Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
P
postgres-lambda-diff
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Container registry
Model registry
Operate
Environments
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Jakob Huber
postgres-lambda-diff
Commits
9ad73797
Commit
9ad73797
authored
23 years ago
by
Tom Lane
Browse files
Options
Downloads
Patches
Plain Diff
Point out that superusers bypass privilege checking. Minor wordsmithing.
parent
b7bf03c9
No related branches found
No related tags found
No related merge requests found
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
doc/src/sgml/ref/grant.sgml
+21
-11
21 additions, 11 deletions
doc/src/sgml/ref/grant.sgml
with
21 additions
and
11 deletions
doc/src/sgml/ref/grant.sgml
+
21
−
11
View file @
9ad73797
<!--
$Header: /cvsroot/pgsql/doc/src/sgml/ref/grant.sgml,v 1.1
7
200
1/12/08 03:24:37 thomas
Exp $
$Header: /cvsroot/pgsql/doc/src/sgml/ref/grant.sgml,v 1.1
8
200
2/01/18 01:04:53 tgl
Exp $
PostgreSQL documentation
-->
...
...
@@ -43,14 +43,15 @@ GRANT { { SELECT | INSERT | UPDATE | DELETE | RULE | REFERENCES | TRIGGER } [,..
</para>
<para>
Users other than the creator do not have any access privileges
to
an
object unless the creator grants permissions.
Users other than the creator
of an object
do not have any access privileges
to
the
object unless the creator grants permissions.
There is no need to grant privileges to the creator of an object,
as the creator automatically holds all privileges
, and can also
drop the object.
(The creator could, however, choose to revoke
as the creator automatically holds all privileges
.
(The creator could, however, choose to revoke
some of his own privileges for safety. Note that the ability to
grant and revoke privileges is inherent in the creator and cannot
be lost.)
be lost. The right to drop the object is likewise inherent in the
creator, and cannot be granted or revoked.)
</para>
<para>
...
...
@@ -96,7 +97,7 @@ GRANT { { SELECT | INSERT | UPDATE | DELETE | RULE | REFERENCES | TRIGGER } [,..
<term>DELETE</term>
<listitem>
<para>
Allows
the
<xref linkend="sql-delete" endterm="sql-delete-title"> of a row from the
Allows <xref linkend="sql-delete" endterm="sql-delete-title"> of a row from the
specified table.
</para>
</listitem>
...
...
@@ -107,7 +108,7 @@ GRANT { { SELECT | INSERT | UPDATE | DELETE | RULE | REFERENCES | TRIGGER } [,..
<listitem>
<para>
Allows the creation of a rule on the table/view. (See <xref
linkend="sql-createrule" endterm="sql-createrule-title"> statement
)
.
linkend="sql-createrule" endterm="sql-createrule-title"> statement.
)
</para>
</listitem>
</varlistentry>
...
...
@@ -117,7 +118,7 @@ GRANT { { SELECT | INSERT | UPDATE | DELETE | RULE | REFERENCES | TRIGGER } [,..
<listitem>
<para>
To create a table with a foreign key constraint, it is
necessary to have this privilege on the table with the
primary
necessary to have this privilege on the table with the
referenced
key.
</para>
</listitem>
...
...
@@ -128,7 +129,7 @@ GRANT { { SELECT | INSERT | UPDATE | DELETE | RULE | REFERENCES | TRIGGER } [,..
<listitem>
<para>
Allows the creation of a trigger on the specified table. (See
<xref linkend="sql-createtrigger" endterm="sql-createtrigger-title"> statement
)
.
<xref linkend="sql-createtrigger" endterm="sql-createtrigger-title"> statement.
)
</para>
</listitem>
</varlistentry>
...
...
@@ -138,7 +139,8 @@ GRANT { { SELECT | INSERT | UPDATE | DELETE | RULE | REFERENCES | TRIGGER } [,..
<listitem>
<para>
Grant all of the above privileges at once. The
<literal>PRIVILEGES</literal> key word is optional, but it is
<literal>PRIVILEGES</literal> key word is optional in
<productname>PostgreSQL</productname>, though it is
required by strict SQL.
</para>
</listitem>
...
...
@@ -154,6 +156,14 @@ GRANT { { SELECT | INSERT | UPDATE | DELETE | RULE | REFERENCES | TRIGGER } [,..
<refsect1 id="SQL-GRANT-notes">
<title>Notes</title>
<para>
It should be noted that database <firstterm>superusers</> can access
all objects regardless of object privilege settings. This
is comparable to the rights of <literal>root</> in a Unix system.
As with <literal>root</>, it's unwise to operate as a superuser
except when absolutely necessary.
</para>
<para>
Currently, to grant privileges in <productname>PostgreSQL</productname>
to only a few columns, you must
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment