Securing Greenplum Database includes protecting access to the database through network configuration, database user authentication, and encryption.

  • Configuring Client Authentication
    This topic explains how to configure client connections and authentication for Greenplum Database.
  • Managing Roles and Privileges
    The Greenplum Database authorization mechanism stores roles and permissions to access database objects in the database and is administered using SQL statements or command-line utilities.

Parent topic: Greenplum Database Administrator Guide

check-circle-line exclamation-circle-line close-line
Scroll to top icon