Commit eff091cc authored by Peter Eisentraut's avatar Peter Eisentraut

doc: Make some index terms and terminology more consistent

parent 241e6844
...@@ -1512,20 +1512,11 @@ REVOKE ALL ON accounts FROM PUBLIC; ...@@ -1512,20 +1512,11 @@ REVOKE ALL ON accounts FROM PUBLIC;
<title>Row Security Policies</title> <title>Row Security Policies</title>
<indexterm zone="ddl-rowsecurity"> <indexterm zone="ddl-rowsecurity">
<primary>rowsecurity</primary> <primary>row security</primary>
</indexterm> </indexterm>
<indexterm zone="ddl-rowsecurity"> <indexterm zone="ddl-rowsecurity">
<primary>rls</primary> <primary>policy</primary>
</indexterm>
<indexterm>
<primary>policies</primary>
<see>policy</see>
</indexterm>
<indexterm zone="ddl-rowsecurity">
<primary>POLICY</primary>
</indexterm> </indexterm>
<para> <para>
......
...@@ -112,7 +112,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable ...@@ -112,7 +112,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
the user running the overall query. Therefore, users who are using a given the user running the overall query. Therefore, users who are using a given
policy must be able to access any tables or functions referenced in the policy must be able to access any tables or functions referenced in the
expression or they will simply receive a permission denied error when expression or they will simply receive a permission denied error when
attempting to query the RLS-enabled table. This does not change how views attempting to query the table that has row-level security enabled. This does not change how views
work, however. As with normal queries and views, permission checks and work, however. As with normal queries and views, permission checks and
policies for the tables which are referenced by a view will use the view policies for the tables which are referenced by a view will use the view
owner's rights and any policies which apply to the view owner. owner's rights and any policies which apply to the view owner.
......
...@@ -196,7 +196,7 @@ CREATE ROLE <replaceable class="PARAMETER">name</replaceable> [ [ WITH ] <replac ...@@ -196,7 +196,7 @@ CREATE ROLE <replaceable class="PARAMETER">name</replaceable> [ [ WITH ] <replac
<term><literal>NOBYPASSRLS</literal></term> <term><literal>NOBYPASSRLS</literal></term>
<listitem> <listitem>
<para> <para>
These clauses determine whether a role is allowed to bypass row-security These clauses determine whether a role is allowed to bypass row-level security (RLS)
policies. A role having the <literal>BYPASSRLS</literal> attribute will policies. A role having the <literal>BYPASSRLS</literal> attribute will
be allowed to bypass row-security policies by setting be allowed to bypass row-security policies by setting
<literal>row_security</literal> to <literal>row_security</literal> to
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment