Skip to content

Commit 15b433b

Browse files
Merge pull request #265597 from GennadNY/gennadyk-branch24
Update concepts-security.md
2 parents 633f3a6 + c4aa456 commit 15b433b

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/postgresql/flexible-server/concepts-security.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -166,6 +166,9 @@ In this example, user *user1* can connect and has all privileges in our test dat
166166
In PostgreSQL database role can have a number of attributes that define its privileges.One such attribute is the [**CREATEROLE** attribute](https://www.postgresql.org/docs/current/role-attributes.html), which is important to PostgreSQL database management of users and roles. In PostgreSQL 16 significant changes were introduced to this attribute.
167167
In PostgreSQL 16, users with **CREATEROLE** attribute no longer have the ability to hand out membership in any role to anyone; instead, like other users, without this attribute, they can only hand out memberships in roles for which they possess **ADMIN OPTION**. Also, in PostgreSQL 16,the **CREATEROLE** attribute still allows a non-superuser the ability to provision new users, however they can only drop users that they themselves created. Attempts to drop users , which is not create by user with **CREATEROLE** attribute, will result in an error.
168168

169+
PostgreSQL 16 also introduced new and improved built-in roles. New *pg_use_reserved_connections* role in PostgreSQL 16 allows the use of connection slots reserved via reserved_connections.The *pg_create_subscription* role allows superusers to create subscriptions.
170+
171+
169172

170173
## Row level security
171174

0 commit comments

Comments
 (0)