Greenplum Database 管理员指南 6.2.1
{deny_interval | deny_point} 定义限制 Role 登录的时间段,在指定的时间段内不允许登 录。可以指定日期或者日期加时间的格式。这些信息存储在 pg_catalog.pg_auth_time_constraint 系统表中。 该功能鲜有使用,该系统表的维护一直存在明显的问题,该 表没有约束限制,完全相同的限制信息可以被重复的存储在 该系统表中。 例如下面的例子: 小时格式。在 TIME 关键字之后跟随单引 号引起来的时间格式。仅仅含有小时和分钟的时间即可(也可以使用秒单位),且使用 冒号(:)作为分隔符。如果使用 12 小时格式,需要指定 AM 或者 PM 结尾以确定上下午。 下面的例子表明了几种时间格式: TIME '14:00' (24 小时格式的时间) TIME '02:00 PM' (12 小时格式的时间) TIME '02:00' '02:00' (24 小时格式的时间) 其等价于 TIME '02:00 AM' 注意:时间约束是强制以服务器时间为准的。时区信息会被忽略。 指定时间段 要指定限制访问的时间段,需要两个[日期/时间]来确定,且通过 BETWEEN 和 AND 关键字连接。DAY 是必须的。 BETWEEN DAY 'Monday' AND DAY 'Tuesday' BETWEEN DAY0 码力 | 416 页 | 6.08 MB | 1 年前3VMware Greenplum 6 Documentation
Restricting Access by Time 523 Example 1 – Create a New Role with Time-based Constraints 525 Example 2 – Alter a Role to Add Time-based Constraints 525 Excample 3 – Alter a Role to Add Time-based Constraints Constraints 526 Dropping a Time-based Restriction 526 Auditing 526 Viewing the Database Server Log Files 527 Encrypting Data and Database Connections 530 Encrypting gpfdist Connections 531 Encrypting Data Password Hashing 1060 About SCRAM-SHA-256 Password Hashing 1060 About SHA-256 Password Hashing 1061 Time-based Authentication 1061 Accessing the Database 1061 Establishing a Database Session 1062 Supported0 码力 | 2374 页 | 44.90 MB | 1 年前3VMware Tanzu Greenplum v6.23 Documentation
Restricting Access by Time 503 Example 1 – Create a New Role with Time-based Constraints 505 Example 2 – Alter a Role to Add Time-based Constraints 505 Excample 3 – Alter a Role to Add Time-based Constraints Constraints 505 Dropping a Time-based Restriction 506 Auditing 506 Viewing the Database Server Log Files 507 Encrypting Data and Database Connections 510 Encrypting gpfdist Connections 511 Encrypting Data Password Hashing 1028 About SCRAM-SHA-256 Password Hashing 1028 About SHA-256 Password Hashing 1029 Time-based Authentication 1029 VMware Tanzu Greenplum 6 Documentation VMware, Inc 45 Accessing the Database0 码力 | 2298 页 | 40.94 MB | 1 年前3VMware Tanzu Greenplum 6 Documentation
Restricting Access by Time 501 Example 1 – Create a New Role with Time-based Constraints 503 Example 2 – Alter a Role to Add Time-based Constraints 503 Excample 3 – Alter a Role to Add Time-based Constraints Constraints 503 Dropping a Time-based Restriction 504 Auditing 504 Viewing the Database Server Log Files 505 Encrypting Data and Database Connections 508 Encrypting gpfdist Connections 508 Encrypting Data 1023 VMware Tanzu Greenplum 6 Documentation VMware, Inc. 45 About SHA-256 Password Hashing 1024 Time-based Authentication 1024 Accessing the Database 1024 Establishing a Database Session 1025 Supported0 码力 | 2311 页 | 17.58 MB | 1 年前3VMware Greenplum 7 Documentation
Restricting Access by Time 292 Example 1 – Create a New Role with Time-based Constraints 293 Example 2 – Alter a Role to Add Time-based Constraints 293 Excample 3 – Alter a Role to Add Time-based Constraints Constraints 294 Dropping a Time-based Restriction 294 Auditing 294 Viewing the Database Server Log Files 295 Encrypting Data and Database Connections 298 Encrypting gpfdist Connections 299 Encrypting Data Examples 691 Determining the Query Optimizer 692 Examining Query Plans to Solve Problems 693 Just-in-Time Compilation (JIT) 694 What is JIT compilation? 694 JIT accelerated operations 694 In-line compilation0 码力 | 2221 页 | 14.19 MB | 1 年前3VMware Tanzu Greenplum v6.21 Documentation
Restricting Access by Time 426 Example 1 – Create a New Role with Time-based Constraints 427 Example 2 – Alter a Role to Add Time-based Constraints 427 Excample 3 – Alter a Role to Add Time-based Constraints Constraints 427 Dropping a Time-based Restriction 428 Auditing 428 Viewing the Database Server Log Files 428 Encrypting Data and Database Connections 431 Encrypting gpfdist Connections 432 Encrypting Data Password Hashing 895 About SCRAM-SHA-256 Password Hashing 895 About SHA-256 Password Hashing 896 Time-based Authentication 896 Accessing the Database 896 Establishing a Database Session 896 Supported0 码力 | 2025 页 | 33.54 MB | 1 年前3VMware Greenplum v6.19 Documentation
Row Level Access Control 672 Encrypting Data 672 Protecting Passwords in Greenplum Database 672 Time-based Authentication 674 Greenplum Database Security Configuration Guide 675 Greenplum Database Restricting Access by Time 698 Example 1 – Create a New Role with Time-based Constraints 700 Example 2 – Alter a Role to Add Time-based Constraints 700 Excample 3 – Alter a Role to Add Time-based Constraints Constraints 700 Dropping a Time-based Restriction 700 Greenplum Command Center Security 701 Greenplum Command Center Security 0 The gpmon User 701 VMware Greenplum v6.19 Documentation VMware, Inc. 40 Greenplum0 码力 | 1972 页 | 20.05 MB | 1 年前3VMware Greenplum v6.18 Documentation
Row Level Access Control 663 Encrypting Data 663 Protecting Passwords in Greenplum Database 663 Time-based Authentication 665 Greenplum Database Security Configuration Guide 666 Greenplum Database Restricting Access by Time 689 Example 1 – Create a New Role with Time-based Constraints 691 Example 2 – Alter a Role to Add Time-based Constraints 691 Excample 3 – Alter a Role to Add Time-based Constraints Constraints 691 Dropping a Time-based Restriction 691 Greenplum Command Center Security 692 Greenplum Command Center Security 0 The gpmon User 692 VMware Greenplum v6.18 Documentation VMware, Inc. 39 Greenplum0 码力 | 1959 页 | 19.73 MB | 1 年前3VMware Greenplum v6.17 Documentation
Row Level Access Control 595 Encrypting Data 595 Protecting Passwords in Greenplum Database 595 Time-based Authentication 597 Greenplum Database Security Configuration Guide 598 Greenplum Database Restricting Access by Time 621 Example 1 – Create a New Role with Time-based Constraints 623 Example 2 – Alter a Role to Add Time-based Constraints 623 Excample 3 – Alter a Role to Add Time-based Constraints Constraints 623 Dropping a Time-based Restriction 623 Greenplum Command Center Security 624 Greenplum Command Center Security 0 The gpmon User 624 VMware Greenplum v6.17 Documentation VMware, Inc. 35 Greenplum0 码力 | 1893 页 | 17.62 MB | 1 年前3VMware Greenplum 6 Documentation
Restricting Access by Time 529 Example 1 – Create a New Role with Time-based Constraints 530 Example 2 – Alter a Role to Add Time-based Constraints 530 Excample 3 – Alter a Role to Add Time-based Constraints Constraints 531 Dropping a Time-based Restriction 531 Auditing 531 Viewing the Database Server Log Files 532 Encrypting Data and Database Connections 535 Encrypting gpfdist Connections 536 Encrypting Data Password Hashing 1073 About SCRAM-SHA-256 Password Hashing 1074 About SHA-256 Password Hashing 1074 Time-based Authentication 1075 Accessing the Database 1075 Establishing a Database Session 1075 Supported0 码力 | 2445 页 | 18.05 MB | 1 年前3
共 24 条
- 1
- 2
- 3