Skip to content

Commit e9324e1

Browse files
committed
Update concepts-security.md
1 parent de2da2d commit e9324e1

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

articles/postgresql/flexible-server/concepts-security.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,8 @@ The **administrator role** should never be used by the application.
6868
In cloud-based PaaS environments access to a PostgreSQL superuser account is restricted to control plane operations only by cloud operators. Therefore, the **azure_pg_admin** account exists as a pseudo-superuser account. Your administrator role is a member of the **azure_pg_admin** role.
6969
However, the server admin account is not part of the **azuresu** role, which has superuser privileges and is used to perform control pane operations. Since this service is a managed PaaS service, only Microsoft is part of the superuser role.
7070

71+
> [!NOTE]
72+
> Number of superuser only permissions , such as creation of certain [implicit casts](https://www.postgresql.org/docs/current/sql-createcast.html), are not available with Azure Database for PostgreSQL - Flexible Server, since **azure_pg_Admin** role doesn't align to superuser role.
7173
7274
You can periodically audit the list of roles in your server. For example, you can connect using `psql` client and query the `pg_roles` table which lists all the roles along with privileges such as create additional roles, create databases, replication etc.
7375

0 commit comments

Comments
 (0)