REVOKE¶
The REVOKE
statement removes permissions from a role. It allows for removing permissions to specific objects.
Learn more about the permission system in the access control guide.
Permissions¶
To revoke permissions, the current role must have the SUPERUSER
permission, or have the ADMIN OPTION
.
Syntax¶
-- Revoke permissions from all databases:
REVOKE {
SUPERUSER
| LOGIN }
FROM "<role>" [, ...]
-- Revoke permissions at the database level:
REVOKE {
CREATE
| CONNECT
| DDL
| SUPERUSER
| CREATE FUNCTION } [, ...]
| ALL [PERMISSIONS]
ON DATABASE <database> [, ...]
FROM "<role>" [, ...]
-- Revoke permissions at the schema level:
REVOKE {
CREATE
| DDL
| USAGE
| SUPERUSER } [, ...]
| ALL [PERMISSIONS]
ON SCHEMA <schema> [, ...]
FROM "<role>" [, ...]
-- Revoke permissions at the object level:
REVOKE {
SELECT
| INSERT
| DELETE
| DDL
| UPDATE } [, ...]
| ALL [PERMISSIONS]
ON {TABLE <table_name> [, ...]
| ALL TABLES IN SCHEMA <schema_name> [, ...]}
FROM "<role>" [, ...]
-- Revoke permissions at the catalog level:
REVOKE {
{SELECT } [, ...]
| ALL [PERMISSIONS] }
ON { CATALOG <catalog_name> [, ...] }
FROM "<role>" [, ...]
-- Revoke permissions on the foreign table level:
REVOKE {
{SELECT
| DDL } [, ...]
| ALL [PERMISSIONS] }
ON { FOREIGN TABLE <table_name> [, ...]
| ALL FOREIGN TABLE IN SCHEMA <schema_name> [, ...]}
FROM "<role>" [, ...]
-- Revoke function execution permission:
REVOKE {
ALL
| EXECUTE
| DDL }
ON FUNCTION <function_name>
FROM "<role>"
-- Revoke permissions at the column level:
REVOKE
{
{ SELECT
| DDL } [, ...]
| ALL [PERMISSIONS]}
ON
{
COLUMN "<column_name>" [,"<column_name2>"] IN TABLE <table_name> [,<table_name2>] | COLUMN "<column_name>" [,"<column_name2>"] IN FOREIGN TABLE <table_name> [,<table_name2>]
| ALL COLUMNS IN TABLE <schema_name.table_name> [, ...]
| ALL COLUMNS IN FOREIGN TABLE <schema_name.foreign_table_name> [, ...]
}
FROM "<role>" [, ...]
-- Revoke permissions on the view level
REVOKE {
{SELECT
| DDL } [, ...]
| ALL [PERMISSIONS] }
ON { VIEW <view_name> [, ...]
| ALL VIEWS IN SCHEMA <schema_name> [, ...]}
FROM "<role>" [, ...]
-- Removes access to permissions in role1 by role 2
REVOKE [ADMIN OPTION FOR] "<role1>" [, ...]
FROM "<role2>" [, ...]
-- Removes permissions to grant role1 to additional roles from role2
REVOKE [ADMIN OPTION FOR] "<role1>" [, ...]
FROM "<role2>" [, ...]
Parameters¶
Parameter |
Description |
---|---|
|
The name of the role to revoke permissions from |
|
Object to revoke permissions on. |
|
If Specifying |
The following table describes the GRANT
parameters:
Parameter |
Description |
---|---|
|
The name of the role to grant permissions to |
|
Object to grant permissions on. |
|
If Without the admin option, ordinary roles cannot grant or revoke membership. Roles with |
Supported Permissions¶
Permission |
Object |
Description |
---|---|---|
|
Cluster |
Login permissions allows a role to be a user and login to a database |
|
Database |
Allows a user to create UDFs |
|
Cluster, Database, Schema |
The most privileged role, with full control over a cluster, database, or schema |
|
Database |
Allows a user to connect and use a database |
|
Database, Schema, Table |
For a role to create and manage objects, it needs the |
|
Schema |
For a role to see tables in a schema, it needs the |
|
Table |
Allows a user to run SELECT queries on table contents |
Examples¶
Prevent a role from modifying table contents¶
If you don’t trust user shifty
, reokve DDL and INSERT permissions.
REVOKE INSERT ON TABLE important_table FROM shifty;
REVOKE DDL ON TABLE important_table FROM shifty;
Demoting a user from superuser¶
-- On the entire cluster
REVOKE SUPERUSER FROM new_role;
Revoking admin option¶
If WITH ADMIN OPTION
is specified, the role that has the admin option can in turn grant membership in the role to others, and revoke membership in the role as well.
-- dba_user1 has been demoted from team lead, so he should not be able to grant
-- permissions to other users.
REVOKE r_database_architect FROM dba_user1 WITH ADMIN OPTION;