Securing Greenplum Database includes protecting access to the database through network configuration, database user authentication, and encryption.
- Configuring Client Authentication
This topic explains how to configure client connections and authentication for Greenplum Database. - Managing Roles and Privileges
The Greenplum Database authorization mechanism stores roles and permissions to access database objects in the database and is administered using SQL statements or command-line utilities.
Parent topic: Greenplum Database Administrator Guide