Securing Greenplum Database includes protecting access to the database through network configuration, database user authentication, and encryption.
Configuring Client Authentication This topic explains how to configure client connections and authentication for Greenplum Database.
Managing Roles and Privileges The Greenplum Database authorization mechanism stores roles and permissions to access database objects in the database and is administered using SQL statements or command-line utilities.