Chapter 14. Access Management

Table of Contents

14.1. Configuring the Administrator Role
14.2. Privilege Management Scenario
14.3. ETL Operations and Privileges
14.4. Use Case Examples
14.5. Secrets
14.5.1. Simple Secrets
14.5.2. Secrets with the credential_chain Provider
14.5.3. Secrets with secret_access_key

Since pgpro_metastore has its own objects, a system based on proxy tables is used to differentiate privileges and granularly manage access to these objects.

Proxy tables are empty tables without columns created in the pgpro_metastore schema. Each proxy table name is in the prefix_name format, where:

For example, the name of a proxy table can be s_localstorage.

Proxy tables are created and deleted simultaneously with objects that they encapsulate.

For more information about configuring access to the Postgres Pro AXE DBMS, refer to the official Postgres Pro documentation.