Securing Greenplum Database includes protecting access to the database through network configuration, database user authentication, and encryption.

    • Configuring Client Authentication
      This topic explains how to configure client connections and authentication for Greenplum Database.
    • Managing Roles and Privileges
      The Greenplum Database authorization mechanism stores roles and permissions to access database objects in the database and is administered using SQL statements or command-line utilities.

    Parent topic: Greenplum Database Administrator Guide