Chapter 32. Enhanced Security
Table of Contents
- 32.1. Memory Purge
- 32.2. Integrity Checks
- 32.3. Separation of Duties between Privileged DBMS Users
- 32.4. Restricting DBMS Administrator's Data Access
- 32.4.1. Overview
- 32.4.2. Creating Administrators and Managers of the DB Secured Schema
- 32.4.3. Creating a Table in the Secured Schema
- 32.4.4. Moving a Table to the Secured Schema
- 32.4.5. Permitting Access to a Protected Table
- 32.4.6. Checking Access: Filling in a Protected Table
- 32.4.7. Changes Made to a Backup Application
- 32.4.8. Changes Made to the Integrity-check Utility
- 32.4.2. Creating Administrators and Managers of the DB Secured Schema
- 32.4.1. Overview
This chapter describes enhanced security mechanisms available in the certified edition of Postgres Pro Enterprise. Moreover, Postgres Pro Enterprise provides the following native security tools:
The pg_proaudit extension enables detailed logging of various security events.
Advanced authentication policies allow you to restrict database usage and enforce password requirements by assigning profiles to roles. For details on profiles, see CREATE PROFILE. The catalog
pg_profile
lists all profiles available for your cluster.