use the setuaths and getauths commands. These may also be modified using the java security operations API.
Each accumulo user has a set of associated security labels
In this case an accumulo user with all authorizations needed by any of the applications users must be created.
...huh?
These authorizations could be obtained from a trusted 3rd party.
This describes a complex security model
Often production systems will integrate with Public-Key Infrastructure (PKI) and designate client code within the query layer to negotiate with PKI servers in order to authenticate users and retrieve their authorization tokens (credentials)
The class, Scanner, provides some mechanisms for retrieving data.
Note that in some divergence with regards to the typical CRUD model on databases, Accumulo's Mutation class does not provide a 'get method, though it does provide a number of 'put' methods.