Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
P
Postgres FD Implementation
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Abuhujair Javed
Postgres FD Implementation
Commits
39f2594b
Commit
39f2594b
authored
Jan 07, 2015
by
Robert Haas
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
docs: Reword CREATE POLICY documentation.
parent
1e78d81e
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
12 additions
and
10 deletions
+12
-10
doc/src/sgml/ref/create_policy.sgml
doc/src/sgml/ref/create_policy.sgml
+12
-10
No files found.
doc/src/sgml/ref/create_policy.sgml
View file @
39f2594b
...
@@ -39,16 +39,18 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
...
@@ -39,16 +39,18 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
</para>
</para>
<para>
<para>
A policy is an expression which is added to the security-barrier
A policy limits the ability to SELECT, INSERT, UPDATE, or DELETE rows
qualifications of queries which are run against the table the policy is on,
in a table to those rows which match the relevant policy expression.
or an expression which is added to the with-check options for a table and
Existing table rows are checked against the expression specified via
which is applied to rows which would be added to the table.
USING, while new rows that would be created via INSERT or UPDATE are
The security-barrier qualifications will always be evaluated prior to any
checked against the expression specified via WITH CHECK. Generally,
user-defined functions or user-provided WHERE clauses, while the with-check
the system will enforce filter conditions imposed using security
expression will be evaluated against the rows which are going to be added to
policies prior to qualifications that appear in the query itself, in
the table. By adding policies to a table, a user can limit the rows which a
order to the prevent the inadvertent exposure of the protected data to
given user can select, insert, update, or delete. This capability is also
user-defined functions which might not be trustworthy. However,
known as Row Level Security or RLS.
functions and operators marked by the system (or the system
administrator) as LEAKPROOF may be evaluated before policy
expressions, as they are assumed to be trustworthy.
</para>
</para>
<para>
<para>
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment