微信公众号搜"智元新知"关注
微信扫一扫可直接关注哦!

PostgreSQL访问控制

@H_404_0@使用GRANT和REVOKE管理权限:

@H_404_0@The GRANT command has two basic variants: one that grants privileges on

@H_404_0@ a database object (table,column,view,foreign table,sequence,

@H_404_0@ database,foreign-data wrapper,foreign server,function,procedural

@H_404_0@ language,schema,or tablespace),and one that grants membership in a

@H_404_0@ role. These variants are similar in many ways,but they are different

@H_404_0@ enough to be described separately.

@H_404_0@

@H_404_0@这个是9.4.1最新的官方文档,pgsql的权限控制很精细,精确到子段.表,子段,试图,外表,序列,数据库,外键表的数据,外键服务器,函数,过程语言,模式,表空间

@H_404_0@先创建测试数据:

@H_404_0@create table member(uid serial primary key,username varchar(40),email varchar(100),password varchar(32));

@H_404_0@insert into member(username,email,password) values('admin','[email protected]','e10adc3949ba59abbe56e057f20f883e'),('test','[email protected]','e10adc3949ba59abbe56e057f20f883e');

@H_404_0@testdb2=> select * from member;

@H_404_0@uid | username | email | password

@H_404_0@-----+----------+--------------+----------------------------------

@H_404_0@ 1 | admin | [email protected] | e10adc3949ba59abbe56e057f20f883e

@H_404_0@ 2 | test | [email protected] | e10adc3949ba59abbe56e057f20f883e

@H_404_0@(2 rows)

@H_404_0@testdb2=> \d

@H_404_0@ List of relations

@H_404_0@Schema | Name | Type | Owner

@H_404_0@--------+----------------+----------+-------

@H_404_0@public | member | table | sec

@H_404_0@public | member_uid_seq | sequence | sec

@H_404_0@数据库:testdb2

@H_404_0@表与数据库所属用户为sec:

@H_404_0@回收sec在member表的所有权限:

@H_404_0@REVOKE ALL ON sec FROM member;

@H_404_0@再执行update,query,delete会出现错误:

@H_404_0@testdb2=> select * from member;

@H_404_0@ERROR: permission denied for relation member

@H_404_0@查询某个表的权限:使用\dp命令

@H_404_0@testdb2=> \dp member;

@H_404_0@ Access privileges

@H_404_0@Schema | Name | Type | Access privileges | Column access privileges

@H_404_0@--------+--------+-------+-------------------+--------------------------

@H_404_0@public | member | table | |

@H_404_0@(1 row)

@H_404_0@把回收的所有权限重新授权回去:

testdb2=> grant all on member to sec;

GRANT

testdb2=> \dp member;

Access privileges

Schema | Name | Type | Access privileges | Column access privileges

--------+--------+-------+-------------------+--------------------------

public | member | table | sec=arwdDxt/sec |

(1 row)

@H_404_0@注:上面子段access privilages中arwdDxt的解释

@H_404_0@r -- SELECT ("read")

@H_404_0@ w -- UPDATE ("write")

@H_404_0@ a -- INSERT ("append")

@H_404_0@ d -- DELETE

@H_404_0@ D -- TruncATE

@H_404_0@ x -- REFERENCES

@H_404_0@ t -- TRIGGER

@H_404_0@ X -- EXECUTE

@H_404_0@ U -- USAGE

@H_404_0@ C -- CREATE

@H_404_0@ c -- CONNECT

@H_404_0@ T -- TEMPORARY

@H_404_0@回收某个指定查询权限(select,update,delete,truncate,insert):

@H_404_0@revoke select on member from sec;

@H_404_0@REVOKE upate,delete ON member FROM sec;

@H_404_0@授权查询的权限:

@H_404_0@GRANT select ON member to sec;

@H_404_0@指定子段(password)权限的授权:(以查询为例)

@H_404_0@1,首先你需要先回收用户sec对表member的select权限

@H_404_0@REVOKE select ON member FROM sec;

@H_404_0@2,授予用户sec,email与username的查询权限.

@H_404_0@GRANT select(username,password) ON member TO sec;

@H_404_0@如果先不做第一步,那么第二步是无效的,尽管对password这个子段作权限回收也是无效的.

版权声明:本文内容由互联网用户自发贡献,该文观点与技术仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请发送邮件至 [email protected] 举报,一经查实,本站将立刻删除。

相关推荐