diff --git a/doc/src/sgml/ddl.sgml b/doc/src/sgml/ddl.sgml index 61bf671c9f6a777611ddeb4860c8a2e3ca2a264e..052cf25ef3b208fb600b71883d92fc31f468fbe4 100644 --- a/doc/src/sgml/ddl.sgml +++ b/doc/src/sgml/ddl.sgml @@ -1512,20 +1512,11 @@ REVOKE ALL ON accounts FROM PUBLIC; <title>Row Security Policies</title> <indexterm zone="ddl-rowsecurity"> - <primary>rowsecurity</primary> + <primary>row security</primary> </indexterm> <indexterm zone="ddl-rowsecurity"> - <primary>rls</primary> - </indexterm> - - <indexterm> - <primary>policies</primary> - <see>policy</see> - </indexterm> - - <indexterm zone="ddl-rowsecurity"> - <primary>POLICY</primary> + <primary>policy</primary> </indexterm> <para> diff --git a/doc/src/sgml/ref/create_policy.sgml b/doc/src/sgml/ref/create_policy.sgml index 7b4f9438cd517c70260ba4350431b90607b8fefd..a4043f629dbdf3b012fafe40e52e020d2003e0da 100644 --- a/doc/src/sgml/ref/create_policy.sgml +++ b/doc/src/sgml/ref/create_policy.sgml @@ -112,7 +112,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable the user running the overall query. Therefore, users who are using a given policy must be able to access any tables or functions referenced in the expression or they will simply receive a permission denied error when - attempting to query the RLS-enabled table. This does not change how views + attempting to query the table that has row-level security enabled. This does not change how views work, however. As with normal queries and views, permission checks and policies for the tables which are referenced by a view will use the view owner's rights and any policies which apply to the view owner. diff --git a/doc/src/sgml/ref/create_role.sgml b/doc/src/sgml/ref/create_role.sgml index ea26027511458b362c892c60f88c556c9eb6e9d0..f4a176bff3fe490ad7cc23079350e17f1ae5de9a 100644 --- a/doc/src/sgml/ref/create_role.sgml +++ b/doc/src/sgml/ref/create_role.sgml @@ -196,7 +196,7 @@ CREATE ROLE <replaceable class="PARAMETER">name</replaceable> [ [ WITH ] <replac <term><literal>NOBYPASSRLS</literal></term> <listitem> <para> - These clauses determine whether a role is allowed to bypass row-security + These clauses determine whether a role is allowed to bypass row-level security (RLS) policies. A role having the <literal>BYPASSRLS</literal> attribute will be allowed to bypass row-security policies by setting <literal>row_security</literal> to