OnDoc
| sign
in
up
~
pub
|
pdf
txt
html
toc
url
|
<<
>>
1
2
3
4
5
6
7
8
~
22
Table of Contents
Table of Contents
Introduction
The ideal administrator
Review of access privileges
Roles, and granting rights and privileges
Superuser rights and privileges
Accessing objects
Accessing objects under the control of other users
Creating and accessing user-defined functions
Using the security definer
Cracking the PostgreSQL password
PostgreSQL user accounts and passwords
Cracking the password
Authentication models
UNIX domain sockets
Ident
Data encryption
SSH tunnels using port forwarding
SSL-encrypted sessions
SSL certificates
Conclusion
Downloads
Resources
About the author
Trademarks