Skip to content

Commit 68a487f

Browse files
Merge pull request #242993 from GennadNY/gennadk900
Update concepts-security.md
2 parents bdfd935 + 54b2f6b commit 68a487f

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/postgresql/flexible-server/concepts-security.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -160,6 +160,9 @@ CREATE POLICY account_managers ON accounts TO managers
160160
USING (manager = current_user);
161161
```
162162
The USING clause implicitly adds a `WITH CHECK` clause, ensuring that members of the manager role cannot perform SELECT, DELETE, or UPDATE operations on rows that belong to other managers, and cannot INSERT new rows belonging to another manager.
163+
> [!NOTE]
164+
> In [PostgreSQL it is possible for a user to be assigned the *BYPASSRLS* attribute by another superuser](https://www.postgresql.org/docs/current/ddl-rowsecurity.html). With this permission, a user can bypass RLS for all tables in Postgres, as is superuser. That permission cannot be assigned in Azure Database for PostgreSQL - Flexible Server, since administrator role has no superuser privileges, as common in cloud based PaaS PostgreSQL service.
165+
163166

164167
## Updating passwords
165168

0 commit comments

Comments
 (0)