Skip to content

Commit 82b554f

Browse files
Merge pull request #278808 from GennadNY/gennadyk8989
Gennadyk8989
2 parents cd69628 + 8e4d8a7 commit 82b554f

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

articles/postgresql/flexible-server/concepts-networking-ssl-tls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ SELECT datname as "Database name", usename as "User name", ssl, client_addr, app
7474

7575
For testing, you can also use the **openssl** command directly, for example:
7676
```bash
77-
openssl s_client -connect localhost:5432 -starttls postgres
77+
openssl s_client -starttls postgres -showcerts -connect <your-postgresql-server-name>:5432
7878
```
7979
This command prints numerous low-level protocol information, including the TLS version, cipher, and so on. You must use the option -starttls postgres, or otherwise this command reports that no SSL is in use. Using this command requires at least OpenSSL 1.1.1.
8080

articles/postgresql/flexible-server/concepts-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ To get alerts from the Microsoft Defender plan, you'll first need to **enable it
8585
The best way to manage Azure Database for PostgreSQL - Flexible Server database access permissions at scale is using the concept of [roles](https://www.postgresql.org/docs/current/user-manag.html). A role can be either a database user or a group of database users. Roles can own the database objects and assign privileges on those objects to other roles to control who has access to which objects. It's also possible to grant membership in a role to another role, thus allowing the member role to use privileges assigned to another role.
8686
Azure Database for PostgreSQL - Flexible Server lets you grant permissions directly to the database users. **As a good security practice, it can be recommended that you create roles with specific sets of permissions based on minimum application and access requirements. You can then assign the appropriate roles to each user. Roles are used to enforce a *least privilege model* for accessing database objects.**
8787

88-
The Azure Database for PostgreSQL - Flexible Server instance is created with the three default roles defined. You can see these roles by running the command:
88+
The Azure Database for PostgreSQL - Flexible Server instance is created with the three default roles defined, in addition to built-in roles PostgreSQL creates. You can see these roles by running the command:
8989

9090
```sql
9191
SELECT rolname FROM pg_roles;

0 commit comments

Comments
 (0)