d4fb69
--- /dev/null
+++ b/src/box/access.cc
@@ -0,0 +1,174 @@
+/*
+ * Redistribution and use in source and binary forms, with or
+ * without modification, are permitted provided that the following
+ * conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above
+ *    copyright notice, this list of conditions and the
+ *    following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above
+ *    copyright notice, this list of conditions and the following
+ *    disclaimer in the documentation and/or other materials
+ *    provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY <COPYRIGHT HOLDER> ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+ * <COPYRIGHT HOLDER> OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
+ * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+#include "access.h"
+#include "assoc.h"
+#include "schema.h"
+
+struct user users[BOX_USER_MAX];
+/** Bitmap type for used/unused authentication token map. */
+typedef unsigned long user_map_t;
+
+/** A map to quickly look up free slots in users[] array. */
+user_map_t user_map[BOX_USER_MAX/(CHAR_BIT*sizeof(user_map_t)) + 1];
+
+int user_map_idx = 0;
+struct mh_i32ptr_t *user_registry;
+
+uint8_t
+user_map_get_slot()
+{
+        uint32_t idx = __builtin_ffsl(user_map[user_map_idx]);
+        while (idx == 0) {
+		if (user_map_idx == sizeof(user_map)/sizeof(*user_map))
+			panic("Out of slots for new users");
+
+		user_map_idx++;
+                idx = __builtin_ffsl(user_map[user_map_idx]);
+        }
+        /*
+         * find-first-set returns bit index starting from 1,
+         * or 0 if no bit is set. Rebase the index to offset 0.
+         */
+        idx--;
+	if (idx == BOX_USER_MAX) {
+		/* A cap on the number of users was reached. */
+		tnt_raise(LoggedError, ER_USER_MAX, BOX_USER_MAX);
+	}
+	user_map[user_map_idx] ^= ((user_map_t) 1) << idx;
+	idx += user_map_idx * sizeof(*user_map) * CHAR_BIT;
+	assert(idx < UINT8_MAX);
+	return idx;
+}
+
+void
+user_map_put_slot(uint8_t auth_token)
+{
+	memset(users + auth_token, 0, sizeof(struct user));
+	uint32_t bit_no = auth_token & (sizeof(user_map_t) * CHAR_BIT - 1);
+	auth_token /= sizeof(user_map_t) * CHAR_BIT;
+	user_map[auth_token] |= ((user_map_t) 1) << bit_no;
+	if (auth_token > user_map_idx)
+		user_map_idx = auth_token;
+}
+
+const char *
+priv_name(uint8_t access)
+{
+	if (access & PRIV_R)
+		return "Read";
+	if (access & PRIV_W)
+		return "Write";
+	return "Execute";
+}
+
+void
+user_cache_replace(struct user *user)
+{
+	struct user *old = user_cache_find(user->uid);
+	if (old == NULL) {
+		uint8_t auth_token = user_map_get_slot();
+		old = users + auth_token;
+		assert(old->auth_token == 0);
+		old->auth_token = auth_token;
+	}
+	user->auth_token = old->auth_token;
+	*old = *user;
+	struct mh_i32ptr_node_t node = { old->uid, old };
+	mh_i32ptr_put(user_registry, &node, NULL, NULL);
+}
+
+void
+user_cache_delete(uint32_t uid)
+{
+	struct user *old = user_cache_find(uid);
+	if (old) {
+		assert(old->auth_token > ADMIN);
+		user_map_put_slot(old->auth_token);
+		old->auth_token = 0;
+		old->uid = 0;
+		mh_i32ptr_del(user_registry, uid, NULL);
+	}
+}
+
+/** Find user by id. */
+struct user *
+user_cache_find(uint32_t uid)
+{
+	mh_int_t k = mh_i32ptr_find(user_registry, uid, NULL);
+	if (k == mh_end(user_registry))
+		return NULL;
+	return (struct user *) mh_i32ptr_node(user_registry, k)->val;
+}
+
+/** Find user by name. */
+struct user *
+user_by_name(const char *name, uint32_t len)
+{
+	uint32_t uid = schema_find_id(SC_USER_ID, 2, name, len);
+	return user_cache_find(uid);
+}
+
+void
+user_cache_init()
+{
+	memset(user_map, 0xFF, sizeof(user_map));
+	user_registry = mh_i32ptr_new();
+	/*
+	 * Solve a chicken-egg problem:
+	 * we need a functional user cache entry for superuser to
+	 * perform recovery, but the superuser credentials are
+	 * stored in the snapshot. So, pre-create cache entries
+	 * for 'guest' and 'admin' users here, they will be
+	 * updated with snapshot contents during recovery.
+	 */
+	struct user guest;
+	memset(&guest, 0, sizeof(guest));
+	snprintf(guest.name, sizeof(guest.name), "guest");
+	user_cache_replace(&guest);
+	/* 0 is the auth token and user id by default. */
+	assert(guest.auth_token == GUEST &&
+	       guest.uid == GUEST &&
+	       users[guest.auth_token].uid == guest.uid);
+
+	struct user admin;
+	memset(&admin, 0, sizeof(admin));
+	snprintf(admin.name, sizeof(admin.name), "admin");
+	admin.uid = ADMIN;
+	user_cache_replace(&admin);
+	/* ADMIN is both the auth token and user id for 'admin' user. */
+	assert(admin.auth_token == ADMIN &&
+	       users[admin.auth_token].uid == ADMIN);
+}
+
+void
+user_cache_free()
+{
+	if (user_registry)
+		mh_i32ptr_delete(user_registry);
+}
diff --git a/src/box/access.h b/src/box/access.h
new file mode 100644
index 0000000000000000000000000000000000000000..ad53e9165230fc688572d1647093ba5f846714e1
--- /dev/null
+++ b/src/box/access.h
@@ -0,0 +1,153 @@
+#ifndef INCLUDES_TARANTOOL_BOX_ACCESS_H
+#define INCLUDES_TARANTOOL_BOX_ACCESS_H
+/*
+ * Redistribution and use in source and binary forms, with or
+ * without modification, are permitted provided that the following
+ * conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above
+ *    copyright notice, this list of conditions and the
+ *    following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above
+ *    copyright notice, this list of conditions and the following
+ *    disclaimer in the documentation and/or other materials
+ *    provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY <COPYRIGHT HOLDER> ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+ * <COPYRIGHT HOLDER> OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
+ * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+#include "iproto_constants.h"
+#include "key_def.h"
+#include "scramble.h"
+#include "fiber.h"
+#include "session.h"
+
+enum {
+	/* SELECT */
+	PRIV_R = 1,
+	/* INSERT, UPDATE, DELETE, REPLACE */
+	PRIV_W = 2,
+	/* CALL */
+	PRIV_X = 4,
+};
+
+/* Privilege name for error messages */
+const char *
+priv_name(uint8_t access);
+
+/**
+ * A cache entry for an existing user. Entries for all existing
+ * users are always present in the cache. The entry is maintained
+ * in sync with _user and _priv system spaces by system space
+ * triggers.
+ * @sa alter.cc
+ */
+struct user {
+	/** User id. */
+	uint32_t uid;
+	/** User password - hash2 */
+	char hash2[SCRAMBLE_SIZE];
+	/** User name - for error messages and debugging */
+	char name[BOX_NAME_MAX + 1];
+	/** Global privileges this user has on the universe. */
+	uint8_t universal_access;
+	/** An id in users[] array to quickly find user */
+	uint8_t auth_token;
+};
+
+/**
+ * For best performance, all users are maintained in this array.
+ * Position in the array is store in user->auth_token and also
+ * in session->auth_token. This way it's easy to quickly find
+ * the current user of the session.
+ * An auth token, instead of a direct pointer, is stored in the
+ * session because it make dropping of a signed in user safe.
+ * The same auth token (index in an array)
+ * is also used to find out user privileges when accessing stored
+ * objects, such as spaces and functions.
+ */
+extern struct user users[];
+
+/*
+ * Insert or update user object (a cache entry
+ * for user).
+ * This is called from a trigger on _user table
+ * and from trigger on _priv table, (in the latter
+ * case, only when making a grant on the universe).
+ *
+ * If a user already exists, update it, otherwise
+ * find space in users[] array and store the new
+ * user in it. Update user->auth_token
+ * with an index in the users[] array.
+ */
+void
+user_cache_replace(struct user *user);
+
+/**
+ * Find a user by id and delete it from the
+ * users cache.
+ */
+void
+user_cache_delete(uint32_t uid);
+
+/** Find user by id. */
+struct user *
+user_cache_find(uint32_t uid);
+
+/* Find a user by name. Used by authentication. */
+struct user *
+user_by_name(const char *name, uint32_t len);
+
+/**
+ * Return the current user.
+ *
+ * @todo: this doesn't account for the case when a user
+ * was dropped, its slot in users array was reused
+ * for a new user, and some sessions exist which still
+ * use the old auth_token. In this case, already
+ * authenticated sessions use grants of the new user,
+ * not the old one.
+ *
+ * This can be easily fixed by checking that uid of the
+ * user found by means of auth_token matches the uid
+ * stored in the session, and invalidating the session
+ * auth_token when it doesn't.
+ *
+ * Alternatively, one could invalidate the session
+ * auth_token whenever sc_version changes. Alternatively,
+ * one could invalidate auth_token in all sessions whenever
+ * any tuple in _user or _priv spaces is modified.
+ *
+ * None of these 3 solutions seems to be worth the while
+ * at the moment.
+ */
+#define user()							\
+({								\
+	struct session *s = fiber()->session;			\
+	uint8_t auth_token = s ? s->auth_token : (int) ADMIN;	\
+	struct user *u = &users[auth_token];			\
+	assert(u->auth_token == auth_token);			\
+	u;							\
+})
+
+/** Initialize the user cache and access control subsystem. */
+void
+user_cache_init();
+
+/** Cleanup the user cache and access control subsystem */
+void
+user_cache_free();
+
+#endif /* INCLUDES_TARANTOOL_BOX_ACCESS_H */
diff --git a/src/box/alter.cc b/src/box/alter.cc
index 3ff8239331f35f3c863f000d71423ae5f44166f1..292aba6a0f601e43c246e63b214d6a329364d116 100644
--- a/src/box/alter.cc
+++ b/src/box/alter.cc
@@ -28,28 +28,53 @@
  */
 #include "alter.h"
 #include "schema.h"
+#include "access.h"
 #include "space.h"
 #include "txn.h"
 #include "tuple.h"
 #include "fiber.h" /* for gc_pool */
 #include "scoped_guard.h"
+#include "third_party/base64.h"
 #include <new> /* for placement new */
 #include <stdio.h> /* snprintf() */
 #include <ctype.h>
 
 /** _space columns */
 #define ID			0
-#define ARITY			1
+#define UID			1
 #define NAME			2
-#define FLAGS			3
+#define ARITY			3
+#define FLAGS			4
 /** _index columns */
 #define INDEX_ID		1
 #define INDEX_TYPE		3
 #define INDEX_IS_UNIQUE		4
 #define INDEX_PART_COUNT	5
 
+/** _user columns */
+#define AUTH_DATA			3
+
+/** _priv columns */
+#define PRIV_OBJECT_TYPE	2
+#define PRIV_OBJECT_ID		3
+#define PRIV_ACCESS		4
+
 /* {{{ Auxiliary functions and methods. */
 
+void
+access_check_ddl(uint32_t owner_uid)
+{
+	struct user *user = user();
+	/*
+	 * Only the creator of the space or superuser can modify
+	 * the space, since we don't have ALTER privilege.
+	 */
+	if (owner_uid != user->uid && user->uid != ADMIN) {
+		tnt_raise(ClientError, ER_ACCESS_DENIED,
+			  "Write", user->name);
+	}
+}
+
 /**
  * Create a key_def object from a record in _index
  * system space.
@@ -125,6 +150,7 @@ space_def_create_from_tuple(struct space_def *def, struct tuple *tuple,
 			    uint32_t errcode)
 {
 	def->id = tuple_field_u32(tuple, ID);
+	def->uid = tuple_field_u32(tuple, UID);
 	def->arity = tuple_field_u32(tuple, ARITY);
 	int n = snprintf(def->name, sizeof(def->name),
 			 "%s", tuple_field_cstr(tuple, NAME));
@@ -143,6 +169,7 @@ space_def_create_from_tuple(struct space_def *def, struct tuple *tuple,
 			 (unsigned) SC_SYSTEM_ID_MIN,
 			 (unsigned) SC_SYSTEM_ID_MAX);
 	}
+	access_check_ddl(def->uid);
 }
 
 /* }}} */
@@ -413,6 +440,8 @@ alter_space_do(struct txn *txn, struct alter_space *alter,
 	 * the recovery phase.
 	 */
 	alter->new_space->engine = alter->old_space->engine;
+	memcpy(alter->new_space->access, alter->old_space->access,
+	       sizeof(alter->old_space->access));
 	/*
 	 * Change the new space: build the new index, rename,
 	 * change arity.
@@ -940,6 +969,7 @@ on_replace_dd_space(struct trigger * /* trigger */, void *event)
 		 */
 		trigger_set(&txn->on_rollback, &drop_space_trigger);
 	} else if (new_tuple == NULL) { /* DELETE */
+		access_check_ddl(old_space->def.uid);
 		/* Verify that the space is empty (has no indexes) */
 		if (old_space->index_count) {
 			tnt_raise(ClientError, ER_DROP_SPACE,
@@ -1016,7 +1046,8 @@ on_replace_dd_index(struct trigger * /* trigger */, void *event)
 	uint32_t id = tuple_field_u32(old_tuple ? old_tuple : new_tuple, ID);
 	uint32_t iid = tuple_field_u32(old_tuple ? old_tuple : new_tuple,
 				       INDEX_ID);
-	struct space *old_space = space_find(id);
+	struct space *old_space = space_cache_find(id);
+	access_check_ddl(old_space->def.uid);
 	Index *old_index = space_index(old_space, iid);
 	struct alter_space *alter = alter_space_new();
 	auto scoped_guard =
@@ -1040,6 +1071,417 @@ on_replace_dd_index(struct trigger * /* trigger */, void *event)
 	scoped_guard.is_active = false;
 }
 
+/* {{{ access control */
+
+/** True if the space has records identified by key 'uid'
+ * Uses 'owner' index.
+ */
+bool
+space_has_data(uint32_t id, uint32_t iid, uint32_t uid)
+{
+	struct space *space = space_by_id(id);
+	if (space == NULL)
+		return false;
+
+	Index *index = space_index(space, iid);
+	if (index == NULL)
+		return false;
+	assert(strcmp(index->key_def->name, "owner") == 0);
+	struct iterator *it = index->position();
+	char key[6];
+	assert(mp_sizeof_uint(SC_SYSTEM_ID_MIN) <= sizeof(key));
+	mp_encode_uint(key, uid);
+
+	index->initIterator(it, ITER_EQ, key, 1);
+	if (it->next(it))
+		return true;
+	return false;
+}
+
+bool
+user_has_data(uint32_t uid)
+{
+	uint32_t spaces[] = { SC_SPACE_ID, SC_FUNC_ID, SC_PRIV_ID };
+	uint32_t *end = spaces + sizeof(spaces)/sizeof(*spaces);
+	for (uint32_t *i = spaces; i < end; i++) {
+		if (space_has_data(*i, 1, uid))
+			return true;
+	}
+	return false;
+}
+
+/** Supposedly a user may have many authentication mechanisms
+ * defined, but for now we only support chap-sha1. Get
+ * password of chap-sha1 from the _user space.
+ */
+
+void
+user_fill_auth_data(struct user *user, const char *auth_data)
+{
+	if (mp_typeof(*auth_data) != MP_MAP)
+		return;
+	uint32_t mech_count = mp_decode_map(&auth_data);
+	for (uint32_t i = 0; i < mech_count; i++) {
+		if (mp_typeof(*auth_data) != MP_STR) {
+			mp_next(&auth_data);
+			mp_next(&auth_data);
+			continue;
+		}
+		uint32_t len;
+		const char *mech_name = mp_decode_str(&auth_data, &len);
+		if (strncasecmp(mech_name, "chap-sha1", 9) != 0) {
+			mp_next(&auth_data);
+			continue;
+		}
+		const char *hash2_base64 = mp_decode_str(&auth_data, &len);
+		if (len != 0 && len != SCRAMBLE_BASE64_SIZE) {
+			tnt_raise(ClientError, ER_CREATE_USER,
+				  user->name, "invalid user password");
+		}
+		base64_decode(hash2_base64, len, user->hash2,
+			      sizeof(user->hash2));
+		break;
+	}
+}
+
+void
+user_create_from_tuple(struct user *user, struct tuple *tuple)
+{
+	/* In case user password is empty, fill it with \0 */
+	memset(user, 0, sizeof(*user));
+	user->uid = tuple_field_u32(tuple, ID);
+	const char *name = tuple_field_cstr(tuple, NAME);
+	uint32_t len = strlen(name);
+	if (len >= sizeof(user->name)) {
+		tnt_raise(ClientError, ER_CREATE_USER,
+			  name, "user name is too long");
+	}
+	snprintf(user->name, sizeof(user->name), "%s", name);
+	/*
+	 * AUTH_DATA field in _user space should contain
+	 * chap-sha1 -> base64_encode(sha1(sha1(password)).
+	 * Check for trivial errors when a plain text
+	 * password is saved in this field instead.
+	 */
+	if (tuple_arity(tuple) > AUTH_DATA) {
+		const char *auth_data = tuple_field(tuple, AUTH_DATA);
+		user_fill_auth_data(user, auth_data);
+	}
+}
+
+static void
+user_cache_remove_user(struct trigger * /* trigger */, void *event)
+{
+	struct txn *txn = (struct txn *) event;
+	uint32_t uid = tuple_field_u32(txn->old_tuple ?
+				       txn->old_tuple : txn->new_tuple, ID);
+	user_cache_delete(uid);
+}
+
+static struct trigger drop_user_trigger =
+	{ rlist_nil, user_cache_remove_user, NULL, NULL };
+
+static void
+user_cache_replace_user(struct trigger * /* trigger */, void *event)
+{
+	struct txn *txn = (struct txn *) event;
+	struct user user;
+	user_create_from_tuple(&user, txn->new_tuple);
+	user_cache_replace(&user);
+}
+
+static struct trigger modify_user_trigger =
+	{ rlist_nil, user_cache_replace_user, NULL, NULL };
+
+/**
+ * A trigger invoked on replace in the user table.
+ */
+static void
+on_replace_dd_user(struct trigger * /* trigger */, void *event)
+{
+	struct txn *txn = (struct txn *) event;
+	struct tuple *old_tuple = txn->old_tuple;
+	struct tuple *new_tuple = txn->new_tuple;
+
+	uint32_t uid = tuple_field_u32(old_tuple ?
+				       old_tuple : new_tuple, ID);
+	struct user *old_user = user_cache_find(uid);
+	if (new_tuple != NULL && old_user == NULL) { /* INSERT */
+		struct user user;
+		user_create_from_tuple(&user, new_tuple);
+		(void) user_cache_replace(&user);
+		trigger_set(&txn->on_rollback, &drop_user_trigger);
+	} else if (new_tuple == NULL) { /* DELETE */
+		access_check_ddl(uid);
+		/* Can't drop guest or super user */
+		if (uid == GUEST || uid == ADMIN) {
+			tnt_raise(ClientError, ER_DROP_USER,
+				  old_user->name,
+				  "the user is a system user");
+		}
+		/*
+		 * Can only delete user if it has no spaces,
+		 * no functions and no grants.
+		 */
+		if (user_has_data(uid)) {
+			tnt_raise(ClientError, ER_DROP_USER,
+				  old_user->name, "the user has objects");
+		}
+		trigger_set(&txn->on_commit, &drop_user_trigger);
+	} else { /* UPDATE, REPLACE */
+		assert(old_user != NULL && new_tuple != NULL);
+		/*
+		 * Allow change of user properties (name,
+		 * password) but first check that the change is
+		 * correct.
+		 */
+		struct user user;
+		user_create_from_tuple(&user, new_tuple);
+		trigger_set(&txn->on_commit, &modify_user_trigger);
+	}
+}
+
+/** Create a function definition from tuple. */
+static void
+func_def_create_from_tuple(struct func_def *func, struct tuple *tuple)
+{
+	func->fid = tuple_field_u32(tuple, ID);
+	func->uid = tuple_field_u32(tuple, UID);
+	const char *name = tuple_field_cstr(tuple, NAME);
+	uint32_t len = strlen(name);
+	if (len >= sizeof(func->name)) {
+		tnt_raise(ClientError, ER_CREATE_FUNCTION,
+			  name, "function name is too long");
+	}
+	snprintf(func->name, sizeof(func->name), "%s", name);
+}
+
+/** Remove a function from function cache */
+static void
+func_cache_remove_func(struct trigger * /* trigger */, void *event)
+{
+	struct txn *txn = (struct txn *) event;
+	uint32_t fid = tuple_field_u32(txn->old_tuple ?
+				       txn->old_tuple : txn->new_tuple, ID);
+	func_cache_delete(fid);
+}
+
+static struct trigger drop_func_trigger =
+	{ rlist_nil, func_cache_remove_func, NULL, NULL };
+
+/** Remove a function from function cache */
+static void
+func_cache_replace_func(struct trigger * /* trigger */, void *event)
+{
+	struct txn *txn = (struct txn *) event;
+	struct func_def func;
+	func_def_create_from_tuple(&func, txn->new_tuple);
+	func_cache_replace(&func);
+}
+
+static struct trigger modify_func_trigger =
+	{ rlist_nil, func_cache_replace_func, NULL, NULL };
+
+/**
+ * A trigger invoked on replace in a space containing
+ * functions on which there were defined any grants.
+ */
+static void
+on_replace_dd_func(struct trigger * /* trigger */, void *event)
+{
+	struct func_def func;
+	struct txn *txn = (struct txn *) event;
+	struct tuple *old_tuple = txn->old_tuple;
+	struct tuple *new_tuple = txn->new_tuple;
+
+	uint32_t fid = tuple_field_u32(old_tuple ?
+				       old_tuple : new_tuple, ID);
+	struct func_def *old_func = func_by_id(fid);
+	if (new_tuple != NULL && old_func == NULL) { /* INSERT */
+		func_def_create_from_tuple(&func, new_tuple);
+		func_cache_replace(&func);
+		trigger_set(&txn->on_rollback, &drop_func_trigger);
+	} else if (new_tuple == NULL) {         /* DELETE */
+		func_def_create_from_tuple(&func, old_tuple);
+		/*
+		 * Can only delete func if you're the one
+		 * who created it or a superuser.
+		 */
+		access_check_ddl(func.uid);
+		/* @todo can only delete func if it has no grants */
+		trigger_set(&txn->on_commit, &drop_func_trigger);
+	} else {                                /* UPDATE, REPLACE */
+		func_def_create_from_tuple(&func, new_tuple);
+		access_check_ddl(func.uid);
+		trigger_set(&txn->on_commit, &modify_func_trigger);
+	}
+}
+
+/**
+ * Create a privilege definition from tuple.
+ */
+static void
+priv_def_create_from_tuple(struct priv_def *priv, struct tuple *tuple)
+{
+	priv->grantor_id = tuple_field_u32(tuple, ID);
+	priv->grantee_id = tuple_field_u32(tuple, UID);
+	const char *object_type = tuple_field_cstr(tuple, PRIV_OBJECT_TYPE);
+	priv->object_id = tuple_field_u32(tuple, PRIV_OBJECT_ID);
+	priv->object_type = schema_object_type(object_type);
+	if (priv->object_type == SC_UNKNOWN) {
+		tnt_raise(ClientError, ER_UNKNOWN_SCHEMA_OBJECT,
+			  object_type);
+	}
+	priv->access = tuple_field_u32(tuple, PRIV_ACCESS);
+}
+
+/*
+ * This function checks that:
+ * - a privilege is granted from an existing user to an existing
+ *   user on an existing object
+ * - the grantor has the right to grant (is the owner of the object)
+ *
+ * @XXX Potentially there is a race in case of rollback, since an
+ * object can be changed during WAL write.
+ * In the future we must protect grant/revoke with a logical lock.
+ */
+static void
+priv_def_check(struct priv_def *priv)
+{
+	struct user *grantor = user_cache_find(priv->grantor_id);
+	struct user *grantee = user_cache_find(priv->grantee_id);
+	if (grantor == NULL) {
+		tnt_raise(ClientError, ER_NO_SUCH_USER,
+			  int2str(priv->grantor_id));
+	}
+	if (grantee == NULL) {
+		tnt_raise(ClientError, ER_NO_SUCH_USER,
+			  int2str(priv->grantee_id));
+	}
+	access_check_ddl(grantor->uid);
+	switch (priv->object_type) {
+	case SC_UNIVERSE:
+		if (grantor->uid != ADMIN) {
+			tnt_raise(ClientError, ER_ACCESS_DENIED,
+				  priv_name(priv->access), grantor->name);
+		}
+		break;
+	case SC_SPACE:
+	{
+		struct space *space = space_cache_find(priv->object_id);
+		if (space->def.uid != grantor->uid) {
+			tnt_raise(ClientError, ER_ACCESS_DENIED,
+				  priv_name(priv->access), grantor->name);
+		}
+		break;
+	}
+	case SC_FUNCTION:
+	{
+		struct func_def *func = func_cache_find(priv->object_id);
+		if (func->uid != grantor->uid) {
+			tnt_raise(ClientError, ER_ACCESS_DENIED,
+				  priv_name(priv->access), grantor->name);
+		}
+		break;
+	}
+	default:
+		break;
+	}
+}
+
+/**
+ * Update a metadata cache object with the new access
+ * data.
+ */
+static void
+grant_or_revoke(struct priv_def *priv)
+{
+	struct user *grantee = user_cache_find(priv->grantee_id);
+	if (grantee == NULL)
+		return;
+	switch (priv->object_type) {
+	case SC_UNIVERSE:
+		grantee->universal_access = priv->access;
+		break;
+	case SC_SPACE:
+	{
+		struct space *space = space_by_id(priv->object_id);
+		if (space)
+			space->access[grantee->auth_token] = priv->access;
+		break;
+	}
+	case SC_FUNCTION:
+	{
+		struct func_def *func = func_by_id(priv->object_id);
+		if (func)
+			func->access[grantee->auth_token] = priv->access;
+		break;
+	}
+	default:
+		break;
+	}
+}
+
+/** A trigger called on rollback of grant, or on commit of revoke. */
+static void
+revoke_priv(struct trigger * /* trigger */, void *event)
+{
+	struct txn *txn = (struct txn *) event;
+	struct tuple *tuple = (txn->new_tuple ?
+			       txn->new_tuple : txn->old_tuple);
+	struct priv_def priv;
+	priv_def_create_from_tuple(&priv, tuple);
+	priv.access = 0;
+	grant_or_revoke(&priv);
+}
+
+static struct trigger revoke_priv_trigger =
+	{ rlist_nil, revoke_priv, NULL, NULL };
+
+/** A trigger called on rollback of grant, or on commit of revoke. */
+static void
+modify_priv(struct trigger * /* trigger */, void *event)
+{
+	struct txn *txn = (struct txn *) event;
+	struct priv_def priv;
+	priv_def_create_from_tuple(&priv, txn->new_tuple);
+	grant_or_revoke(&priv);
+}
+
+static struct trigger modify_priv_trigger =
+	{ rlist_nil, modify_priv, NULL, NULL };
+
+/**
+ * A trigger invoked on replace in the space containing
+ * all granted privileges.
+ */
+static void
+on_replace_dd_priv(struct trigger * /* trigger */, void *event)
+{
+	struct priv_def priv;
+	struct txn *txn = (struct txn *) event;
+	struct tuple *old_tuple = txn->old_tuple;
+	struct tuple *new_tuple = txn->new_tuple;
+
+	if (new_tuple != NULL && old_tuple == NULL) {	/* grant */
+		priv_def_create_from_tuple(&priv, new_tuple);
+		priv_def_check(&priv);
+		grant_or_revoke(&priv);
+		trigger_set(&txn->on_rollback, &revoke_priv_trigger);
+	} else if (new_tuple == NULL) {                /* revoke */
+		assert(old_tuple);
+		priv_def_create_from_tuple(&priv, old_tuple);
+		access_check_ddl(priv.grantor_id);
+		trigger_set(&txn->on_commit, &revoke_priv_trigger);
+	} else {                                       /* modify */
+		priv_def_create_from_tuple(&priv, new_tuple);
+		priv_def_check(&priv);
+		trigger_set(&txn->on_commit, &modify_priv_trigger);
+	}
+}
+
+/* }}} access control */
+
 struct trigger alter_space_on_replace_space = {
 	rlist_nil, on_replace_dd_space, NULL, NULL
 };
@@ -1048,4 +1490,16 @@ struct trigger alter_space_on_replace_index = {
 	rlist_nil, on_replace_dd_index, NULL, NULL
 };
 
+struct trigger on_replace_user = {
+	rlist_nil, on_replace_dd_user, NULL, NULL
+};
+
+struct trigger on_replace_func = {
+	rlist_nil, on_replace_dd_func, NULL, NULL
+};
+
+struct trigger on_replace_priv = {
+	rlist_nil, on_replace_dd_priv, NULL, NULL
+};
+
 /* vim: set foldmethod=marker */
diff --git a/src/box/alter.h b/src/box/alter.h
index 089412c59a3946c812294e805d03f24a45f97453..a563c3771e1fe06e7ba2f19c05d6093b298d7860 100644
--- a/src/box/alter.h
+++ b/src/box/alter.h
@@ -32,5 +32,8 @@
 
 extern struct trigger alter_space_on_replace_space;
 extern struct trigger alter_space_on_replace_index;
+extern struct trigger on_replace_user;
+extern struct trigger on_replace_func;
+extern struct trigger on_replace_priv;
 
 #endif /* INCLUDES_TARANTOOL_BOX_ALTER_H */
diff --git a/src/box/authentication.cc b/src/box/authentication.cc
new file mode 100644
index 0000000000000000000000000000000000000000..fed6a96c2ca0d5d7e13456cba477070fde853241
--- /dev/null
+++ b/src/box/authentication.cc
@@ -0,0 +1,63 @@
+/*
+ * Redistribution and use in source and binary forms, with or
+ * without modification, are permitted provided that the following
+ * conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above
+ *    copyright notice, this list of conditions and the
+ *    following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above
+ *    copyright notice, this list of conditions and the following
+ *    disclaimer in the documentation and/or other materials
+ *    provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY <COPYRIGHT HOLDER> ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+ * <COPYRIGHT HOLDER> OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
+ * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+#include "access.h"
+
+void
+authenticate(const char *user_name, uint32_t len,
+	     const char *tuple, const char * /* tuple_end */)
+{
+	struct user *user = user_by_name(user_name, len);
+	if (user == NULL) {
+		char name[BOX_NAME_MAX + 1];
+		/* \0 - to correctly print user name the error message. */
+		snprintf(name, sizeof(name), "%.*s", len, user_name);
+		tnt_raise(ClientError, ER_NO_SUCH_USER, name);
+	}
+	struct session *session = fiber()->session;
+	uint32_t part_count = mp_decode_array(&tuple);
+	if (part_count < 2) {
+		/* Expected at least: authentication mechanism and data. */
+		tnt_raise(ClientError, ER_INVALID_MSGPACK,
+			   "authentication request body");
+	}
+	mp_next(&tuple); /* Skip authentication mechanism. */
+	uint32_t scramble_len;
+	const char *scramble = mp_decode_str(&tuple, &scramble_len);
+	if (scramble_len != SCRAMBLE_SIZE) {
+		/* Authentication mechanism, data. */
+		tnt_raise(ClientError, ER_INVALID_MSGPACK,
+			   "scramble is too short");
+	}
+
+	if (scramble_check(scramble, session->salt, user->hash2))
+		tnt_raise(ClientError, ER_PASSWORD_MISMATCH, user->name);
+
+	session_set_user(session, user->auth_token, user->uid);
+}
+
diff --git a/src/box/authentication.h b/src/box/authentication.h
new file mode 100644
index 0000000000000000000000000000000000000000..c665e0d3c95392c0021d22fc3ef5747be4091082
--- /dev/null
+++ b/src/box/authentication.h
@@ -0,0 +1,35 @@
+#ifndef INCLUDES_TARANTOOL_BOX_AUTHENTICATION_H
+#define INCLUDES_TARANTOOL_BOX_AUTHENTICATION_H
+/*
+ * Redistribution and use in source and binary forms, with or
+ * without modification, are permitted provided that the following
+ * conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above
+ *    copyright notice, this list of conditions and the
+ *    following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above
+ *    copyright notice, this list of conditions and the following
+ *    disclaimer in the documentation and/or other materials
+ *    provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY <COPYRIGHT HOLDER> ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+ * <COPYRIGHT HOLDER> OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
+ * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+void
+authenticate(const char *user_name, uint32_t len,
+	     const char *tuple, const char *tuple_end);
+#endif /* INCLUDES_TARANTOOL_BOX_AUTHENTICATION_H */
diff --git a/src/box/box.cc b/src/box/box.cc
index 5146aaa5204f5f03e5f68d9345f1ef2e7509b8cc..9bf639e61363396a7c486a79e759d95f418501f8 100644
--- a/src/box/box.cc
+++ b/src/box/box.cc
@@ -51,6 +51,7 @@ extern "C" {
 #include "request.h"
 #include "txn.h"
 #include "fiber.h"
+#include "access.h"
 
 static void process_replica(struct port *port, struct request *request);
 static void process_ro(struct port *port, struct request *request);
@@ -268,6 +269,7 @@ box_reload_config(struct tarantool_cfg *old_conf, struct tarantool_cfg *new_conf
 void
 box_free(void)
 {
+	user_cache_free();
 	schema_free();
 	tuple_free();
 	recovery_free();
@@ -283,6 +285,7 @@ box_init()
 	tuple_init(cfg.slab_alloc_arena, cfg.slab_alloc_minimal,
 		   cfg.slab_alloc_factor);
 	schema_init();
+	user_cache_init();
 
 	/* recovery initialization */
 	recovery_init(cfg.snap_dir, cfg.wal_dir,
diff --git a/src/box/key_def.cc b/src/box/key_def.cc
index 2cce6011ae71db570b63b7f24daccef1283c5b68..cac9a0c580540820470f882c7952deb30c1f3a5d 100644
--- a/src/box/key_def.cc
+++ b/src/box/key_def.cc
@@ -40,6 +40,15 @@ const uint32_t key_mp_type[] = {
 	/* [_STR]    = */ 1U << MP_STR
 };
 
+enum schema_object_type
+schema_object_type(const char *name)
+{
+	static const char *strs[] = {
+		"unknown", "universe", "space", "function" };
+	int index = strindex(strs, name, 4);
+	return (enum schema_object_type) (index == 4 ? 0 : index);
+}
+
 struct key_def *
 key_def_new(uint32_t space_id, uint32_t iid, const char *name,
 	    enum index_type type, bool is_unique, uint32_t part_count)
diff --git a/src/box/key_def.h b/src/box/key_def.h
index b97cc70cf5d86556406089f8b78b9768e46933cc..668f9d5ea6dd29b9d3adb8f5089c478b635209db 100644
--- a/src/box/key_def.h
+++ b/src/box/key_def.h
@@ -36,9 +36,11 @@
 
 enum {
 	BOX_SPACE_MAX = INT32_MAX,
+	BOX_FUNCTION_MAX = 32000,
 	BOX_INDEX_MAX = 10,
 	BOX_NAME_MAX = 32,
 	BOX_FIELD_MAX = INT32_MAX,
+	BOX_USER_MAX = 32,
 	/**
 	 * A fairly arbitrary limit which is still necessary
 	 * to keep tuple_format object small.
@@ -50,6 +52,20 @@ enum {
 	BOX_INDEX_PART_MAX = UINT8_MAX
 };
 
+/*
+ * Different objects which can be subject to access
+ * control.
+ *
+ * Use 0 for unknown to use the same index consistently
+ * even when there are more object types in the future.
+ */
+enum schema_object_type {
+	SC_UNKNOWN = 0, SC_UNIVERSE = 1, SC_SPACE = 2, SC_FUNCTION = 3
+};
+
+enum schema_object_type
+schema_object_type(const char *name);
+
 /*
  * Possible field data types. Can't use STRS/ENUM macros for them,
  * since there is a mismatch between enum name (STRING) and type
@@ -189,6 +205,8 @@ key_def_check(struct key_def *key_def);
 struct space_def {
 	/** Space id. */
 	uint32_t id;
+	/** User id of the creator of the space */
+	uint32_t uid;
 	/**
 	 * If not set (is 0), any tuple in the
 	 * space can have any number of fields.
@@ -231,4 +249,40 @@ key_mp_type_validate(enum field_type key_type, enum mp_type mp_type,
 			  field_type_strs[key_type]);
 }
 
+/**
+ * Definition of a function. Function body is not stored
+ * or replicated (yet).
+ */
+
+struct func_def {
+	/** Function id. */
+	uint32_t fid;
+	/** Owner of the function. */
+	uint32_t uid;
+	/** Function name. */
+	char name[BOX_NAME_MAX + 1];
+	/**
+	 * Strictly speaking, this doesn't belong
+	 * to func def but belongs to func cache entry.
+	 * Kept here for simplicity.
+	 */
+	uint8_t access[BOX_USER_MAX];
+};
+
+/**
+ * Definition of a privilege
+ */
+struct priv_def {
+	/** Who grants the privilege. */
+	uint32_t grantor_id;
+	/** Whom the privilege is granted. */
+	uint32_t grantee_id;
+	/* Object id - is only defined for object type */
+	uint32_t object_id;
+	/* Object type - function, space, universe */
+	enum schema_object_type object_type;
+	/** What is being or has been granted. */
+	uint8_t access;
+};
+
 #endif /* TARANTOOL_BOX_KEY_DEF_H_INCLUDED */
diff --git a/src/box/lua/box_net.lua b/src/box/lua/box_net.lua
index 989708bfc45b152a042c869e8c1d61f1af480158..507499802944ca04563236cf1fbcdcb212d394af 100644
--- a/src/box/lua/box_net.lua
+++ b/src/box/lua/box_net.lua
@@ -93,6 +93,7 @@ box.net = {
         FUNCTION_NAME = 0x22,
         DATA = 0x30,
         ERROR = 0x31,
+        GREETING_SIZE = 128,
 
         delete = function(self, space, key)
             local t = self:process(box.net.box.DELETE,
@@ -423,6 +424,7 @@ box.net.box.new = function(host, port, reconnect_timeout)
                     self.host, self.port, s[4])
                 return false
             end
+            sc:recv(box.net.box.GREETING_SIZE)
 
             self.s = sc
 
diff --git a/src/box/lua/call.cc b/src/box/lua/call.cc
index 8207de2be6d887a27337337c1a3531f18c58e823..b9429b0638bab67991c0436d1d9b6543db697acd 100644
--- a/src/box/lua/call.cc
+++ b/src/box/lua/call.cc
@@ -44,6 +44,8 @@
 #include "box/port.h"
 #include "box/request.h"
 #include "bit/bit.h"
+#include "box/access.h"
+#include "box/schema.h"
 
 /* contents of box.lua, misc.lua, box.net.lua respectively */
 extern char schema_lua[], box_lua[], box_net_lua[], misc_lua[] ;
@@ -476,6 +478,25 @@ lbox_call_loadproc(struct lua_State *L)
 	return box_lua_find(L, name, name + name_len);
 }
 
+static inline void
+access_check_func(const char *name, uint32_t name_len,
+		  struct user *user, uint8_t access)
+{
+	if (access == 0)
+		return;
+
+	struct func_def *func = func_by_name(name, name_len);
+	if (func == NULL || (func->uid != user->uid && user->uid != ADMIN &&
+			     access & ~func->access[user->auth_token])) {
+
+		char name_buf[BOX_NAME_MAX + 1];
+		snprintf(name_buf, sizeof(name_buf), "%.*s", name_len, name);
+
+		tnt_raise(ClientError, ER_FUNCTION_ACCESS_DENIED,
+			  priv_name(access), user->name, name_buf);
+	}
+}
+
 /**
  * Invoke a Lua stored procedure from the binary protocol
  * (implementation of 'CALL' command code).
@@ -484,12 +505,16 @@ void
 box_lua_call(struct request *request, struct txn *txn,
 	     struct port *port)
 {
+	struct user *user = user();
 	(void) txn;
 	lua_State *L = lua_newthread(tarantool_L);
 	LuarefGuard coro_ref(tarantool_L);
 	const char *name = request->key;
 	uint32_t name_len = mp_decode_strl(&name);
 
+	uint8_t access = PRIV_X & ~user->universal_access;
+	access_check_func(name, name_len, user, access);
+
 	/* proc name */
 	int oc = box_lua_find(L, name, name + name_len);
 	/* Push the rest of args (a tuple). */
diff --git a/src/box/lua/index.cc b/src/box/lua/index.cc
index 782dbf9eda1b2abe9945a56bbcb8ce8fbf5e3c8b..8afea6f27cb732ebc62576c7745e8e6d74c70bd0 100644
--- a/src/box/lua/index.cc
+++ b/src/box/lua/index.cc
@@ -59,7 +59,8 @@ lua_checkindex(struct lua_State *L, int i)
 		(struct lbox_index *) luaL_checkudata(L, i, indexlib_name);
 	assert(index != NULL);
 	if (index->sc_version != sc_version) {
-		index->index = index_find(space_find(index->id), index->iid);
+		index->index = index_find(space_cache_find(index->id),
+					  index->iid);
 		index->sc_version = sc_version;
 	}
 	return index->index;
@@ -71,7 +72,7 @@ lbox_index_bind(struct lua_State *L)
 	uint32_t id = (uint32_t) luaL_checkint(L, 1); /* get space id */
 	uint32_t iid = (uint32_t) luaL_checkint(L, 2); /* get index id in */
 	/* locate the appropriate index */
-	struct space *space = space_find(id);
+	struct space *space = space_cache_find(id);
 	Index *i = index_find(space, iid);
 
 	/* create a userdata object */
@@ -146,7 +147,7 @@ boxffi_index_iterator(uint32_t space_id, uint32_t index_id, int type,
 	struct iterator *it = NULL;
 	enum iterator_type itype = (enum iterator_type) type;
 	try {
-		struct space *space = space_find(space_id);
+		struct space *space = space_cache_find(space_id);
 		Index *index = index_find(space, index_id);
 		assert(mp_typeof(*key) == MP_ARRAY); /* checked by Lua */
 		uint32_t part_count = mp_decode_array(&key);
diff --git a/src/box/lua/schema.lua b/src/box/lua/schema.lua
index d1db58378ce8c99932bee581c85b19727af49ab5..1ef2dba001364c29df81ef4d77e635bef5ccc7bc 100644
--- a/src/box/lua/schema.lua
+++ b/src/box/lua/schema.lua
@@ -31,11 +31,27 @@ ffi.cdef[[
     boxffi_select(struct port *port, uint32_t space_id, uint32_t index_id,
               int iterator, uint32_t offset, uint32_t limit,
               const char *key, const char *key_end);
+    void password_prepare(const char *password, int len,
+		                  char *out, int out_len);
 ]]
 local builtin = ffi.C
 local msgpackffi = require('msgpackffi')
 local fun = require('fun')
 
+local function user_resolve(user)
+    local _user = box.space[box.schema.USER_ID]
+    local tuple
+    if type(user) == 'string' then
+        tuple = _user.index['name']:get{user}
+    else
+        tuple = _user.index['primary']:get{user}
+    end
+    if tuple == nil then
+        return nil
+    end
+    return tuple[0]
+end
+
 box.schema.space = {}
 box.schema.space.create = function(name, options)
     local _space = box.space[box.schema.SPACE_ID]
@@ -68,7 +84,14 @@ box.schema.space.create = function(name, options)
     if options.arity == nil then
         options.arity = 0
     end
-    _space:insert{id, options.arity, name, temporary}
+    local uid = nil
+    if options.user then
+        uid = user_resolve(options.user)
+    end
+    if uid == nil then
+        uid = box.session.uid()
+    end
+    _space:insert{id, uid, name, options.arity, temporary}
     return box.space[id], "created"
 end
 box.schema.create_space = box.schema.space.create
@@ -499,3 +522,168 @@ function box.schema.space.bless(space)
         end
     end
 end
+
+local function privilege_resolve(privilege)
+    local numeric = 0
+    if type(privilege) == 'string' then
+        privilege = string.lower(privilege)
+        if string.find(privilege, 'read') then
+            numeric = numeric + 1
+        end
+        if string.find(privilege, 'write') then
+            numeric = numeric + 2
+        end
+        if string.find(privilege, 'execute') then
+            numeric = numeric + 4
+        end
+    else
+        numeric = privilege
+    end
+    return numeric
+end
+
+local function object_resolve(object_type, object_name)
+    if object_type == 'universe' then
+        return 0
+    end
+    if object_type == 'space' then
+        local space = box.space[object_name]
+        if  space == nil then
+            box.raise(box.error.ER_NO_SUCH_SPACE,
+                      "Space '"..object_name.."' does not exist")
+        end
+        return space.n
+    end
+    if object_type == 'function' then
+        local _func = box.space[box.schema.FUNC_ID]
+        local func
+        if type(object_name) == 'string' then
+            func = _func.index['name']:get{object_name}
+        else
+            func = _func.index['primary']:get{object_name}
+        end
+        if func then
+            return func[0]
+        else
+            box.raise(box.error.ER_NO_SUCH_FUNCTION,
+                      "Function '"..object_name.."' does not exist")
+        end
+    end
+    box.raise(box.error.ER_UNKNOWN_SCHEMA_OBJECT,
+              "Unknown object type '"..object_type.."'")
+end
+
+box.schema.func = {}
+box.schema.func.create = function(name)
+    local _func = box.space[box.schema.FUNC_ID]
+    local func = _func.index['name']:get{name}
+    if func then
+            box.raise(box.error.ER_FUNCTION_EXISTS,
+                      "Function '"..name.."' already exists")
+    end
+    _func:auto_increment{box.session.uid(), name}
+end
+
+box.schema.func.drop = function(name)
+    local _func = box.space[box.schema.FUNC_ID]
+    local fid = object_resolve('function', name)
+    _func:delete{fid}
+end
+
+box.schema.user = {}
+
+box.schema.user.password = function(password)
+    local BUF_SIZE = 128
+    local buf = ffi.new("char[?]", BUF_SIZE)
+    ffi.C.password_prepare(password, #password, buf, BUF_SIZE)
+    return ffi.string(buf)
+end
+
+box.schema.user.passwd = function(new_password)
+    local uid = box.session.uid()
+    local _user = box.space[box.schema.USER_ID]
+    auth_mech_list = {}
+    auth_mech_list["chap-sha1"] = box.schema.user.password(new_password)
+    _user:update({uid}, {"=", 3, auth_mech_list})
+end
+
+box.schema.user.create = function(name, opts)
+    local uid = user_resolve(name)
+    if uid then
+        box.raise(box.error.ER_USER_EXISTS,
+                  "User '"..name.."' already exists")
+    end
+    if opts == nil then
+        opts = {}
+    end
+    auth_mech_list = {}
+    if opts.password then
+        auth_mech_list["chap-sha1"] = box.schema.user.password(opts.password)
+    end
+    local _user = box.space[box.schema.USER_ID]
+    _user:auto_increment{'', name, auth_mech_list}
+end
+
+box.schema.user.drop = function(name)
+    local uid = user_resolve(name)
+    if uid == nil then
+        box.raise(box.error.ER_NO_SUCH_USER,
+                 "User '"..name.."' does not exist")
+    end
+    -- recursive delete of user data
+    local _priv = box.space[box.schema.PRIV_ID]
+    local privs = _priv.index['owner']:select{uid}
+    for k, tuple in pairs(privs) do
+        box.schema.user.revoke(uid, tuple[4], tuple[2], tuple[3])
+    end
+    local spaces = box.space[box.schema.SPACE_ID].index['owner']:select{uid}
+    for k, tuple in pairs(spaces) do
+        box.space[tuple[0]]:drop()
+    end
+    local funcs = box.space[box.schema.FUNC_ID].index['owner']:select{uid}
+    for k, tuple in pairs(spaces) do
+        box.schema.func.drop(tuple[0])
+    end
+    box.space[box.schema.USER_ID]:delete{uid}
+end
+
+box.schema.user.grant = function(user_name, privilege, object_type,
+                                 object_name, grantor)
+    local uid = user_resolve(user_name)
+    if uid == nil then
+        box.raise(box.error.ER_NO_SUCH_USER,
+                  "User '"..user_name.."' does not exist")
+    end
+    privilege = privilege_resolve(privilege)
+    local oid = object_resolve(object_type, object_name)
+    if grantor == nil then
+        grantor = box.session.uid()
+    else
+        grantor = user_resolve(grantor)
+    end
+    local _priv = box.space[box.schema.PRIV_ID]
+    _priv:replace{grantor, uid, object_type, oid, privilege}
+end
+
+box.schema.user.revoke = function(user_name, privilege, object_type, object_name)
+    local uid = user_resolve(user_name)
+    if uid == nil then
+        box.raise(box.error.ER_NO_SUCH_USER,
+                  "User '"..name.."' does not exist")
+    end
+    privilege = privilege_resolve(privilege)
+    local oid = object_resolve(object_type, object_name)
+    local _priv = box.space[box.schema.PRIV_ID]
+    local tuple = _priv:get{uid, object_type, oid}
+    if tuple == nil then
+        return
+    end
+    local old_privilege = tuple[4]
+    if old_privilege ~= privilege then
+        privilege = bit.band(old_privilege, bit.bnot(privilege))
+        _priv:update({uid, object_type, oid}, { "=", 4, privilege})
+    else
+        _priv:delete{uid, object_type, oid}
+    end
+end
+
diff --git a/src/box/lua/space.cc b/src/box/lua/space.cc
index 02549dccd18aae6f094fb94e9ea709d5e8a8a9e0..4496ea316de018df6c36cf24e043cba06bfa3d34 100644
--- a/src/box/lua/space.cc
+++ b/src/box/lua/space.cc
@@ -75,7 +75,8 @@ lbox_space_on_replace(struct lua_State *L)
 	   "usage: space:on_replace(function | nil, [function | nil])");
 	}
 	lua_getfield(L, 1, "n"); /* Get space id. */
-	struct space *space = space_find(lua_tointeger(L, lua_gettop(L)));
+	uint32_t id = lua_tointeger(L, lua_gettop(L));
+	struct space *space = space_cache_find(id);
 	lua_pop(L, 1);
 
 	return lbox_trigger_reset(L, 3,
@@ -275,6 +276,12 @@ box_lua_space_init(struct lua_State *L)
 	lua_setfield(L, -2, "SPACE_ID");
 	lua_pushnumber(L, SC_INDEX_ID);
 	lua_setfield(L, -2, "INDEX_ID");
+	lua_pushnumber(L, SC_USER_ID);
+	lua_setfield(L, -2, "USER_ID");
+	lua_pushnumber(L, SC_FUNC_ID);
+	lua_setfield(L, -2, "FUNC_ID");
+	lua_pushnumber(L, SC_PRIV_ID);
+	lua_setfield(L, -2, "PRIV_ID");
 	lua_pushnumber(L, SC_SYSTEM_ID_MIN);
 	lua_setfield(L, -2, "SYSTEM_ID_MIN");
 	lua_pushnumber(L, SC_SYSTEM_ID_MAX);
diff --git a/src/box/request.cc b/src/box/request.cc
index a22c569d25ec91d8253998b8136c91b81897e0af..f4703f1f09689b0caa44ba1d820ddc3b5fbc29d7 100644
--- a/src/box/request.cc
+++ b/src/box/request.cc
@@ -39,6 +39,18 @@
 #include <fiber.h>
 #include <scoped_guard.h>
 #include <third_party/base64.h>
+#include "access.h"
+#include "authentication.h"
+
+static inline void
+access_check_space(uint8_t access, struct user *user, struct space *space)
+{
+	if (access && space->def.uid != user->uid && user->uid != ADMIN &&
+	    access & ~space->access[user->auth_token]) {
+		tnt_raise(ClientError, ER_SPACE_ACCESS_DENIED,
+			  priv_name(access), user->name, space->def.name);
+	}
+}
 
 #if 0
 static const char *
@@ -82,14 +94,23 @@ static void
 execute_replace(struct request *request, struct txn *txn, struct port *port)
 {
 	(void) port;
-	txn_add_redo(txn, request);
+	struct user *user = user();
+	/*
+	 * If a user has a global permission, clear the respective
+	 * privilege from the list of privileges required
+	 * to execute the request.
+	 */
+	uint8_t access = PRIV_W & ~user->universal_access;
+
+	struct space *space = space_cache_find(request->space_id);
 
-	struct space *space = space_find(request->space_id);
+	access_check_space(access, user, space);
 	struct tuple *new_tuple = tuple_new(space->format, request->tuple,
 					    request->tuple_end);
 	TupleGuard guard(new_tuple);
 	space_validate_tuple(space, new_tuple);
 	enum dup_replace_mode mode = dup_replace_mode(request->type);
+	txn_add_redo(txn, request);
 	txn_replace(txn, space, NULL, new_tuple, mode);
 }
 
@@ -98,11 +119,14 @@ execute_update(struct request *request, struct txn *txn,
 	       struct port *port)
 {
 	(void) port;
-	txn_add_redo(txn, request);
+	struct user *user = user();
+	uint8_t access = PRIV_W & ~user->universal_access;
+
 	/* Parse UPDATE request. */
 	/** Search key  and key part count. */
 
-	struct space *space = space_find(request->space_id);
+	struct space *space = space_cache_find(request->space_id);
+	access_check_space(access, user, space);
 	Index *pk = index_find(space, 0);
 	/* Try to find the tuple by primary key. */
 	const char *key = request->key;
@@ -110,6 +134,7 @@ execute_update(struct request *request, struct txn *txn,
 	primary_key_validate(pk->key_def, key, part_count);
 	struct tuple *old_tuple = pk->findByKey(key, part_count);
 
+	txn_add_redo(txn, request);
 	if (old_tuple == NULL)
 		return;
 
@@ -124,13 +149,38 @@ execute_update(struct request *request, struct txn *txn,
 	txn_replace(txn, space, old_tuple, new_tuple, DUP_INSERT);
 }
 
-/** }}} */
+static void
+execute_delete(struct request *request, struct txn *txn, struct port *port)
+{
+	(void) port;
+	struct user *user = user();
+	uint8_t access = PRIV_W & ~user->universal_access;
+
+	struct space *space = space_cache_find(request->space_id);
+	access_check_space(access, user, space);
+
+	/* Try to find tuple by primary key */
+	Index *pk = index_find(space, 0);
+	const char *key = request->key;
+	uint32_t part_count = mp_decode_array(&key);
+	primary_key_validate(pk->key_def, key, part_count);
+	struct tuple *old_tuple = pk->findByKey(key, part_count);
+
+	txn_add_redo(txn, request);
+	if (old_tuple == NULL)
+		return;
+	txn_replace(txn, space, old_tuple, NULL, DUP_REPLACE_OR_INSERT);
+}
+
 
 static void
 execute_select(struct request *request, struct txn *txn, struct port *port)
 {
 	(void) txn;
-	struct space *space = space_find(request->space_id);
+	struct user *user = user();
+	uint8_t access = PRIV_R & ~user->universal_access;
+	struct space *space = space_cache_find(request->space_id);
+	access_check_space(access, user, space);
 	Index *index = index_find(space, request->index_id);
 
 	ERROR_INJECT_EXCEPTION(ERRINJ_TESTING);
@@ -161,31 +211,22 @@ execute_select(struct request *request, struct txn *txn, struct port *port)
 	}
 }
 
-static void
-execute_delete(struct request *request, struct txn *txn, struct port *port)
+void
+execute_auth(struct request *request, struct txn * /* txn */,
+	     struct port * /* port */)
 {
-	(void) port;
-	txn_add_redo(txn, request);
-	struct space *space = space_find(request->space_id);
-
-	/* Try to find tuple by primary key */
-	Index *pk = index_find(space, 0);
-	const char *key = request->key;
-	uint32_t part_count = mp_decode_array(&key);
-	primary_key_validate(pk->key_def, key, part_count);
-	struct tuple *old_tuple = pk->findByKey(key, part_count);
-
-	if (old_tuple == NULL)
-		return;
-
-	txn_replace(txn, space, old_tuple, NULL, DUP_REPLACE_OR_INSERT);
+	const char *user = request->key;
+	uint32_t len = mp_decode_strl(&user);
+	authenticate(user, len, request->tuple, request->tuple_end);
 }
 
+/** }}} */
+
 void
 request_check_type(uint32_t type)
 {
 	if (type < IPROTO_SELECT || type >= IPROTO_DML_REQUEST_MAX)
-		tnt_raise(IllegalParams, "unknown request type %u", type);
+		tnt_raise(LoggedError, ER_UNKNOWN_REQUEST_TYPE, type);
 }
 
 void
@@ -194,7 +235,8 @@ request_create(struct request *request, uint32_t type)
 	request_check_type(type);
 	static const request_execute_f execute_map[] = {
 		NULL, execute_select, execute_replace, execute_replace,
-		execute_update, execute_delete, box_lua_call
+		execute_update, execute_delete, box_lua_call,
+		execute_auth,
 	};
 	memset(request, 0, sizeof(*request));
 	request->type = type;
@@ -248,9 +290,10 @@ request_decode(struct request *request, const char *data, uint32_t len)
 			break;
 		case IPROTO_KEY:
 		case IPROTO_FUNCTION_NAME:
-		default:
+		case IPROTO_USER_NAME:
 			request->key = value;
 			request->key_end = data;
+		default:
 			break;
 		}
 	}
diff --git a/src/box/schema.cc b/src/box/schema.cc
index 5e242e2ab15076f4017e8561a3e32219ee42fee1..eca6e4a6061f09d21516ace375ec31e721b4e26f 100644
--- a/src/box/schema.cc
+++ b/src/box/schema.cc
@@ -27,6 +27,7 @@
  * SUCH DAMAGE.
  */
 #include "schema.h"
+#include "access.h"
 #include "space.h"
 #include "tuple.h"
 #include "assoc.h"
@@ -53,6 +54,7 @@
 
 /** All existing spaces. */
 static struct mh_i32ptr_t *spaces;
+static struct mh_i32ptr_t *funcs;
 int sc_version;
 
 bool
@@ -107,7 +109,7 @@ space_foreach(void (*func)(struct space *sp, void *udata), void *udata)
 		while ((tuple = it->next(it))) {
 			/* Get space id, primary key, field 0. */
 			uint32_t id = tuple_field_u32(tuple, 0);
-			space = space_find(id);
+			space = space_cache_find(id);
 			if (! space_is_system(space))
 				break;
 			func(space, udata);
@@ -197,6 +199,24 @@ sc_space_new(struct space_def *space_def,
 	return space;
 }
 
+uint32_t
+schema_find_id(uint32_t system_space_id, uint32_t index_id,
+	       const char *name, uint32_t len)
+{
+	struct space *space = space_cache_find(system_space_id);
+	Index *index = index_find(space, index_id);
+	struct iterator *it = index->position();
+	char key[5 /* str len */ + BOX_NAME_MAX];
+	mp_encode_str(key, name, len);
+	index->initIterator(it, ITER_EQ, key, 1);
+	struct tuple *tuple;
+	while ((tuple = it->next(it))) {
+		/* id is always field #1 */
+		return tuple_field_u32(tuple, 0);
+	}
+	return SC_ID_NIL;
+}
+
 /**
  * Initialize a prototype for the two mandatory data
  * dictionary spaces and create a cache entry for them.
@@ -208,6 +228,7 @@ schema_init()
 {
 	/* Initialize the space cache. */
 	spaces = mh_i32ptr_new();
+	funcs = mh_i32ptr_new();
 	/*
 	 * Create surrogate space objects for the mandatory system
 	 * spaces (the primal eggs from which we get all the
@@ -219,7 +240,7 @@ schema_init()
 	 * (and re-created) first.
 	 */
 	/* _schema - key/value space with schema description */
-	struct space_def def = { SC_SCHEMA_ID, 0, "_schema", false };
+	struct space_def def = { SC_SCHEMA_ID, ADMIN, 0, "_schema", false };
 	struct key_def *key_def = key_def_new(def.id,
 					      0 /* index id */,
 					      "primary", /* name */
@@ -235,6 +256,23 @@ schema_init()
 	key_def_set_part(key_def, 0 /* part no */, 0 /* field no */, NUM);
 
 	(void) sc_space_new(&def, key_def, &alter_space_on_replace_space);
+
+	/* _user - all existing users */
+	key_def->space_id = def.id = SC_USER_ID;
+	snprintf(def.name, sizeof(def.name), "_user");
+	(void) sc_space_new(&def, key_def, &on_replace_user);
+
+	/* _func - all executable objects on which one can have grants */
+	key_def->space_id = def.id = SC_FUNC_ID;
+	snprintf(def.name, sizeof(def.name), "_func");
+	(void) sc_space_new(&def, key_def, &on_replace_func);
+	/*
+	 * _priv - association user <-> object
+	 * The real index is defined in the snapshot.
+	 */
+	key_def->space_id = def.id = SC_PRIV_ID;
+	snprintf(def.name, sizeof(def.name), "_priv");
+	(void) sc_space_new(&def, key_def, &on_replace_priv);
 	key_def_delete(key_def);
 
 	/* _index - definition of indexes in all spaces */
@@ -298,4 +336,57 @@ schema_free(void)
 		space_delete(space);
 	}
 	mh_i32ptr_delete(spaces);
+	while (mh_size(funcs) > 0) {
+		mh_int_t i = mh_first(funcs);
+
+		struct func_def *func = (struct func_def *)
+				mh_i32ptr_node(funcs, i)->val;
+		func_cache_delete(func->fid);
+	}
+	mh_i32ptr_delete(funcs);
+}
+
+void
+func_cache_replace(struct func_def *func)
+{
+	struct func_def *old = func_by_id(func->fid);
+	if (old) {
+		*old = *func;
+		return;
+	}
+	if (mh_size(funcs) >= BOX_FUNCTION_MAX)
+		tnt_raise(ClientError, ER_FUNCTION_MAX, BOX_FUNCTION_MAX);
+	void *ptr = malloc(sizeof(*func));
+	if (ptr == NULL) {
+error:
+		panic_syserror("Out of memory for the data "
+			       "dictionary cache.");
+	}
+	memcpy(ptr, func, sizeof(*func));
+	func = (struct func_def *) ptr;
+	const struct mh_i32ptr_node_t node = { func->fid, func };
+	mh_int_t k = mh_i32ptr_put(funcs, &node, NULL, NULL);
+	if (k == mh_end(funcs))
+		goto error;
+}
+
+void
+func_cache_delete(uint32_t fid)
+{
+	mh_int_t k = mh_i32ptr_find(funcs, fid, NULL);
+	if (k == mh_end(funcs))
+		return;
+	struct func_def *func = (struct func_def *)
+		mh_i32ptr_node(funcs, k)->val;
+	mh_i32ptr_del(funcs, k, NULL);
+	free(func);
+}
+
+struct func_def *
+func_by_id(uint32_t fid)
+{
+	mh_int_t func = mh_i32ptr_find(funcs, fid, NULL);
+	if (func == mh_end(funcs))
+		return NULL;
+	return (struct func_def *) mh_i32ptr_node(funcs, func)->val;
 }
diff --git a/src/box/schema.h b/src/box/schema.h
index 76873bb9495151197e1a3405bc988447b2508ea4..097cbc7417d6a073017a3679efcbd2e93d3f2db0 100644
--- a/src/box/schema.h
+++ b/src/box/schema.h
@@ -39,10 +39,18 @@ enum schema_id {
 	SC_SPACE_ID = 280,
 	/** Space id of _index. */
 	SC_INDEX_ID = 288,
+	/** Space id of _func. */
+	SC_FUNC_ID = 296,
+	/** Space id of _user. */
+	SC_USER_ID = 304,
+	/** Space id of _priv. */
+	SC_PRIV_ID = 312,
 	/** End of the reserved range of system spaces. */
 	SC_SYSTEM_ID_MAX = 511
 };
 
+enum { SC_ID_NIL = 4294967295 };
+
 extern int sc_version;
 
 struct space;
@@ -65,7 +73,7 @@ extern "C" const char *
 space_name_by_id(uint32_t id);
 
 static inline struct space *
-space_find(uint32_t id)
+space_cache_find(uint32_t id)
 {
 	struct space *space = space_by_id(id);
 	if (space)
@@ -111,4 +119,36 @@ space_end_recover();
 
 struct space *schema_space(uint32_t id);
 
+/*
+ * Find object id by object name.
+ */
+uint32_t
+schema_find_id(uint32_t system_space_id, uint32_t index_id,
+	       const char *name, uint32_t len);
+
+void
+func_cache_replace(struct func_def *func);
+
+void
+func_cache_delete(uint32_t fid);
+
+struct func_def *
+func_by_id(uint32_t fid);
+
+static inline struct func_def *
+func_cache_find(uint32_t fid)
+{
+	struct func_def *func = func_by_id(fid);
+	if (func == NULL)
+		tnt_raise(ClientError, ER_NO_SUCH_FUNCTION, int2str(fid));
+	return func;
+}
+
+static inline struct func_def *
+func_by_name(const char *name, uint32_t name_len)
+{
+	uint32_t fid = schema_find_id(SC_FUNC_ID, 2, name, name_len);
+	return func_by_id(fid);
+}
+
 #endif /* INCLUDES_TARANTOOL_BOX_SCHEMA_H */
diff --git a/src/box/space.h b/src/box/space.h
index 6f57c0f345087361ae91f32f89e173121516aa8d..41cb9f472cd587953f61ea2125ff04d90f1d34e1 100644
--- a/src/box/space.h
+++ b/src/box/space.h
@@ -77,6 +77,7 @@ void space_build_primary_key(struct space *space);
 void space_build_all_keys(struct space *space);
 
 struct space {
+	uint8_t access[BOX_USER_MAX];
 	/**
 	 * Reflects the current space state and is also a vtab
 	 * with methods. Unlike a C++ vtab, changes during space
diff --git a/src/box/txn.cc b/src/box/txn.cc
index f6c3539cc8d48f874691ce689681a7833e54fedf..e227be0da1c8f208073feb7bc0a6ba0bda3dd930 100644
--- a/src/box/txn.cc
+++ b/src/box/txn.cc
@@ -35,12 +35,6 @@
 #include <fiber.h>
 #include "request.h" /* for request_name */
 
-void
-txn_add_redo(struct txn *txn, struct request *request)
-{
-	txn->request = request;
-}
-
 void
 txn_replace(struct txn *txn, struct space *space,
 	    struct tuple *old_tuple, struct tuple *new_tuple,
diff --git a/src/box/txn.h b/src/box/txn.h
index 505aef6b5c7185412b55ce577ca95764abf94489..fb0802d3361394390d0c97edc11be13f3a0fc5d8 100644
--- a/src/box/txn.h
+++ b/src/box/txn.h
@@ -47,11 +47,16 @@ struct txn {
 	struct request *request;
 };
 
+static inline void
+txn_add_redo(struct txn *txn, struct request *request)
+{
+	txn->request = request;
+}
+
 struct txn *txn_begin();
 void txn_commit(struct txn *txn);
 void txn_finish(struct txn *txn);
 void txn_rollback(struct txn *txn);
-void txn_add_redo(struct txn *txn, struct request *request);
 void txn_replace(struct txn *txn, struct space *space,
 		 struct tuple *old_tuple, struct tuple *new_tuple,
 		 enum dup_replace_mode mode);
diff --git a/src/errcode.h b/src/errcode.h
index 208e754cf3a65076a2802e72427b831333e42e89..839a7bd21f219aaa8c70494623d5fbf696d80d41 100644
--- a/src/errcode.h
+++ b/src/errcode.h
@@ -91,6 +91,21 @@ enum { TNT_ERRMSG_MAX = 512 };
 	/* 39 */_(ER_INDEX_ARITY,		2, "Tuple field count %u is less than required by a defined index (expected %u)") \
 	/* 40 */_(ER_WAL_IO,			2, "Failed to write to disk") \
 	/* 41 */_(ER_MORE_THAN_ONE_TUPLE,	2, "More than one tuple found") \
+	/* 42 */_(ER_ACCESS_DENIED,		2, "%s access denied for user '%s'") \
+	/* 43 */_(ER_CREATE_USER,		2, "Failed to create user '%s': %s") \
+	/* 44 */_(ER_DROP_USER,			2, "Failed to drop user '%s': %s") \
+	/* 45 */_(ER_NO_SUCH_USER,		2, "User '%s' is not found") \
+	/* 46 */_(ER_USER_EXISTS,		2, "User '%s' already exists") \
+	/* 47 */_(ER_PASSWORD_MISMATCH,		2, "Incorrect password supplied for user '%s'") \
+	/* 48 */_(ER_UNKNOWN_REQUEST_TYPE,	2, "Unknown request type %u") \
+	/* 49 */_(ER_UNKNOWN_SCHEMA_OBJECT,	2, "Unknown object type '%s'") \
+	/* 50 */_(ER_CREATE_FUNCTION,		2, "Failed to create function: %s") \
+	/* 51 */_(ER_NO_SUCH_FUNCTION,		2, "Function '%s' does not exist") \
+	/* 52 */_(ER_FUNCTION_EXISTS,		2, "Function '%s' already exists") \
+	/* 53 */_(ER_FUNCTION_ACCESS_DENIED,	2, "%s access denied for user '%s' to function '%s'") \
+	/* 54 */_(ER_FUNCTION_MAX,		2, "A limit on the total number of functions has been reached: %u") \
+	/* 55 */_(ER_SPACE_ACCESS_DENIED,	2, "%s access denied for user '%s' to space '%s'") \
+	/* 56 */_(ER_USER_MAX,			2, "A limit on the total number of users has been reached: %u") \
 
 
 /*
diff --git a/src/ffisyms.cc b/src/ffisyms.cc
index c7e2c190a084e33d6cac9a3264cf9cd372a39125..6b3dc5d202276815036cd2f604012d4e242876ae 100644
--- a/src/ffisyms.cc
+++ b/src/ffisyms.cc
@@ -1,12 +1,14 @@
 #include <bit/bit.h>
 #include <lib/msgpuck/msgpuck.h>
+#include "scramble.h"
 #include <box/tuple.h>
 #include <box/lua/index.h>
 #include <box/lua/call.h>
 
 /*
  * A special hack to cc/ld to keep symbols in an optimized binary.
- * Please add your symbols to this array if you plan to use it from LuaJIT FFI.
+ * Please add your symbols to this array if you plan to use it from
+ * LuaJIT FFI.
  */
 void *ffi_symbols[] = {
 	(void *) bswap_u32,
@@ -22,5 +24,6 @@ void *ffi_symbols[] = {
 	(void *) boxffi_index_iterator,
 	(void *) port_ffi_create,
 	(void *) port_ffi_destroy,
-	(void *) boxffi_select
+	(void *) boxffi_select,
+	(void *) password_prepare
 };
diff --git a/src/fiber.cc b/src/fiber.cc
index 7042c3477b0b0e06e930c7266c7c3d9ed2e53754..dd24d949adcb65607aa5b337417f224114648222 100644
--- a/src/fiber.cc
+++ b/src/fiber.cc
@@ -443,7 +443,6 @@ fiber_new(const char *name, void (*f) (va_list))
 		rlist_create(&fiber->state);
 	}
 
-
 	fiber->f = f;
 
 	/* fids from 0 to 100 are reserved */
diff --git a/src/iproto.cc b/src/iproto.cc
index e0af04080c77c934568babe0777a67233cc6d999..808bbac059762a615252e100b086b2cc151d68ba 100644
--- a/src/iproto.cc
+++ b/src/iproto.cc
@@ -44,6 +44,8 @@
 #include "memory.h"
 #include "msgpuck/msgpuck.h"
 #include "replication.h"
+#include "third_party/base64.h"
+#include "coio.h"
 
 class IprotoConnectionShutdown: public Exception
 {
@@ -531,8 +533,8 @@ iproto_process_admin(struct iproto_request *ireq,
 			  subscribe_request_decode(body, end));
 		tnt_raise(IprotoConnectionShutdown);
 	default:
-		tnt_raise(IllegalParams, "unknown request type %u",
-			  ireq->header[IPROTO_CODE]);
+		tnt_raise(ClientError, ER_UNKNOWN_REQUEST_TYPE,
+			  (uint32_t) ireq->header[IPROTO_CODE]);
 	}
 	if (! ev_is_active(&con->output))
 		ev_feed_event(con->loop, &con->output, EV_WRITE);
@@ -762,6 +764,20 @@ iproto_request_new(struct iproto_connection *con,
 	return ireq;
 }
 
+const char *
+iproto_greeting(int *salt)
+{
+	static __thread char greeting[IPROTO_GREETING_SIZE + 1];
+	char base64buf[SESSION_SEED_SIZE * 4 / 3 + 5];
+
+	base64_encode((char *) salt, SESSION_SEED_SIZE,
+		      base64buf, sizeof(base64buf));
+	snprintf(greeting, sizeof(greeting),
+		 "Tarantool %-20s %-32s\n%-63s\n",
+		 tarantool_version(), custom_proc_title, base64buf);
+	return greeting;
+}
+
 /**
  * Handshake a connection: invoke the on-connect trigger
  * and possibly authenticate. Try to send the client an error
@@ -775,6 +791,8 @@ iproto_process_connect(struct iproto_request *request)
 	int fd = con->input.fd;
 	try {              /* connect. */
 		con->session = session_create(fd, con->cookie);
+		coio_write(&con->input, iproto_greeting(con->session->salt),
+			   IPROTO_GREETING_SIZE);
 	} catch (ClientError *e) {
 		iproto_reply_error(&iobuf->out, e, request->header[IPROTO_SYNC]);
 		try {
diff --git a/src/iproto_constants.c b/src/iproto_constants.c
index 6700ee3dff19c63ff87c110ffa9658de948781bd..6ff8a308be680f9f5943f9a3401a0816e332e6fa 100644
--- a/src/iproto_constants.c
+++ b/src/iproto_constants.c
@@ -51,6 +51,7 @@ unsigned char iproto_key_type[IPROTO_KEY_MAX] =
 	/* 0x20 */	MP_ARRAY, /* IPROTO_KEY */
 	/* 0x21 */	MP_ARRAY, /* IPROTO_TUPLE */
 	/* 0x22 */	MP_STR, /* IPROTO_FUNCTION_NAME */
+	/* 0x23 */	MP_STR, /* IPROTO_USER_NAME */
 	/* }}} */
 };
 
diff --git a/src/iproto_constants.h b/src/iproto_constants.h
index 1de71a8f61331b8773609899162c62a525969bbb..63ff74afe499c822529c5ce3d4f4e80045040137 100644
--- a/src/iproto_constants.h
+++ b/src/iproto_constants.h
@@ -33,9 +33,11 @@
 
 enum {
 	/** Maximal iproto package body length (2GiB) */
-	IPROTO_BODY_LEN_MAX = 2147483648UL
+	IPROTO_BODY_LEN_MAX = 2147483648UL,
+	IPROTO_GREETING_SIZE = 128,
 };
 
+
 enum iproto_key {
 	IPROTO_CODE = 0x00,
 	IPROTO_SYNC = 0x01,
@@ -49,6 +51,7 @@ enum iproto_key {
 	IPROTO_KEY = 0x20,
 	IPROTO_TUPLE = 0x21,
 	IPROTO_FUNCTION_NAME = 0x22,
+	IPROTO_USER_NAME = 0x23,
 	/* Leave a gap between request keys and response keys */
 	IPROTO_DATA = 0x30,
 	IPROTO_ERROR = 0x31,
@@ -60,7 +63,7 @@ enum iproto_key {
 #define IPROTO_HEAD_BMAP (bit(CODE) | bit(SYNC))
 #define IPROTO_BODY_BMAP (bit(SPACE_ID) | bit(INDEX_ID) | bit(LIMIT) |\
 			  bit(OFFSET) | bit(KEY) | bit(TUPLE) | \
-			  bit(FUNCTION_NAME))
+			  bit(FUNCTION_NAME) | bit(USER_NAME))
 static inline bool
 iproto_header_has_key(const char *pos, const char *end)
 {
@@ -87,9 +90,9 @@ enum iproto_request_type {
 	IPROTO_UPDATE = 4,
 	IPROTO_DELETE = 5,
 	IPROTO_CALL = 6,
-	IPROTO_DML_REQUEST_MAX = 7,
+	IPROTO_AUTH = 7,
+	IPROTO_DML_REQUEST_MAX = 8,
 	IPROTO_PING = 64,
-	IPROTO_AUTH = 65,
 	IPROTO_SUBSCRIBE = 66
 };
 
diff --git a/src/lua/session.cc b/src/lua/session.cc
index 6112ac2a7d05932abbdab008b59b180fce22dab5..d428f1ef700f7d6c9a01086a9857de6db142c7de 100644
--- a/src/lua/session.cc
+++ b/src/lua/session.cc
@@ -29,6 +29,7 @@
 #include "lua/session.h"
 #include "lua/utils.h"
 #include "lua/trigger.h"
+#include "box/access.h"
 
 extern "C" {
 #include <lua.h>
@@ -57,6 +58,57 @@ lbox_session_id(struct lua_State *L)
 	return 1;
 }
 
+/** Session user id. */
+static int
+lbox_session_uid(struct lua_State *L)
+{
+	lua_pushnumber(L, fiber()->session ?
+		       fiber()->session->uid : (int) GUEST);
+	return 1;
+}
+
+/** Session user id. */
+static int
+lbox_session_user(struct lua_State *L)
+{
+	struct user *user = NULL;
+	if (fiber()->session)
+		user = user_cache_find(fiber()->session->uid);
+	if (user)
+		lua_pushstring(L, user->name);
+	else
+		lua_pushnil(L);
+	return 1;
+}
+
+/** Session user id. */
+static int
+lbox_session_su(struct lua_State *L)
+{
+	if (lua_gettop(L) != 1)
+		luaL_error(L, "session.su(): bad arguments");
+	struct session *session = fiber()->session;
+	if (session == NULL)
+		luaL_error(L, "session.su(): session does not exit");
+	struct user *user;
+	if (lua_type(L, 1) == LUA_TSTRING) {
+		size_t len;
+		const char *name = lua_tolstring(L, 1, &len);
+		user = user_by_name(name, len);
+		if (user == NULL)
+			tnt_raise(ClientError, ER_NO_SUCH_USER, name);
+	} else {
+		uint32_t uid = lua_tointeger(L, 1);;
+		user = user_cache_find(uid);
+		if (user == NULL) {
+			tnt_raise(ClientError, ER_NO_SUCH_USER,
+				  int2str(uid));
+		}
+	}
+	session_set_user(session, user->auth_token, user->uid);
+	return 0;
+}
+
 /**
  * Check whether or not a session exists.
  */
@@ -159,6 +211,9 @@ tarantool_lua_session_init(struct lua_State *L)
 {
 	static const struct luaL_reg sessionlib[] = {
 		{"id", lbox_session_id},
+		{"uid", lbox_session_uid},
+		{"user", lbox_session_user},
+		{"su", lbox_session_su},
 		{"fd", lbox_session_fd},
 		{"exists", lbox_session_exists},
 		{"peer", lbox_session_peer},
diff --git a/src/random.c b/src/random.c
new file mode 100644
index 0000000000000000000000000000000000000000..914e631b3a4e0414e6490dea29624661dbb040e2
--- /dev/null
+++ b/src/random.c
@@ -0,0 +1,51 @@
+/*
+ * Redistribution and use in source and binary forms, with or
+ * without modification, are permitted provided that the following
+ * conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above
+ *    copyright notice, this list of conditions and the
+ *    following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above
+ *    copyright notice, this list of conditions and the following
+ *    disclaimer in the documentation and/or other materials
+ *    provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY <COPYRIGHT HOLDER> ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+ * <COPYRIGHT HOLDER> OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
+ * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+#include "random.h"
+#include <sys/types.h>
+#include <fcntl.h>
+#include <sys/stat.h>
+#include <unistd.h>
+#include <stdlib.h>
+
+#ifdef __linux__
+#define DEV_RANDOM "/dev/urandom"
+#else
+#define DEV_RANDOM "/dev/random"
+#endif
+
+void
+random_init(void)
+{
+	int fd = open(DEV_RANDOM, O_RDONLY);
+	long int seed;
+	read(fd, &seed, sizeof(seed));
+	close(fd);
+	srandom(seed);
+	srand(seed);
+}
diff --git a/src/random.h b/src/random.h
new file mode 100644
index 0000000000000000000000000000000000000000..98cd0e5e4ec16716882f5ec495d2a0285c04c888
--- /dev/null
+++ b/src/random.h
@@ -0,0 +1,40 @@
+#ifndef INCLUDES_TARANTOOL_RANDOM_H
+#define INCLUDES_TARANTOOL_RANDOM_H
+/*
+ * Redistribution and use in source and binary forms, with or
+ * without modification, are permitted provided that the following
+ * conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above
+ *    copyright notice, this list of conditions and the
+ *    following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above
+ *    copyright notice, this list of conditions and the following
+ *    disclaimer in the documentation and/or other materials
+ *    provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY <COPYRIGHT HOLDER> ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+ * <COPYRIGHT HOLDER> OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
+ * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+#if defined(__cplusplus)
+extern "C" {
+#endif
+void
+random_init(void);
+
+#if defined(__cplusplus)
+}
+#endif /* extern "C" */
+#endif /* INCLUDES_TARANTOOL_RANDOM_H */
diff --git a/src/replica.cc b/src/replica.cc
index f627d131d504d86fa6679558ebabe1d5ed6babc0..18ab56e1a0088de5745f5820646fd20f44da88fc 100644
--- a/src/replica.cc
+++ b/src/replica.cc
@@ -90,6 +90,7 @@ int
 replica_bootstrap(const char *replication_source)
 {
 	char ip_addr[32];
+	char greeting[IPROTO_GREETING_SIZE];
 	int port;
 	struct sockaddr_in addr;
 	memset(&addr, 0, sizeof(addr));
@@ -109,7 +110,8 @@ replica_bootstrap(const char *replication_source)
 	int master = sio_socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
 	FDGuard guard(master);
 	sio_connect(master, &addr, sizeof(addr));
-	sio_write(master, &iproto_subscribe_request,
+	sio_readn(master, greeting, sizeof(greeting));
+	sio_writen(master, &iproto_subscribe_request,
 		  sizeof(iproto_subscribe_request));
 
 	guard.fd = -1;
@@ -120,10 +122,12 @@ static void
 remote_connect(struct ev_io *coio, struct sockaddr_in *remote_addr,
 	       int64_t initial_lsn, const char **err)
 {
+	char greeting[IPROTO_GREETING_SIZE];
 	evio_socket(coio, AF_INET, SOCK_STREAM, IPPROTO_TCP);
 
 	*err = "can't connect to master";
 	coio_connect(coio, remote_addr);
+	coio_readn(coio, greeting, sizeof(greeting));
 
 	struct iproto_subscribe_request request = iproto_subscribe_request;
 	request.lsn = mp_bswap_u64(initial_lsn);
diff --git a/src/scramble.c b/src/scramble.c
new file mode 100644
index 0000000000000000000000000000000000000000..4773e38a10456c41310af1b94a0a0690393406d0
--- /dev/null
+++ b/src/scramble.c
@@ -0,0 +1,106 @@
+/*
+ * Redistribution and use in source and binary forms, with or
+ * without modification, are permitted provided that the following
+ * conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above
+ *    copyright notice, this list of conditions and the
+ *    following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above
+ *    copyright notice, this list of conditions and the following
+ *    disclaimer in the documentation and/or other materials
+ *    provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY <COPYRIGHT HOLDER> ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+ * <COPYRIGHT HOLDER> OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
+ * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+#include "scramble.h"
+#include "third_party/sha1.h"
+#include "third_party/base64.h"
+#include <string.h>
+#include <stdio.h>
+
+static void
+xor(unsigned char *to, unsigned const char *left,
+    unsigned const char *right, uint32_t len)
+{
+	const uint8_t *end = to + len;
+	while (to < end)
+		*to++= *left++ ^ *right++;
+}
+
+void
+scramble_prepare(void *out, const void *salt, const void *password,
+		 int password_len)
+{
+	unsigned char hash1[SCRAMBLE_SIZE];
+	unsigned char hash2[SCRAMBLE_SIZE];
+	SHA1_CTX ctx;
+
+	SHA1Init(&ctx);
+	SHA1Update(&ctx, password, password_len);
+	SHA1Final(hash1, &ctx);
+
+	SHA1Init(&ctx);
+	SHA1Update(&ctx, hash1, SCRAMBLE_SIZE);
+	SHA1Final(hash2, &ctx);
+
+	SHA1Init(&ctx);
+	SHA1Update(&ctx, salt, SCRAMBLE_SIZE);
+	SHA1Update(&ctx, hash2, SCRAMBLE_SIZE);
+	SHA1Final(out, &ctx);
+
+	xor(out, hash1, out, SCRAMBLE_SIZE);
+}
+
+int
+scramble_check(const void *scramble, const void *salt, const void *hash2)
+{
+	SHA1_CTX ctx;
+	unsigned char candidate_hash2[SCRAMBLE_SIZE];
+
+	SHA1Init(&ctx);
+	SHA1Update(&ctx, salt, SCRAMBLE_SIZE);
+	SHA1Update(&ctx, hash2, SCRAMBLE_SIZE);
+	SHA1Final(candidate_hash2, &ctx);
+
+	xor(candidate_hash2, candidate_hash2, scramble, SCRAMBLE_SIZE);
+	/*
+	 * candidate_hash2 now supposedly contains hash1, turn it
+	 * into hash2
+	 */
+	SHA1Init(&ctx);
+	SHA1Update(&ctx, candidate_hash2, SCRAMBLE_SIZE);
+	SHA1Final(candidate_hash2, &ctx);
+
+	return memcmp(hash2, candidate_hash2, SCRAMBLE_SIZE);
+}
+
+void
+password_prepare(const char *password, int len, char *out, int out_len)
+{
+	unsigned char hash2[SCRAMBLE_SIZE];
+	SHA1_CTX ctx;
+
+	SHA1Init(&ctx);
+	SHA1Update(&ctx, (const unsigned char *) password, len);
+	SHA1Final(hash2, &ctx);
+
+	SHA1Init(&ctx);
+	SHA1Update(&ctx, hash2, SCRAMBLE_SIZE);
+	SHA1Final(hash2, &ctx);
+
+	base64_encode((char *) hash2, SCRAMBLE_SIZE, out, out_len);
+}
diff --git a/src/scramble.h b/src/scramble.h
new file mode 100644
index 0000000000000000000000000000000000000000..2a2a2a61eae182e89d4a11b42d4b927b8114ca1b
--- /dev/null
+++ b/src/scramble.h
@@ -0,0 +1,93 @@
+#ifndef INCLUDES_TARANTOOL_SCRAMBLE_H
+#define INCLUDES_TARANTOOL_SCRAMBLE_H
+/*
+ * Redistribution and use in source and binary forms, with or
+ * without modification, are permitted provided that the following
+ * conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above
+ *    copyright notice, this list of conditions and the
+ *    following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above
+ *    copyright notice, this list of conditions and the following
+ *    disclaimer in the documentation and/or other materials
+ *    provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY <COPYRIGHT HOLDER> ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+ * <COPYRIGHT HOLDER> OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
+ * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+#if defined(__cplusplus)
+extern "C" {
+#endif
+/**
+ * These are the core bits of the built-in Tarantool
+ * authentication. They implement the same algorithm as
+ * in MySQL 4.1 authentication:
+ *
+ * SERVER:  seed = create_random_string()
+ *          send(seed)
+ *
+ * CLIENT:  recv(seed)
+ *          hash1 = sha1("password")
+ *          hash2 = sha1(hash1)
+ *          reply = xor(hash1, sha1(seed, hash2))
+ *
+ *          ^^ these steps are done in scramble_prepare()
+ *
+ *          send(reply)
+ *
+ *
+ * SERVER:  recv(reply)
+ *
+ *          hash1 = xor(reply, sha1(seed, hash2))
+ *          candidate_hash2 = sha1(hash1)
+ *          check(candidate_hash2 == hash2)
+ *
+ *          ^^ these steps are done in scramble_check()
+ */
+
+enum { SCRAMBLE_SIZE = 20, SCRAMBLE_BASE64_SIZE = 28 };
+
+/**
+ * Prepare a scramble (cipher) to send over the wire
+ * to the server for authentication.
+ */
+void
+scramble_prepare(void *out, const void *salt, const void *password,
+		 int password_len);
+
+
+/**
+ * Verify a password.
+ *
+ * @retval 0  passwords do match
+ * @retval !0 passwords do not match
+ */
+int
+scramble_check(const void *scramble, const void *salt, const void *hash2);
+
+
+/**
+ * Prepare a password hash as is stored in the _user space.
+ * @pre out must be at least SCRAMBLE_BASE64_SIZE
+ * @post out contains base64_encode(sha1(sha1(password)))
+ */
+void
+password_prepare(const char *password, int len, char *out, int out_len);
+
+#if defined(__cplusplus)
+} /* extern "C" */
+#endif
+#endif /* INCLUDES_TARANTOOL_SCRAMBLE_H */
diff --git a/src/session.cc b/src/session.cc
index 624439d6fb42aafcabf11191917491d37b253d61..8a787fdd72e57ff5c166ddbb926edfdd435e1d07 100644
--- a/src/session.cc
+++ b/src/session.cc
@@ -35,8 +35,6 @@
 #include "exception.h"
 #include <sys/socket.h>
 
-uint32_t sid_max;
-
 static struct mh_i32ptr_t *session_registry;
 
 struct mempool session_pool;
@@ -44,18 +42,31 @@ struct mempool session_pool;
 RLIST_HEAD(session_on_connect);
 RLIST_HEAD(session_on_disconnect);
 
-struct session *
-session_create(int fd, uint64_t cookie)
+static inline  uint32_t
+sid_max()
 {
-	struct session *session = (struct session *)
-		mempool_alloc(&session_pool);
+	static uint32_t sid_max = 0;
 	/* Return the next sid rolling over the reserved value of 0. */
 	while (++sid_max == 0)
 		;
+	return sid_max;
+}
 
-	session->id = sid_max;
+struct session *
+session_create(int fd, uint64_t cookie)
+{
+	struct session *session = (struct session *)
+		mempool_alloc(&session_pool);
+	session->id = sid_max();
 	session->fd =  fd;
 	session->cookie = cookie;
+	/*
+	 * At first the session user is a superuser,
+	 * to make sure triggers run correctly.
+	 */
+	session_set_user(session, ADMIN, ADMIN);
+	for (int i = 0; i < SESSION_SEED_SIZE/sizeof(*session->salt); i++)
+		session->salt[i] = rand();
 	struct mh_i32ptr_node_t node;
 	node.key = session->id;
 	node.val = session;
@@ -80,6 +91,8 @@ session_create(int fd, uint64_t cookie)
 		mempool_free(&session_pool, session);
 		throw;
 	}
+	/* Set session user to guest, until it is authenticated. */
+	session_set_user(session, GUEST, GUEST);
 	return session;
 }
 
@@ -89,7 +102,8 @@ session_destroy(struct session *session)
 	if (session == NULL) /* no-op for a dead session. */
 		return;
 	fiber_set_session(fiber(), session);
-
+	/* For triggers. */
+	session_set_user(session, ADMIN, ADMIN);
 	try {
 		trigger_run(&session_on_disconnect, NULL);
 	} catch (Exception *e) {
diff --git a/src/session.h b/src/session.h
index 1ef46bd5886c5cd0394dbae5bbefd05bdefb1b1c..7cb45b8e613fb9f47ac3a2ecedd7613891e15976 100644
--- a/src/session.h
+++ b/src/session.h
@@ -1,3 +1,5 @@
+#ifndef INCLUDES_TARANTOOL_SESSION_H
+#define INCLUDES_TARANTOOL_SESSION_H
 /*
  * Redistribution and use in source and binary forms, with or
  * without modification, are permitted provided that the following
@@ -30,6 +32,10 @@
 #include <stdbool.h>
 #include "trigger.h"
 
+enum {	SESSION_SEED_SIZE = 32 };
+/** Predefined user ids. */
+enum { GUEST = 0, ADMIN =  1 };
+
 /**
  * Abstraction of a single user session:
  * for now, only provides accounting of established
@@ -40,9 +46,17 @@
  */
 
 struct session {
+	/** Session id. */
 	uint32_t id;
+	/** File descriptor. */
 	int fd;
+	/** Peer cookie - description of the peer. */
 	uint64_t cookie;
+	/** Authentication salt. */
+	int salt[SESSION_SEED_SIZE/sizeof(int)];
+	/** A look up key to quickly find session user. */
+	uint8_t auth_token;
+	uint32_t uid;
 };
 
 /**
@@ -71,7 +85,6 @@ session_create(int fd, uint64_t cookie);
 void
 session_destroy(struct session *);
 
-
 /**
  * Return a file descriptor
  * associated with a session, or -1 if the
@@ -89,6 +102,14 @@ session_exists(uint32_t sid)
 	return session_fd(sid) >= 0;
 }
 
+/** Set session auth token and user id. */
+static inline void
+session_set_user(struct session *session, uint8_t auth_token, uint32_t uid)
+{
+	session->auth_token = auth_token;
+	session->uid = uid;
+}
+
 /* The global on-connect trigger. */
 extern struct rlist session_on_connect;
 /* The global on-disconnect trigger. */
@@ -102,3 +123,4 @@ session_free();
 
 void
 session_storage_cleanup(int sid);
+#endif /* INCLUDES_TARANTOOL_SESSION_H */
diff --git a/src/sio.h b/src/sio.h
index 4ccba5eed580ff642daab507a525d8f03ef635e7..49a135308be2b8e95a63af5d929e25970d9b35ca 100644
--- a/src/sio.h
+++ b/src/sio.h
@@ -81,7 +81,6 @@ int sio_listen_backlog();
 int sio_accept(int fd, struct sockaddr_in *addr, socklen_t *addrlen);
 
 ssize_t sio_read(int fd, void *buf, size_t count);
-ssize_t sio_read_total(int fd, void *buf, size_t count, size_t total);
 
 ssize_t sio_write(int fd, const void *buf, size_t count);
 ssize_t sio_writev(int fd, const struct iovec *iov, int iovcnt);
diff --git a/src/tarantool.cc b/src/tarantool.cc
index 532d2b565394636067e72a132038e69088f689b2..a0a6180cbc3729a3f355942671209365895c10e4 100644
--- a/src/tarantool.cc
+++ b/src/tarantool.cc
@@ -68,7 +68,7 @@ extern "C" {
 #include "session.h"
 #include "box/box.h"
 #include "scoped_guard.h"
-
+#include "random.h"
 
 static pid_t master_pid;
 const char *cfg_filename = NULL;
@@ -608,6 +608,7 @@ main(int argc, char **argv)
 		shebang = abspath(argv[0]);
 	}
 
+	random_init();
 	say_init(argv[0]);
 
 	crc32_init();
@@ -776,7 +777,6 @@ main(int argc, char **argv)
 		strcpy(custom_proc_title, "@");
 		strcat(custom_proc_title, cfg.custom_proc_title);
 	}
-
 	say_logger_init(cfg.logger, &cfg.log_level, cfg.logger_nonblock);
 
 	say_crit("version %s", tarantool_version());
diff --git a/src/trivia/util.h b/src/trivia/util.h
index 13dcd4e4815eebca44d289c8f4ff4520682e4079..7a1c9ece86773e42de504aea9175cecbf93ca816 100644
--- a/src/trivia/util.h
+++ b/src/trivia/util.h
@@ -171,6 +171,9 @@ void symbols_free();
 
 char *abspath(const char *filename);
 
+char *
+int2str(int val);
+
 #ifndef HAVE_MEMMEM
 /* Declare memmem(). */
 void *
diff --git a/src/tt_pthread.h b/src/tt_pthread.h
index 93662323d3a43a1e7c9dfdbeae5dafd024b50644..c0a6683651ac1d429e3b491cd172a95322651459 100644
--- a/src/tt_pthread.h
+++ b/src/tt_pthread.h
@@ -76,7 +76,7 @@
 	if (e != 0 && e != EBUSY)		\
 		say_error("%s error %d at %s:%d", __func__, e, __FILE__, __LINE__);\
 	assert(e == 0 || e == EBUSY);		\
-	e					\
+	e;					\
 })
 
 #define tt_pthread_mutex_unlock(mutex)		\
@@ -145,7 +145,7 @@
 	if (ETIMEDOUT != e)                           \
 		say_error("%s error %d", __func__, e);\
 	assert(e == 0 || e == ETIMEDOUT);             \
-	e                                             \
+	e;                                             \
 })
 
 #define tt_pthread_once(control, function)	\
diff --git a/src/util.cc b/src/util.cc
index 5401a5bb4abac26f5e9804636c9f1327d8484aad..339e5a10b5d92293193c2416082409afccf21b38 100644
--- a/src/util.cc
+++ b/src/util.cc
@@ -348,6 +348,13 @@ abspath(const char *filename)
 	return abspath;
 }
 
+char *
+int2str(int val)
+{
+	static char __thread buf[22];
+	snprintf(buf, sizeof(buf), "%d", val);
+	return buf;
+}
 
 #ifdef HAVE_BFD
 static struct symbol *symbols;
diff --git a/test/big/lua.result b/test/big/lua.result
index 6444b7564609ab95e555e7635d2ae605fa7703a8..65a49eb15b39bd3d3f1da0479aa9546edefa1751 100644
--- a/test/big/lua.result
+++ b/test/big/lua.result
@@ -472,7 +472,7 @@ t = {}
 ...
 index:pairs('sid_t', { iterator = 'wrong_iterator_type' })
 ---
-- error: '[string "-- schema.lua (internal file)..."]:299: Wrong iterator type: wrong_iterator_type'
+- error: '[string "-- schema.lua (internal file)..."]:322: Wrong iterator type: wrong_iterator_type'
 ...
 index = nil
 ---
diff --git a/test/big/sql.result b/test/big/sql.result
index 787aef83f8eac8678dae60bb4768878f653b34db..e9d05c6ba6d406c875d4e87546f61027f0b0fae4 100644
--- a/test/big/sql.result
+++ b/test/big/sql.result
@@ -1,3 +1,9 @@
+box.schema.user.create('test', { password = 'test' })
+---
+...
+box.schema.user.grant('test', 'execute,read,write', 'universe')
+---
+...
 s = box.schema.create_space('tweedledum', { id = 0 })
 ---
 ...
@@ -584,6 +590,9 @@ delete from t0 where k0=3
 ---
 - [3, 'Creature ']
 ...
+box.schema.user.drop('test')
+---
+...
 s:drop()
 ---
 ...
diff --git a/test/big/sql.test.py b/test/big/sql.test.py
index 558103d06b9172280a03d06be15c309e929d862d..f59c80214c0c8bde8a0e485772a431aa14ac96bd 100644
--- a/test/big/sql.test.py
+++ b/test/big/sql.test.py
@@ -3,6 +3,8 @@ sql.sort = True
 #
 # Prepare spaces
 #
+admin("box.schema.user.create('test', { password = 'test' })")
+admin("box.schema.user.grant('test', 'execute,read,write', 'universe')")
 admin("s = box.schema.create_space('tweedledum', { id = 0 })")
 admin("s:create_index('primary', { type = 'tree', parts = { 0, 'str'} })")
 admin("s:create_index('secondary', { type = 'tree', unique = false, parts = {1, 'str'}})")
@@ -12,7 +14,7 @@ print """#
 # "SELECT fails with a disjunct and small LIMIT"
 # https://bugs.launchpad.net/tarantool/+bug/729758
 #"""
-
+sql.authenticate('test', 'test')
 sql("insert into t0 values ('Doe', 'Richard')")
 sql("insert into t0 values ('Roe', 'Richard')")
 sql("insert into t0 values ('Woe', 'Richard')")
@@ -203,6 +205,7 @@ admin("s.index[1]:max()")
 sql("delete from t0 where k0=1")
 sql("delete from t0 where k0=2")
 sql("delete from t0 where k0=3")
+admin("box.schema.user.drop('test')")
 admin("s:drop()")
 
 sql.sort = False
diff --git a/test/box/access.result b/test/box/access.result
new file mode 100644
index 0000000000000000000000000000000000000000..d81d8b8ece1e7450c0e9acf7423158d68f6eed46
--- /dev/null
+++ b/test/box/access.result
@@ -0,0 +1,123 @@
+-- user id for a Lua session is admin - 1
+box.session.uid()
+---
+- 1
+...
+-- extra arguments are ignored
+box.session.uid(nil)
+---
+- 1
+...
+-- admin
+box.session.user()
+---
+- admin
+...
+-- extra argumentes are ignored
+box.session.user(nil)
+---
+- admin
+...
+-- password() is a function which returns base64(sha1(sha1(password))
+-- a string to store in _user table
+box.schema.user.password('test')
+---
+- lL3OvhkIPOKh+Vn9Avlkx69M/Ck=
+...
+box.schema.user.password('test1')
+---
+- BsC/W2Ts4vZItfBIpxkDkGugjlw=
+...
+-- admin can create any user
+box.schema.user.create('test', { password = 'test' })
+---
+...
+-- su() let's you change the user of the session
+-- the user will be unabe to change back unless he/she
+-- is granted access to 'su'
+box.session.su('test')
+---
+...
+-- you can't create spaces unless you have a write access on
+-- system space _space
+-- in future we may  introduce a separate privilege
+box.schema.create_space('test')
+---
+- error: Read access denied for user 'test' to space '_space'
+...
+-- su() goes through because called from admin
+-- console, and it has no access checks
+-- for functions
+box.session.su('admin')
+---
+...
+box.schema.user.grant('test', 'write', 'space', '_space')
+---
+...
+--# setopt delimiter ';'
+function usermax()
+    local i = 1
+    while true do
+        box.schema.user.create('user'..i)
+        i = i + 1
+    end
+end;
+---
+...
+usermax();
+---
+- error: 'A limit on the total number of users has been reached: 32'
+...
+function usermax()
+    local i = 1
+    while true do
+        box.schema.user.drop('user'..i)
+        i = i + 1
+    end
+end;
+---
+...
+usermax();
+---
+- error: User 'user30' does not exist
+...
+--# setopt delimiter ''
+box.schema.user.create('rich')
+---
+...
+box.schema.user.grant('rich', 'read,write', 'universe')
+---
+...
+box.session.su('rich')
+---
+...
+uid = box.session.uid()
+---
+...
+box.schema.func.create('dummy')
+---
+...
+box.session.su('admin')
+---
+...
+box.space['_user']:delete{uid}
+---
+- error: 'Failed to drop user ''rich'': the user has objects'
+...
+box.schema.func.drop('dummy')
+---
+...
+box.space['_user']:delete{uid}
+---
+- error: 'Failed to drop user ''rich'': the user has objects'
+...
+box.schema.user.revoke('rich', 'read,write', 'universe')
+---
+...
+box.space['_user']:delete{uid}
+---
+- [3, '', 'rich', []]
+...
+box.schema.user.drop('test')
+---
+...
diff --git a/test/box/access.test.lua b/test/box/access.test.lua
new file mode 100644
index 0000000000000000000000000000000000000000..48b5ef987f3a6e378c0ab22df378c1ec0569d277
--- /dev/null
+++ b/test/box/access.test.lua
@@ -0,0 +1,58 @@
+-- user id for a Lua session is admin - 1
+box.session.uid()
+-- extra arguments are ignored
+box.session.uid(nil)
+-- admin
+box.session.user()
+-- extra argumentes are ignored
+box.session.user(nil)
+-- password() is a function which returns base64(sha1(sha1(password))
+-- a string to store in _user table
+box.schema.user.password('test')
+box.schema.user.password('test1')
+-- admin can create any user
+box.schema.user.create('test', { password = 'test' })
+-- su() let's you change the user of the session
+-- the user will be unabe to change back unless he/she
+-- is granted access to 'su'
+box.session.su('test')
+-- you can't create spaces unless you have a write access on
+-- system space _space
+-- in future we may  introduce a separate privilege
+box.schema.create_space('test')
+-- su() goes through because called from admin
+-- console, and it has no access checks
+-- for functions
+box.session.su('admin')
+box.schema.user.grant('test', 'write', 'space', '_space')
+
+--# setopt delimiter ';'
+function usermax()
+    local i = 1
+    while true do
+        box.schema.user.create('user'..i)
+        i = i + 1
+    end
+end;
+usermax();
+function usermax()
+    local i = 1
+    while true do
+        box.schema.user.drop('user'..i)
+        i = i + 1
+    end
+end;
+usermax();
+--# setopt delimiter ''
+box.schema.user.create('rich')
+box.schema.user.grant('rich', 'read,write', 'universe')
+box.session.su('rich')
+uid = box.session.uid()
+box.schema.func.create('dummy')
+box.session.su('admin')
+box.space['_user']:delete{uid}
+box.schema.func.drop('dummy')
+box.space['_user']:delete{uid}
+box.schema.user.revoke('rich', 'read,write', 'universe')
+box.space['_user']:delete{uid}
+box.schema.user.drop('test')
diff --git a/test/box/alter.result b/test/box/alter.result
index 71fe92ccda806b3b60f8fbd19f57106a15ddfd72..618a03445c72c8745b696b35db3f4664b1253e87 100644
--- a/test/box/alter.result
+++ b/test/box/alter.result
@@ -4,11 +4,14 @@ _space = box.space[box.schema.SPACE_ID]
 _index = box.space[box.schema.INDEX_ID]
 ---
 ...
+ADMIN = 1
+---
+...
 --
 -- Test insertion into a system space - verify that
 -- mandatory fields are required.
 --
-_space:insert{_space.n, 5, 'test'}
+_space:insert{_space.n, ADMIN, 'test', 5 }
 ---
 - error: Duplicate key exists in unique index 0
 ...
@@ -22,35 +25,35 @@ _space:insert{'hello', 'world', 'test'}
 --
 -- Can't create a space which has wrong arity - arity must be NUM
 --
-_space:insert{_space.n, 'world', 'test'}
+_space:insert{_space.n, ADMIN, 'test', 'world'}
 ---
 - error: Duplicate key exists in unique index 0
 ...
 --
 -- There is already a tuple for the system space
 --
-_space:insert{_space.n, 0, '_space'}
+_space:insert{_space.n, ADMIN, '_space', 0}
 ---
 - error: Duplicate key exists in unique index 0
 ...
-_space:replace{_space.n, 0, '_space'}
+_space:replace{_space.n, ADMIN, '_space', 0}
 ---
-- [280, 0, '_space']
+- [280, 1, '_space', 0]
 ...
-_space:insert{_index.n, 0, '_index'}
+_space:insert{_index.n, ADMIN, '_index', 0}
 ---
 - error: Duplicate key exists in unique index 0
 ...
-_space:replace{_index.n, 0, '_index'}
+_space:replace{_index.n, ADMIN, '_index', 0}
 ---
-- [288, 0, '_index']
+- [288, 1, '_index', 0]
 ...
 --
 -- Can't change properties of a space
 --
-_space:replace{_space.n, 0, '_space'}
+_space:replace{_space.n, ADMIN, '_space', 0}
 ---
-- [280, 0, '_space']
+- [280, 1, '_space', 0]
 ...
 --
 -- Can't drop a system space
@@ -77,7 +80,7 @@ _space:update({_space.n}, {{'+', 0, 2}})
 --
 -- Create a space
 --
-t = _space:auto_increment{0, 'hello'}
+t = _space:auto_increment{ADMIN, 'hello', 0}
 ---
 ...
 -- Check that a space exists
@@ -86,7 +89,7 @@ space = box.space[t[0]]
 ...
 space.n
 ---
-- 289
+- 313
 ...
 space.arity
 ---
@@ -101,23 +104,23 @@ space.index[0]
 --
 space:select{0}
 ---
-- error: 'No index #0 is defined in space 289'
+- error: 'No index #0 is defined in space 313'
 ...
 space:insert{0, 0}
 ---
-- error: 'No index #0 is defined in space 289'
+- error: 'No index #0 is defined in space 313'
 ...
 space:replace{0, 0}
 ---
-- error: 'No index #0 is defined in space 289'
+- error: 'No index #0 is defined in space 313'
 ...
 space:update({0}, {{'+', 0, 1}})
 ---
-- error: 'No index #0 is defined in space 289'
+- error: 'No index #0 is defined in space 313'
 ...
 space:delete{0}
 ---
-- error: 'No index #0 is defined in space 289'
+- error: 'No index #0 is defined in space 313'
 ...
 t = _space:delete{space.n}
 ---
@@ -131,7 +134,7 @@ space_deleted
 ...
 space:replace{0}
 ---
-- error: Space 289 does not exist
+- error: Space 313 does not exist
 ...
 _index:insert{_space.n, 0, 'primary', 'tree', 1, 1, 0, 'num'}
 ---
@@ -153,18 +156,26 @@ _index:select{}
 ---
 - - [272, 0, 'primary', 'tree', 1, 1, 0, 'str']
   - [280, 0, 'primary', 'tree', 1, 1, 0, 'num']
-  - [280, 1, 'name', 'tree', 1, 1, 2, 'str']
+  - [280, 1, 'owner', 'tree', 0, 1, 1, 'num']
+  - [280, 2, 'name', 'tree', 1, 1, 2, 'str']
   - [288, 0, 'primary', 'tree', 1, 2, 0, 'num', 1, 'num']
-  - [288, 1, 'name', 'tree', 1, 2, 0, 'num', 2, 'str']
+  - [288, 2, 'name', 'tree', 1, 2, 0, 'num', 2, 'str']
+  - [296, 0, 'primary', 'tree', 1, 1, 0, 'num']
+  - [296, 1, 'owner', 'tree', 0, 1, 1, 'num']
+  - [296, 2, 'name', 'tree', 1, 1, 2, 'str']
+  - [304, 0, 'primary', 'tree', 1, 1, 0, 'num']
+  - [304, 2, 'name', 'tree', 1, 1, 2, 'str']
+  - [312, 0, 'primary', 'tree', 1, 3, 1, 'num', 2, 'str', 3, 'num']
+  - [312, 1, 'owner', 'tree', 0, 1, 1, 'num']
 ...
 -- modify indexes of a system space
 _index:delete{_index.n, 0}
 ---
 - error: Can't drop the primary key in a system space, space id 288
 ...
-_space:insert{1000, 0, 'hello'}
+_space:insert{1000, ADMIN, 'hello', 0}
 ---
-- [1000, 0, 'hello']
+- [1000, 1, 'hello', 0]
 ...
 _index:insert{1000, 0, 'primary', 'tree', 1, 1, 0, 'num'}
 ---
@@ -195,9 +206,12 @@ box.snapshot()
 ...
 --# stop server default
 --# start server default
-box.space['_space']:insert{1000, 0, 'test'}
+ADMIN = 1
+---
+...
+box.space['_space']:insert{1000, ADMIN, 'test', 0}
 ---
-- [1000, 0, 'test']
+- [1000, 1, 'test', 0]
 ...
 box.space[1000].n
 ---
@@ -205,7 +219,7 @@ box.space[1000].n
 ...
 box.space['_space']:delete{1000}
 ---
-- [1000, 0, 'test']
+- [1000, 1, 'test', 0]
 ...
 box.space[1000]
 ---
diff --git a/test/box/alter.test.lua b/test/box/alter.test.lua
index e8058fb99d187384bfe99e782af56f135e46c5ac..120d2237d9cbcc975b8f35a0caebbfe17b1b2672 100644
--- a/test/box/alter.test.lua
+++ b/test/box/alter.test.lua
@@ -1,10 +1,11 @@
 _space = box.space[box.schema.SPACE_ID]
 _index = box.space[box.schema.INDEX_ID]
+ADMIN = 1
 --
 -- Test insertion into a system space - verify that
 -- mandatory fields are required.
 --
-_space:insert{_space.n, 5, 'test'}
+_space:insert{_space.n, ADMIN, 'test', 5 }
 --
 -- Bad space id
 --
@@ -12,18 +13,18 @@ _space:insert{'hello', 'world', 'test'}
 --
 -- Can't create a space which has wrong arity - arity must be NUM
 --
-_space:insert{_space.n, 'world', 'test'}
+_space:insert{_space.n, ADMIN, 'test', 'world'}
 --
 -- There is already a tuple for the system space
 --
-_space:insert{_space.n, 0, '_space'}
-_space:replace{_space.n, 0, '_space'}
-_space:insert{_index.n, 0, '_index'}
-_space:replace{_index.n, 0, '_index'}
+_space:insert{_space.n, ADMIN, '_space', 0}
+_space:replace{_space.n, ADMIN, '_space', 0}
+_space:insert{_index.n, ADMIN, '_index', 0}
+_space:replace{_index.n, ADMIN, '_index', 0}
 --
 -- Can't change properties of a space
 --
-_space:replace{_space.n, 0, '_space'}
+_space:replace{_space.n, ADMIN, '_space', 0}
 --
 -- Can't drop a system space
 --
@@ -37,7 +38,7 @@ _space:update({_space.n}, {{'+', 0, 2}})
 --
 -- Create a space
 --
-t = _space:auto_increment{0, 'hello'}
+t = _space:auto_increment{ADMIN, 'hello', 0}
 -- Check that a space exists
 space = box.space[t[0]]
 space.n
@@ -62,7 +63,7 @@ _index:replace{_index.n, 0, 'primary', 'tree', 1, 2, 0, 'num', 1, 'num'}
 _index:select{}
 -- modify indexes of a system space
 _index:delete{_index.n, 0}
-_space:insert{1000, 0, 'hello'}
+_space:insert{1000, ADMIN, 'hello', 0}
 _index:insert{1000, 0, 'primary', 'tree', 1, 1, 0, 'num'}
 box.space[1000]:insert{0, 'hello, world'}
 box.space[1000]:drop()
@@ -74,7 +75,8 @@ _space:run_triggers(false)
 box.snapshot()
 --# stop server default
 --# start server default
-box.space['_space']:insert{1000, 0, 'test'}
+ADMIN = 1
+box.space['_space']:insert{1000, ADMIN, 'test', 0}
 box.space[1000].n
 box.space['_space']:delete{1000}
 box.space[1000]
diff --git a/test/box/alter_limits.result b/test/box/alter_limits.result
index 03b43e0f3e9ed651c490c420cccc7a52c0204963..2b47ebd6bbf7f3b07f4a8e71287b077280425ea6 100644
--- a/test/box/alter_limits.result
+++ b/test/box/alter_limits.result
@@ -244,8 +244,11 @@ s:select{}
 ---
 - - [1, 2]
 ...
+ARITY = 3
+---
+...
 -- increase arity -- error
-box.space['_space']:update(s.n, {{"=", 1, 3}})
+box.space['_space']:update(s.n, {{"=", ARITY, 3}})
 ---
 - error: 'Can''t modify space 512: can not change arity on a non-empty space'
 ...
@@ -254,21 +257,21 @@ s:select{}
 - - [1, 2]
 ...
 -- decrease arity - error
-box.space['_space']:update(s.n, {{"=", 1, 1}})
+box.space['_space']:update(s.n, {{"=", ARITY, 1}})
 ---
 - error: 'Can''t modify space 512: can not change arity on a non-empty space'
 ...
 -- remove arity - ok
-box.space['_space']:update(s.n, {{"=", 1, 0}})
+box.space['_space']:update(s.n, {{"=", ARITY, 0}})
 ---
-- [512, 0, 'test', '']
+- [512, 1, 'test', 0, '']
 ...
 s:select{}
 ---
 - - [1, 2]
 ...
 -- increase arity - error
-box.space['_space']:update(s.n, {{"=", 1, 3}})
+box.space['_space']:update(s.n, {{"=", ARITY, 3}})
 ---
 - error: 'Can''t modify space 512: can not change arity on a non-empty space'
 ...
@@ -280,9 +283,9 @@ s:select{}
 - []
 ...
 -- set arity of an empty space
-box.space['_space']:update(s.n, {{"=", 1, 3}})
+box.space['_space']:update(s.n, {{"=", ARITY, 3}})
 ---
-- [512, 3, 'test', '']
+- [512, 1, 'test', 3, '']
 ...
 s:select{}
 ---
@@ -659,7 +662,7 @@ s:create_index('third', { type = 'hash', parts = {  2, 'num' } })
 ...
 s.index.third:rename('second')
 ---
-- error: Duplicate key exists in unique index 1
+- error: Duplicate key exists in unique index 2
 ...
 s.index.third.id
 ---
diff --git a/test/box/alter_limits.test.lua b/test/box/alter_limits.test.lua
index 82063fc12998c868d03bfc4421afb6bbd1a967be..f55125206f99489131094b0fe5abec834b448e79 100644
--- a/test/box/alter_limits.test.lua
+++ b/test/box/alter_limits.test.lua
@@ -84,20 +84,22 @@ s:insert{1}
 s:insert{1, 2}
 s:insert{1, 2, 3}
 s:select{}
+ARITY = 3
 -- increase arity -- error
-box.space['_space']:update(s.n, {{"=", 1, 3}})
+
+box.space['_space']:update(s.n, {{"=", ARITY, 3}})
 s:select{}
 -- decrease arity - error
-box.space['_space']:update(s.n, {{"=", 1, 1}})
+box.space['_space']:update(s.n, {{"=", ARITY, 1}})
 -- remove arity - ok
-box.space['_space']:update(s.n, {{"=", 1, 0}})
+box.space['_space']:update(s.n, {{"=", ARITY, 0}})
 s:select{}
 -- increase arity - error
-box.space['_space']:update(s.n, {{"=", 1, 3}})
+box.space['_space']:update(s.n, {{"=", ARITY, 3}})
 s:truncate()
 s:select{}
 -- set arity of an empty space
-box.space['_space']:update(s.n, {{"=", 1, 3}})
+box.space['_space']:update(s.n, {{"=", ARITY, 3}})
 s:select{}
 -- arity actually works
 s:insert{3, 4}
diff --git a/test/box/bad_trigger.result b/test/box/bad_trigger.result
index a28855fbba5f38416b62fb7af4ffff5cae0a5b98..b40377d1712a5493a6b256b87c9530d8bb9d93cf 100644
--- a/test/box/bad_trigger.result
+++ b/test/box/bad_trigger.result
@@ -10,12 +10,7 @@ box.session.on_connect(f1)
 ---
 ...
 select * from t0 where k0=0
----
-- error:
-    errcode: ER_PROC_LUA
-    errmsg: [string "function f1() nosuchfunction() end"]:1: attempt to call global 'nosuchfunction' (a nil value)
-...
-Connection is dead.
+Connection is dead: Connection reset by peer.
 
 box.session.on_connect(nil, f1)
 ---
diff --git a/test/box/bad_trigger.test.py b/test/box/bad_trigger.test.py
index 083c7c6235afb1f6b4bac38a265e1e42d8b79c74..2083ac3f8cdfa8046c7a44aba60e9c18f3b90c93 100644
--- a/test/box/bad_trigger.test.py
+++ b/test/box/bad_trigger.test.py
@@ -1,4 +1,5 @@
 from lib.box_connection import BoxConnection
+from tarantool import NetworkError
 print """ 
  #
  # if on_connect() trigger raises an exception, the connection is dropped
@@ -7,11 +8,11 @@ print """
 
 admin("function f1() nosuchfunction() end")
 admin("box.session.on_connect(f1)")
-con1 = BoxConnection('localhost', sql.port)
-con1("select * from t0 where k0=0")
-if not con1.check_connection():
-    print "Connection is dead.\n"
-else:
+try:
+    con1 = BoxConnection('localhost', sql.port)
+    con1("select * from t0 where k0=0")
     print "Connection is alive.\n"
+except NetworkError as e:
+    print "Connection is dead: {0}.\n".format(e.message)
 # Clean-up
 admin("box.session.on_connect(nil, f1)")
diff --git a/test/box/call.result b/test/box/call.result
index 334ccd8cdb592844954ef85becd7953abafa4393..06625a45290faf2c7104c66c4a8243e14f87aa3d 100644
--- a/test/box/call.result
+++ b/test/box/call.result
@@ -1,3 +1,9 @@
+box.schema.user.create('test', { password = 'test' })
+---
+...
+box.schema.user.grant('test', 'execute,read,write', 'universe')
+---
+...
 function f1() return 'testing', 1, false, -1, 1.123, 1e123, nil end
 ---
 ...
@@ -366,3 +372,6 @@ call space:delete(4)
 space:drop()
 ---
 ...
+box.schema.user.drop('test')
+---
+...
diff --git a/test/box/call.test.py b/test/box/call.test.py
index 830b5ef80bed84a1a42cb89775049aa285cb7031..a126b578fdd386a62173c8df3ca04ce0c019ed35 100644
--- a/test/box/call.test.py
+++ b/test/box/call.test.py
@@ -1,6 +1,9 @@
 import os
 import sys
 
+admin("box.schema.user.create('test', { password = 'test' })")
+admin("box.schema.user.grant('test', 'execute,read,write', 'universe')")
+sql.authenticate('test', 'test')
 admin("function f1() return 'testing', 1, false, -1, 1.123, 1e123, nil end")
 admin("f1()")
 sql("call f1()")
@@ -118,3 +121,4 @@ sql("call field_x(4, 1)")
 sql("call space:delete(4)")
 
 admin("space:drop()")
+admin("box.schema.user.drop('test')")
diff --git a/test/box/dup_key1.xlog b/test/box/dup_key1.xlog
index a168b8473c850b6915b89dae08b8fce7816dc0e2..08563a9fb2cb9836509d28764624e13ae2c2d2dd 100644
Binary files a/test/box/dup_key1.xlog and b/test/box/dup_key1.xlog differ
diff --git a/test/box/dup_key2.xlog b/test/box/dup_key2.xlog
index 5d6978b801b0a483023b3efd218fadcd97645d5c..fb10436343275d0d4f7b12af4a3746fa56f0c55b 100644
Binary files a/test/box/dup_key2.xlog and b/test/box/dup_key2.xlog differ
diff --git a/test/box/misc.result b/test/box/misc.result
index 3f0752c55796438c320dbeef3a4921c847afbc85..b84c05a3806f610eb400dd6394f78dae849bb052 100644
--- a/test/box/misc.result
+++ b/test/box/misc.result
@@ -193,7 +193,8 @@ end;
 ...
 t;
 ---
-- - 'box.error.ER_NO_SUCH_INDEX : 35'
+- - 'box.error.ER_CREATE_FUNCTION : 50'
+  - 'box.error.ER_NO_SUCH_INDEX : 35'
   - 'box.error.ER_TUPLE_FOUND : 3'
   - 'box.error.ER_CREATE_SPACE : 9'
   - 'box.error.ER_TUPLE_FORMAT_LIMIT : 16'
@@ -202,25 +203,39 @@ t;
   - 'box.error.ER_TUPLE_NOT_FOUND : 4'
   - 'box.error.ER_INDEX_ARITY : 39'
   - 'box.error.ER_WAL_IO : 40'
+  - 'box.error.ER_USER_MAX : 56'
+  - 'box.error.ER_NO_SUCH_FUNCTION : 51'
   - 'box.error.ER_INJECTION : 8'
   - 'box.error.ER_DROP_PRIMARY_KEY : 17'
   - 'box.error.ER_INDEX_TYPE : 13'
   - 'box.error.ER_ARG_TYPE : 26'
+  - 'box.error.ER_FUNCTION_MAX : 54'
+  - 'box.error.ER_FUNCTION_ACCESS_DENIED : 53'
+  - 'box.error.ER_SPACE_ARITY : 38'
   - 'box.error.ER_INVALID_MSGPACK : 20'
+  - 'box.error.ER_SPACE_ACCESS_DENIED : 55'
   - 'box.error.ER_KEY_PART_COUNT : 31'
+  - 'box.error.ER_UNKNOWN_SCHEMA_OBJECT : 49'
+  - 'box.error.ER_USER_EXISTS : 46'
   - 'box.error.ER_MEMORY_ISSUE : 2'
   - 'box.error.ER_ILLEGAL_PARAMS : 1'
   - 'box.error.ER_KEY_FIELD_TYPE : 18'
   - 'box.error.ER_NONMASTER : 6'
+  - 'box.error.ER_UNKNOWN_REQUEST_TYPE : 48'
   - 'box.error.ER_FIELD_TYPE_MISMATCH : 24'
   - 'box.error.ER_MODIFY_INDEX : 14'
+  - 'box.error.ER_PASSWORD_MISMATCH : 47'
   - 'box.error.ER_EXACT_MATCH : 19'
+  - 'box.error.ER_NO_SUCH_USER : 45'
   - 'box.error.ER_SECONDARY : 7'
+  - 'box.error.ER_FUNCTION_EXISTS : 52'
+  - 'box.error.ER_CREATE_USER : 43'
+  - 'box.error.ER_ACCESS_DENIED : 42'
   - 'box.error.ER_LAST_DROP : 15'
   - 'box.error.ER_UPDATE_FIELD : 29'
   - 'box.error.ER_FIBER_STACK : 30'
   - 'box.error.ER_UNKNOWN_UPDATE_OP : 28'
-  - 'box.error.ER_SPACE_ARITY : 38'
+  - 'box.error.ER_DROP_USER : 44'
   - 'box.error.ER_UNSUPPORTED : 5'
   - 'box.error.ER_NO_SUCH_FIELD : 37'
   - 'box.error.ER_TUPLE_NOT_ARRAY : 22'
diff --git a/test/box/net.box.result b/test/box/net.box.result
index 335d6819a6808dc7964d5641bee860ee625e1081..bc82f3272e3481a23d6ff7fddb9fa3f39d0c956d 100644
--- a/test/box/net.box.result
+++ b/test/box/net.box.result
@@ -4,6 +4,9 @@ space = box.schema.create_space('tweedledum')
 space:create_index('primary', { type = 'tree'})
 ---
 ...
+box.schema.user.grant('guest', 'read,write,execute', 'universe')
+---
+...
 remote = box.net.box.new('localhost', box.cfg.primary_port, '0.5')
 ---
 ...
@@ -427,13 +430,16 @@ remote:close()
 ...
 remote:close()
 ---
-- error: '[string "-- box_net.lua (internal file)..."]:528: box.net.box: already closed'
+- error: '[string "-- box_net.lua (internal file)..."]:530: box.net.box: already closed'
 ...
 remote:ping()
 ---
-- error: '[string "-- box_net.lua (internal file)..."]:533: box.net.box: connection
+- error: '[string "-- box_net.lua (internal file)..."]:535: box.net.box: connection
     was closed'
 ...
 space:drop()
 ---
 ...
+box.schema.user.revoke('guest', 'read,write,execute', 'universe')
+---
+...
diff --git a/test/box/net.box.test.lua b/test/box/net.box.test.lua
index 388922aeafc115ef42fc93e49bc581c4c329362b..09e43a4d263dee17ee01c6fd3e0546df29e0bda3 100644
--- a/test/box/net.box.test.lua
+++ b/test/box/net.box.test.lua
@@ -1,5 +1,6 @@
 space = box.schema.create_space('tweedledum')
 space:create_index('primary', { type = 'tree'})
+box.schema.user.grant('guest', 'read,write,execute', 'universe')
 remote = box.net.box.new('localhost', box.cfg.primary_port, '0.5')
 type(remote)
 remote:ping()
@@ -149,3 +150,4 @@ remote:close()
 remote:ping()
 
 space:drop()
+box.schema.user.revoke('guest', 'read,write,execute', 'universe')
diff --git a/test/box/session.result b/test/box/session.result
index ad5be7bc5292a7586e37f170d9deab12eb56daf0..4678a1ddccfd54e02443d6cbfe905f1bd9c7ba59 100644
--- a/test/box/session.result
+++ b/test/box/session.result
@@ -186,3 +186,11 @@ active_connections
 space:drop()
 ---
 ...
+box.session.uid()
+---
+- 1
+...
+box.session.user()
+---
+- admin
+...
diff --git a/test/box/session.test.lua b/test/box/session.test.lua
index 41323d4c0e31d8b6ca5fc73c71cb844170b67d96..f5b5111edce8e9012f2276636634eaa66fc834cd 100644
--- a/test/box/session.test.lua
+++ b/test/box/session.test.lua
@@ -79,3 +79,6 @@ box.session.on_disconnect(nil, audit_disconnect)
 active_connections
 
 space:drop()
+
+box.session.uid()
+box.session.user()
diff --git a/test/box/socket.result b/test/box/socket.result
index 82b40765dc925d19e9a12f2df7db1da48f623535..4637fcc3b630f0a1353e205f75528c0cc8480dc6 100644
--- a/test/box/socket.result
+++ b/test/box/socket.result
@@ -899,7 +899,7 @@ ping
 s:close()
 ---
 ...
- replies = 0 packet = msgpack.encode({[0] = 64, [1] = 0}) packet = msgpack.encode(packet:len())..packet function bug1160869() 	local s = box.socket.tcp() 	s:connect('127.0.0.1', box.cfg.primary_port) 	box.fiber.resume( box.fiber.create(function() 		box.fiber.detach() 		while true do 			_, status =  s:recv(18)             if status == "eof" then                 error("unexpected eof")             end 			replies = replies + 1 		end 	end) ) 	return s:send(packet) end 
+ replies = 0 packet = msgpack.encode({[0] = 64, [1] = 0}) packet = msgpack.encode(packet:len())..packet function bug1160869()     local s = box.socket.tcp()     s:connect('127.0.0.1', box.cfg.primary_port)     s:recv(128)     box.fiber.resume( box.fiber.create(function()         box.fiber.detach()         while true do             _, status =  s:recv(18)             if status == "eof" then                 error("unexpected eof")             end             replies = replies + 1         end     end) )     return s:send(packet) end 
 ---
 ...
 bug1160869()
@@ -921,7 +921,7 @@ replies
 ---
 - 3
 ...
- s = nil syncno = 0 reps = 0 packet = msgpack.encode({[0] = 64, [1] = 0}) packet = msgpack.encode(packet:len())..packet function iostart() 	if s ~= nil then 		return 	end 	s = box.socket.tcp() 	s:connect('127.0.0.1', box.cfg.primary_port) 	box.fiber.resume( box.fiber.create(function() 		box.fiber.detach() 		while true do 			s:recv(18)             if status == "eof" then                 error("unexpected eof")             end 			reps = reps + 1 		end 	end)) end  function iotest() 	iostart() 	syncno = syncno + 1     packet = msgpack.encode({[0] = 64, [1] = syncno})     packet = msgpack.encode(packet:len())..packet 	return s:send(packet) end 
+ s = nil syncno = 0 reps = 0 packet = msgpack.encode({[0] = 64, [1] = 0}) packet = msgpack.encode(packet:len())..packet function iostart()     if s ~= nil then         return     end     s = box.socket.tcp()     s:connect('127.0.0.1', box.cfg.primary_port)     s:recv(128)     box.fiber.resume( box.fiber.create(function()         box.fiber.detach()         while true do             s:recv(18)             if status == "eof" then                 error("unexpected eof")             end             reps = reps + 1         end     end)) end  function iotest()     iostart()     syncno = syncno + 1     packet = msgpack.encode({[0] = 64, [1] = syncno})     packet = msgpack.encode(packet:len())..packet     return s:send(packet) end 
 ---
 ...
 iotest()
@@ -946,7 +946,7 @@ reps
 test_listen_done = false
 ---
 ...
- function server() 	ms = box.socket.tcp() 	ms:bind('127.0.0.1', 8181) 	ms:listen() 	test_listen_done = true  	while true do 		local s = ms:accept( .5 ) 		if s ~= 'timeout' then 			print("accepted connection ", s) 			s:send('Hello world') 			s:shutdown(box.socket.SHUT_RDWR) 		end 	end end  fbr = box.fiber.wrap(server) 
+ function server()     ms = box.socket.tcp()     ms:bind('127.0.0.1', 8181)     ms:listen()     test_listen_done = true      while true do         local s = ms:accept( .5 )         if s ~= 'timeout' then             print("accepted connection ", s)             s:send('Hello world')             s:shutdown(box.socket.SHUT_RDWR)         end     end end  fbr = box.fiber.wrap(server) 
 ---
 ...
 wait_cout = 100 while not test_listen_done and wait_cout > 0 do box.fiber.sleep(0.001) wait_cout = wait_cout - 1 end
diff --git a/test/box/socket.test.py b/test/box/socket.test.py
index c5862682e82378c577ebe9d9a5f28e7dae6ae76d..0b86dd8553fbbfb3672a7d13bcbd511851fa288c 100644
--- a/test/box/socket.test.py
+++ b/test/box/socket.test.py
@@ -514,19 +514,20 @@ replies = 0
 packet = msgpack.encode({[0] = 64, [1] = 0})
 packet = msgpack.encode(packet:len())..packet
 function bug1160869()
-	local s = box.socket.tcp()
-	s:connect('127.0.0.1', box.cfg.primary_port)
-	box.fiber.resume( box.fiber.create(function()
-		box.fiber.detach()
-		while true do
-			_, status =  s:recv(18)
+    local s = box.socket.tcp()
+    s:connect('127.0.0.1', box.cfg.primary_port)
+    s:recv(128)
+    box.fiber.resume( box.fiber.create(function()
+        box.fiber.detach()
+        while true do
+            _, status =  s:recv(18)
             if status == "eof" then
                 error("unexpected eof")
             end
-			replies = replies + 1
-		end
-	end) )
-	return s:send(packet)
+            replies = replies + 1
+        end
+    end) )
+    return s:send(packet)
 end
 """
 admin(test.replace('\n', ' '))
@@ -544,29 +545,30 @@ reps = 0
 packet = msgpack.encode({[0] = 64, [1] = 0})
 packet = msgpack.encode(packet:len())..packet
 function iostart()
-	if s ~= nil then
-		return
-	end
-	s = box.socket.tcp()
-	s:connect('127.0.0.1', box.cfg.primary_port)
-	box.fiber.resume( box.fiber.create(function()
-		box.fiber.detach()
-		while true do
-			s:recv(18)
+    if s ~= nil then
+        return
+    end
+    s = box.socket.tcp()
+    s:connect('127.0.0.1', box.cfg.primary_port)
+    s:recv(128)
+    box.fiber.resume( box.fiber.create(function()
+        box.fiber.detach()
+        while true do
+            s:recv(18)
             if status == "eof" then
                 error("unexpected eof")
             end
-			reps = reps + 1
-		end
-	end))
+            reps = reps + 1
+        end
+    end))
 end
 
 function iotest()
-	iostart()
-	syncno = syncno + 1
+    iostart()
+    syncno = syncno + 1
     packet = msgpack.encode({[0] = 64, [1] = syncno})
     packet = msgpack.encode(packet:len())..packet
-	return s:send(packet)
+    return s:send(packet)
 end
 """
 admin(test.replace('\n', ' '))
@@ -582,19 +584,19 @@ admin("reps")
 #
 test="""
 function server()
-	ms = box.socket.tcp()
-	ms:bind('127.0.0.1', 8181)
-	ms:listen()
-	test_listen_done = true
-
-	while true do
-		local s = ms:accept( .5 )
-		if s ~= 'timeout' then
-			print("accepted connection ", s)
-			s:send('Hello world')
-			s:shutdown(box.socket.SHUT_RDWR)
-		end
-	end
+    ms = box.socket.tcp()
+    ms:bind('127.0.0.1', 8181)
+    ms:listen()
+    test_listen_done = true
+
+    while true do
+        local s = ms:accept( .5 )
+        if s ~= 'timeout' then
+            print("accepted connection ", s)
+            s:send('Hello world')
+            s:shutdown(box.socket.SHUT_RDWR)
+        end
+    end
 end
 
 fbr = box.fiber.wrap(server)
diff --git a/test/box/sql.result b/test/box/sql.result
index ef1e79a47b07d601776c51d5d39611c0d88ebc8b..764055da360e41705bd97128c0b21b94c28de046 100644
--- a/test/box/sql.result
+++ b/test/box/sql.result
@@ -1,7 +1,22 @@
-space = box.schema.create_space('tweedledum', { id = 0 })
+function f() box.schema.create_space('test', { id = 0 }) end
 ---
 ...
-space:create_index('primary', { type = 'hash' })
+box.schema.user.create('test', { password = 'test' })
+---
+...
+box.schema.func.create('f')
+---
+...
+box.schema.user.grant('test', 'Write', 'space', '_space')
+---
+...
+box.schema.user.grant('test', 'Execute', 'function', 'f')
+---
+...
+call f()
+---
+...
+box.space.test:create_index('primary', { type = 'hash' })
 ---
 ...
 ping
@@ -170,6 +185,9 @@ select * from t4294967295 where k0 = 0
 box.space[0]:drop()
 ---
 ...
+box.schema.user.drop('test')
+---
+...
 #
 # A test case for: http://bugs.launchpad.net/bugs/716683
 # Admin console should not stall on unknown command.
diff --git a/test/box/sql.test.py b/test/box/sql.test.py
index 19af93c2cc93779d415d62692f92f7601e79239b..4c95fd633697139c01ccde1b445ae7a45ceacebe 100644
--- a/test/box/sql.test.py
+++ b/test/box/sql.test.py
@@ -12,8 +12,15 @@ sql.set_schema({
     }
 })
 
-admin("space = box.schema.create_space('tweedledum', { id = 0 })")
-admin("space:create_index('primary', { type = 'hash' })")
+admin("function f() box.schema.create_space('test', { id = 0 }) end")
+admin("box.schema.user.create('test', { password = 'test' })")
+admin("box.schema.func.create('f')")
+admin("box.schema.user.grant('test', 'Write', 'space', '_space')")
+admin("box.schema.user.grant('test', 'Execute', 'function', 'f')")
+sql.authenticate('test', 'test')
+# call from sql to have the right owner
+sql("call f()")
+admin("box.space.test:create_index('primary', { type = 'hash' })")
 sql("ping")
 # xxx: bug -- currently selects no rows
 sql("select * from t0")
@@ -73,6 +80,7 @@ sql("select * from t1 where k0 = 0")
 sql("select * from t65537 where k0 = 0")
 sql("select * from t4294967295 where k0 = 0")
 admin("box.space[0]:drop()")
+admin("box.schema.user.drop('test')")
 
 print """#
 # A test case for: http://bugs.launchpad.net/bugs/716683
diff --git a/test/box/temp_spaces.result b/test/box/temp_spaces.result
index 4b068703634f820feddc1309fd3aebc6bc532a7e..133932e0b52554021cb429a791918c7e56c54263 100644
--- a/test/box/temp_spaces.result
+++ b/test/box/temp_spaces.result
@@ -1,5 +1,8 @@
 -- temporary spaces
 -- not a temporary
+FLAGS = 4
+---
+...
 s = box.schema.create_space('t', { temporary = true })
 ---
 ...
@@ -50,16 +53,19 @@ s:len()
 ---
 - 1
 ...
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'temporary'}})
 ---
-- [512, 0, 't', 'temporary']
+- [512, 1, 't', 0, 'temporary']
 ...
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, ''}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, ''}})
 ---
 - error: 'Can''t modify space 512: can not switch temporary flag on a non-empty space'
 ...
 --# stop server default
 --# start server default
+FLAGS = 4
+---
+...
 s = box.space.t
 ---
 ...
@@ -71,33 +77,33 @@ s.temporary
 ---
 - true
 ...
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'no-temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'no-temporary'}})
 ---
-- [512, 0, 't', 'no-temporary']
+- [512, 1, 't', 0, 'no-temporary']
 ...
 s.temporary
 ---
 - false
 ...
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, ',:asfda:temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, ',:asfda:temporary'}})
 ---
-- [512, 0, 't', ',:asfda:temporary']
+- [512, 1, 't', 0, ',:asfda:temporary']
 ...
 s.temporary
 ---
 - false
 ...
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'a,b,c,d,e'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'a,b,c,d,e'}})
 ---
-- [512, 0, 't', 'a,b,c,d,e']
+- [512, 1, 't', 0, 'a,b,c,d,e']
 ...
 s.temporary
 ---
 - false
 ...
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'temporary'}})
 ---
-- [512, 0, 't', 'temporary']
+- [512, 1, 't', 0, 'temporary']
 ...
 s.temporary
 ---
@@ -110,11 +116,11 @@ s:insert{1, 2, 3}
 ---
 - [1, 2, 3]
 ...
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'temporary'}})
 ---
-- [512, 0, 't', 'temporary']
+- [512, 1, 't', 0, 'temporary']
 ...
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'no-temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'no-temporary'}})
 ---
 - error: 'Can''t modify space 512: can not switch temporary flag on a non-empty space'
 ...
@@ -122,9 +128,9 @@ s:delete{1}
 ---
 - [1, 2, 3]
 ...
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'no-temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'no-temporary'}})
 ---
-- [512, 0, 't', 'no-temporary']
+- [512, 1, 't', 0, 'no-temporary']
 ...
 s:drop()
 ---
diff --git a/test/box/temp_spaces.test.lua b/test/box/temp_spaces.test.lua
index bb87a026c3da62cf2ae3f5baad6f4b88630334dd..44ee7013f0f057892bfc9b8fa27e577695c5bc30 100644
--- a/test/box/temp_spaces.test.lua
+++ b/test/box/temp_spaces.test.lua
@@ -1,5 +1,6 @@
 -- temporary spaces
 -- not a temporary
+FLAGS = 4
 s = box.schema.create_space('t', { temporary = true })
 s.temporary
 s:drop()
@@ -21,31 +22,32 @@ s:insert{1, 2, 3}
 s:get{1}
 s:len()
 
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'temporary'}})
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, ''}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, ''}})
 
 --# stop server default
 --# start server default
+FLAGS = 4
 
 s = box.space.t
 s:len()
 s.temporary
 
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'no-temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'no-temporary'}})
 s.temporary
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, ',:asfda:temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, ',:asfda:temporary'}})
 s.temporary
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'a,b,c,d,e'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'a,b,c,d,e'}})
 s.temporary
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'temporary'}})
 s.temporary
 
 s:get{1}
 s:insert{1, 2, 3}
 
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'temporary'}})
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'no-temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'no-temporary'}})
 
 s:delete{1}
-box.space[box.schema.SPACE_ID]:update(s.n, {{'=', 3, 'no-temporary'}})
+box.space[box.schema.SPACE_ID]:update(s.n, {{'=', FLAGS, 'no-temporary'}})
 s:drop()
diff --git a/test/box/xlog.result b/test/box/xlog.result
index ed153a977dfdf8b5b2a55dde83badf3301c70507..1d4a5abcb6daf170b363afac59fbc398ac8672eb 100644
--- a/test/box/xlog.result
+++ b/test/box/xlog.result
@@ -37,17 +37,17 @@ box.space[0]:insert{3, 'third tuple'}
 00000000000000000006.xlog.inprogress has been successfully deleted
 
 A test case for https://bugs.launchpad.net/tarantool/+bug/1052018
-panic_on_wal_error doens't work for duplicate key errors
+panic_on_wal_error doesn't work for duplicate key errors
 
-box.space[0]:get{1}
+box.space['test']:get{1}
 ---
-- [1, 'First record']
+- [1, 'first tuple']
 ...
-box.space[0]:get{2}
+box.space['test']:get{2}
 ---
-- [2, 'Second record']
+- [2, 'second tuple']
 ...
-#box.space[0]
+box.space['test']:len()
 ---
-- 0
+- 2
 ...
diff --git a/test/box/xlog.test.py b/test/box/xlog.test.py
index e6d69a0865e83f5b8d862b309c5490e76e9a1fe6..62cec54948ed2f1f09f852e7ffe5b830626728ce 100644
--- a/test/box/xlog.test.py
+++ b/test/box/xlog.test.py
@@ -109,7 +109,7 @@ if not os.access(wal_inprogress, os.F_OK) and not os.access(wal, os.F_OK):
 
 print """
 A test case for https://bugs.launchpad.net/tarantool/+bug/1052018
-panic_on_wal_error doens't work for duplicate key errors
+panic_on_wal_error doesn't work for duplicate key errors
 """
 server.stop()
 server.cfgfile_source = "box/panic_on_wal_error.cfg"
@@ -120,9 +120,9 @@ shutil.copy(abspath("box/dup_key1.xlog"),
 shutil.copy(abspath("box/dup_key2.xlog"),
            os.path.join(server.vardir, "00000000000000000004.xlog"))
 server.start()
-admin("box.space[0]:get{1}")
-admin("box.space[0]:get{2}")
-admin("#box.space[0]")
+admin("box.space['test']:get{1}")
+admin("box.space['test']:get{2}")
+admin("box.space['test']:len()")
 
 # cleanup
 server.stop()
diff --git a/test/connector_c/cfg/master.cfg b/test/connector_c/cfg/master.cfg
index 59dc00f297d0c2b7cde75bea6649bc03ec02c75c..67229b17755c4d4c5ec44d0921df703bf1fab569 100644
--- a/test/connector_c/cfg/master.cfg
+++ b/test/connector_c/cfg/master.cfg
@@ -3,7 +3,7 @@ slab_alloc_arena = 0.1
 pid_file = "box.pid"
 logger="cat - >> tarantool.log"
 
-primary_port = 33013
-admin_port = 33015
+primary_port = 3301
+admin_port = 3313
 
 rows_per_wal = 50
diff --git a/test/connector_c/cfg/tarantool.cfg b/test/connector_c/cfg/tarantool.cfg
index 59dc00f297d0c2b7cde75bea6649bc03ec02c75c..67229b17755c4d4c5ec44d0921df703bf1fab569 100644
--- a/test/connector_c/cfg/tarantool.cfg
+++ b/test/connector_c/cfg/tarantool.cfg
@@ -3,7 +3,7 @@ slab_alloc_arena = 0.1
 pid_file = "box.pid"
 logger="cat - >> tarantool.log"
 
-primary_port = 33013
-admin_port = 33015
+primary_port = 3301
+admin_port = 3313
 
 rows_per_wal = 50
diff --git a/test/lib/box_connection.py b/test/lib/box_connection.py
index e4bce7ab75a86483b9edf5cfb44b6abb30ba0452..e9b34de2ac53313f9b5e6033d4f1fe309ab75bd2 100644
--- a/test/lib/box_connection.py
+++ b/test/lib/box_connection.py
@@ -44,6 +44,9 @@ class BoxConnection(TarantoolConnection):
     def connect(self):
         self.py_con.connect()
 
+    def authenticate(self, user, password):
+        self.py_con.authenticate(user, password)
+
     def disconnect(self):
         self.py_con.close()
 
diff --git a/test/lib/tarantool-python b/test/lib/tarantool-python
index ef3a3b444b9a4e8a90bb5f631687b13f5890048b..6be9077e25e13d19be331d2999e2804c7ccfaa4a 160000
--- a/test/lib/tarantool-python
+++ b/test/lib/tarantool-python
@@ -1 +1 @@
-Subproject commit ef3a3b444b9a4e8a90bb5f631687b13f5890048b
+Subproject commit 6be9077e25e13d19be331d2999e2804c7ccfaa4a
diff --git a/test/replication/consistent.result b/test/replication/consistent.result
index 6a2cf544bd9d540367688c5b682a723be3b7b3e0..739b500885f50b6c3d92dbdb4a670385c2babbf7 100644
--- a/test/replication/consistent.result
+++ b/test/replication/consistent.result
@@ -1,6 +1,14 @@
 --# create server replica with configuration='replication/cfg/replica.cfg', rpl_master=default
 --# start server replica
 --# set connection default
+box.schema.user.grant('guest', 'read,write,execute', 'universe')
+---
+...
+-- Wait until the grant reaches the replica
+--# set connection replica
+while box.space['_priv']:len() < 1 do box.fiber.sleep(0.01) end
+---
+...
 --# setopt delimiter ';'
 --# set connection default, replica
 do
@@ -494,3 +502,6 @@ box.space[0]:insert{0, 'replica is RO'}
 box.space[0]:drop()
 ---
 ...
+box.schema.user.revoke('guest', 'read,write,execute', 'universe')
+---
+...
diff --git a/test/replication/consistent.test.lua b/test/replication/consistent.test.lua
index 8b4aacbec2e2e249123e4f0f59e50a0bae03efdd..7984339ec3d77370cf1a09a72e989e7cebbaea00 100644
--- a/test/replication/consistent.test.lua
+++ b/test/replication/consistent.test.lua
@@ -1,7 +1,10 @@
 --# create server replica with configuration='replication/cfg/replica.cfg', rpl_master=default
 --# start server replica
 --# set connection default
-
+box.schema.user.grant('guest', 'read,write,execute', 'universe')
+-- Wait until the grant reaches the replica
+--# set connection replica
+while box.space['_priv']:len() < 1 do box.fiber.sleep(0.01) end
 --# setopt delimiter ';'
 --# set connection default, replica
 do
@@ -168,3 +171,4 @@ box.space[0]:insert{0, 'replica is RO'}
 --# cleanup server replica
 --# set connection default
 box.space[0]:drop()
+box.schema.user.revoke('guest', 'read,write,execute', 'universe')
diff --git a/test/replication/hot_standby.result b/test/replication/hot_standby.result
index 36b6d725d1d73bfa253b624e6a9182cf0bfe5a40..78eefa3a1fd5126c51831f50e406b4377a58329d 100644
--- a/test/replication/hot_standby.result
+++ b/test/replication/hot_standby.result
@@ -2,8 +2,15 @@
 --# create server replica with configuration='replication/cfg/replica.cfg' with rpl_master=default
 --# start server hot_standby
 --# start server replica
+--# set connection default
+box.schema.user.grant('guest', 'read,write,execute', 'universe')
+---
+...
 --# setopt delimiter ';'
 --# set connection default, hot_standby, replica
+while box.space['_priv']:len() < 1 do box.fiber.sleep(0.01) end;
+---
+...
 do
     begin_lsn = box.info.lsn
 
diff --git a/test/replication/hot_standby.test.lua b/test/replication/hot_standby.test.lua
index 117a24be93f2856d9e297e26ba6cfd6f629212bf..461fbc8152ec26c707ceca6b290339dd81e5e611 100644
--- a/test/replication/hot_standby.test.lua
+++ b/test/replication/hot_standby.test.lua
@@ -2,9 +2,12 @@
 --# create server replica with configuration='replication/cfg/replica.cfg' with rpl_master=default
 --# start server hot_standby
 --# start server replica
+--# set connection default
+box.schema.user.grant('guest', 'read,write,execute', 'universe')
 
 --# setopt delimiter ';'
 --# set connection default, hot_standby, replica
+while box.space['_priv']:len() < 1 do box.fiber.sleep(0.01) end;
 do
     begin_lsn = box.info.lsn
 
diff --git a/test/replication/swap.result b/test/replication/swap.result
index 4b983caf47d198f2e568bd511a14e39990d3f961..9112d58f8467fa9613eb66eb34ed632cc47e81da 100644
--- a/test/replication/swap.result
+++ b/test/replication/swap.result
@@ -1,3 +1,9 @@
+box.schema.user.grant('guest', 'read,write,execute', 'universe')
+---
+...
+while box.space['_priv']:len() < 1 do box.fiber.sleep(0.01) end
+---
+...
 s = box.schema.create_space('tweedledum', {id = 0})
 ---
 ...
diff --git a/test/replication/swap.test.py b/test/replication/swap.test.py
index 7a33ed32bf41efd9fe2e0090c4d212ccd9ab4679..52ddf0c2973cce671379d98bf3ce0a27fae39019 100644
--- a/test/replication/swap.test.py
+++ b/test/replication/swap.test.py
@@ -41,6 +41,8 @@ schema = {
 master.sql.set_schema(schema)
 replica.sql.set_schema(schema)
 
+master.admin("box.schema.user.grant('guest', 'read,write,execute', 'universe')")
+replica.admin("while box.space['_priv']:len() < 1 do box.fiber.sleep(0.01) end")
 master.admin("s = box.schema.create_space('tweedledum', {id = 0})")
 master.admin("s:create_index('primary', {type = 'hash'})")
 id = ID_BEGIN
diff --git a/test/unit/CMakeLists.txt b/test/unit/CMakeLists.txt
index 32c2d7be733d427c3261370927bd8bd71c9f1204..4211e239ab4ce4f0f41dde33940db02d328762a1 100644
--- a/test/unit/CMakeLists.txt
+++ b/test/unit/CMakeLists.txt
@@ -47,3 +47,9 @@ set_source_files_properties(
     "-I${MSGPUCK_DIR} -I${MSGPUCK_DIR}/test")
 
 target_link_libraries(msgpack.test msgpuck)
+
+add_executable(scramble.test scramble.c
+    ${CMAKE_SOURCE_DIR}/src/scramble.c
+    ${CMAKE_SOURCE_DIR}/third_party/sha1.c
+    ${CMAKE_SOURCE_DIR}/third_party/base64.c
+    ${CMAKE_SOURCE_DIR}/src/random.c)
diff --git a/test/unit/scramble.c b/test/unit/scramble.c
new file mode 100644
index 0000000000000000000000000000000000000000..6d62e57cbabb779d0f8b87d04915b8d6f8b1345a
--- /dev/null
+++ b/test/unit/scramble.c
@@ -0,0 +1,65 @@
+#include "scramble.h"
+#include "random.h"
+#include "third_party/sha1.h"
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include "unit.h"
+
+void
+test_scramble()
+{
+	int salt[SCRAMBLE_SIZE/sizeof(int)];
+	for (int i = 0; i < sizeof(salt)/sizeof(int); i++)
+		salt[i] = rand();
+
+	char *password = "lechododilikraskaloh";
+	unsigned char hash2[SCRAMBLE_SIZE];
+
+	SHA1_CTX ctx;
+
+	SHA1Init(&ctx);
+	SHA1Update(&ctx, (unsigned char *) password, strlen(password));
+	SHA1Final(hash2, &ctx);
+
+	SHA1Init(&ctx);
+	SHA1Update(&ctx, hash2, SCRAMBLE_SIZE);
+	SHA1Final(hash2, &ctx);
+
+	char scramble[SCRAMBLE_SIZE];
+
+	scramble_prepare(scramble, salt, password, strlen(password));
+
+	printf("%d\n", scramble_check(scramble, salt, hash2));
+
+	password = "wrongpass";
+	scramble_prepare(scramble, salt, password, strlen(password));
+
+	printf("%d\n", scramble_check(scramble, salt, hash2) != 0);
+
+	scramble_prepare(scramble, salt, password, 0);
+
+	printf("%d\n", scramble_check(scramble, salt, hash2) != 0);
+}
+
+void
+test_password_prepare()
+{
+	char buf[SCRAMBLE_BASE64_SIZE * 2];
+	int password[5];
+	for (int i = 0; i < sizeof(password)/sizeof(int); i++)
+		password[i] = rand();
+	password_prepare((char *) password, sizeof(password),
+			 buf, sizeof(buf));
+	fail_unless(strlen(buf) == SCRAMBLE_BASE64_SIZE);
+}
+
+int main()
+{
+	random_init();
+
+	test_scramble();
+	test_password_prepare();
+
+	return 0;
+}
diff --git a/test/unit/scramble.result b/test/unit/scramble.result
new file mode 100644
index 0000000000000000000000000000000000000000..986394f7c0fa05e52a94a3d93dee7085ed84cca4
--- /dev/null
+++ b/test/unit/scramble.result
@@ -0,0 +1,3 @@
+0
+1
+1
diff --git a/test/wal/alter.result b/test/wal/alter.result
index 6422a461212e534be93d987b5e00ff48397562c6..d417108da16d0b331d1a027e96a6ddc322039de8 100644
--- a/test/wal/alter.result
+++ b/test/wal/alter.result
@@ -17,7 +17,7 @@ end;
 ...
 #spaces;
 ---
-- 65526
+- 65523
 ...
 -- cleanup
 for k, v in pairs(spaces) do
diff --git a/third_party/base64.c b/third_party/base64.c
index d2fdc253ab520216e574d7487a1184d8fcdc8729..e2fb9785c43ce65a76c2077455a1e18a0b4126a1 100644
--- a/third_party/base64.c
+++ b/third_party/base64.c
@@ -153,9 +153,12 @@ base64_encode_blockend(char *out_base64, int out_len,
 	}
 	if (out_pos >= out_end)
 		return out_pos - out_base64;
+#if 0
+	/* Sometimes the output is useful without a newline. */
 	*out_pos++ = '\n';
 	if (out_pos >= out_end)
 		return out_pos - out_base64;
+#endif
 	*out_pos = '\0';
 	return out_pos - out_base64;
 }
@@ -241,7 +244,7 @@ base64_decode_block(const char *in_base64, int in_len,
 			*out_pos    = (fragment & 0x03f) << 2;
 	case step_b:
 			do {
-				if (in_pos == in_end || out_pos + 1 >= out_end)
+				if (in_pos == in_end || out_pos >= out_end)
 				{
 					state->step = step_b;
 					state->result = *out_pos;
@@ -250,10 +253,11 @@ base64_decode_block(const char *in_base64, int in_len,
 				fragment = base64_decode_value(*in_pos++);
 			} while (fragment < 0);
 			*out_pos++ |= (fragment & 0x030) >> 4;
-			*out_pos    = (fragment & 0x00f) << 4;
+			if (out_pos < out_end)
+				*out_pos = (fragment & 0x00f) << 4;
 	case step_c:
 			do {
-				if (in_pos == in_end || out_pos + 1 >= out_end)
+				if (in_pos == in_end || out_pos >= out_end)
 				{
 					state->step = step_c;
 					state->result = *out_pos;
@@ -262,7 +266,8 @@ base64_decode_block(const char *in_base64, int in_len,
 				fragment = base64_decode_value(*in_pos++);
 			} while (fragment < 0);
 			*out_pos++ |= (fragment & 0x03c) >> 2;
-			*out_pos    = (fragment & 0x003) << 6;
+			if (out_pos < out_end)
+				*out_pos = (fragment & 0x003) << 6;
 	case step_d:
 			do {
 				if (in_pos == in_end || out_pos >= out_end)