Skip to main content

User Management and Securing Databases

  • Chapter
  • First Online:
PostgreSQL Configuration
  • 1338 Accesses

Abstract

In the last chapter, we talked about configuring a PostgreSQL database for a better performance, which includes tuning of several database-related parameters based on their behavior and also about operating system-related parameters that help to improve performance. In this chapter, we are going to talk about user management in PostgreSQL and securing databases by managing user privileges. We will also cover different types of privileges at object level and how we can best plan to utilize those granular level privileges to secure the databases, and different types of encryption techniques that you can use to secure your data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Baji Shaik

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Shaik, B. (2020). User Management and Securing Databases. In: PostgreSQL Configuration. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5663-3_3

Download citation

Publish with us

Policies and ethics