On 6/19/19 3:07 PM, Miles Elam wrote:
Hi Adrian, thanks for responding.

How would I restrict access to the SECURITY DEFINER function? If it can be called by the trigger, it can be called by the user as well I would think. Same issue as access to the table itself only now with a superuser intermediary, right?


Should have also mentioned, if you are not adverse to a third party solution there is PGAudit:

https://www.pgaudit.org/


--
Adrian Klaver
adrian.kla...@aklaver.com


Reply via email to