File tree Expand file tree Collapse file tree 3 files changed +4
-13
lines changed Expand file tree Collapse file tree 3 files changed +4
-13
lines changed Original file line number Diff line number Diff line change @@ -1512,20 +1512,11 @@ REVOKE ALL ON accounts FROM PUBLIC;
15121512  <title>Row Security Policies</title>
15131513
15141514  <indexterm zone="ddl-rowsecurity">
1515-    <primary>rowsecurity </primary>
1515+    <primary>row security </primary>
15161516  </indexterm>
15171517
15181518  <indexterm zone="ddl-rowsecurity">
1519-    <primary>rls</primary>
1520-   </indexterm>
1521- 
1522-   <indexterm>
1523-    <primary>policies</primary>
1524-    <see>policy</see>
1525-   </indexterm>
1526- 
1527-   <indexterm zone="ddl-rowsecurity">
1528-    <primary>POLICY</primary>
1519+    <primary>policy</primary>
15291520  </indexterm>
15301521
15311522  <para>
Original file line number Diff line number Diff line change @@ -112,7 +112,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
112112   the user running the overall query.  Therefore, users who are using a given
113113   policy must be able to access any tables or functions referenced in the
114114   expression or they will simply receive a permission denied error when
115-    attempting to query the RLS-enabled table .  This does not change how views
115+    attempting to query the table that has row-level security enabled .  This does not change how views
116116   work, however.  As with normal queries and views, permission checks and
117117   policies for the tables which are referenced by a view will use the view
118118   owner's rights and any policies which apply to the view owner.
Original file line number Diff line number Diff line change @@ -196,7 +196,7 @@ CREATE ROLE <replaceable class="PARAMETER">name</replaceable> [ [ WITH ] <replac
196196      <term><literal>NOBYPASSRLS</literal></term>
197197      <listitem>
198198       <para>
199-         These clauses determine whether a role is allowed to bypass row-security
199+         These clauses determine whether a role is allowed to bypass row-level  security (RLS) 
200200        policies.  A role having the <literal>BYPASSRLS</literal> attribute will
201201        be allowed to bypass row-security policies by setting
202202        <literal>row_security</literal> to
 
 
   
 
     
   
   
          
    
    
     
    
      
     
     
    You can’t perform that action at this time.
  
 
    
  
    
      
        
     
       
      
     
   
 
    
    
  
 
  
 
     
    
0 commit comments