Skip to content

Commit 4593502

Browse files
committed
docs(SDB): update
1 parent 43e3c29 commit 4593502

File tree

2 files changed

+9
-0
lines changed

2 files changed

+9
-0
lines changed

menu/navigation.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3982,6 +3982,10 @@
39823982
{
39833983
"label": "Securing connections using SSL/TLS",
39843984
"slug": "secure-connection-ssl-tls"
3985+
},
3986+
{
3987+
"label": "Using Row Level Security with PostgREST",
3988+
"slug": "postgrest-row-level-security"
39853989
}
39863990
],
39873991
"label": "API/CLI",

serverless/sql-databases/api-cli/postgrest-row-level-security.mdx

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,11 @@ categories:
1313
- serverless
1414
---
1515

16+
- A Scaleway account logged into the [console](https://console.scaleway.com)
17+
- [Owner](/identity-and-access-management/iam/concepts/#owner) status or [IAM permissions](/identity-and-access-management/iam/concepts/#permission) allowing you to perform actions in the intended Organization
18+
- [Created a Serverless SQL Database](/serverless/sql-databases/how-to/create-a-database/)
19+
- [Created two applications](/identity-and-access-management/iam/how-to/create-application/) in IAM
20+
1621
## Use Row Level Security with PostgREST
1722

1823
PostgREST built-in Row Level Security based on users JWT relies either on [role impersonation](https://docs.postgrest.org/en/v12/references/auth.html#user-impersonation) or [transaction-scoped settings](https://docs.postgrest.org/en/v12/references/transactions.html#tx-settings). Due to connection pooling, Serverless SQL Database currently only support transaction-scoped settings and requires using a single PostgreSQL role for all queries (the internal `role_readwrite` in PostgreSQL).

0 commit comments

Comments
 (0)