bricklen <brick...@gmail.com> wrote:
> Kevin Grittner <kevin.gritt...@wicourts.gov> wrote:
>> Right now this is managed by query classes in our Java
>> applications, but as we're moving to a variety of new and
>> different technologies it's getting harder for the DBAs to ensure
>> that nothing is leaking to inappropriate recipients.  :-(  I
>> think we're going to need to move more of the enforcement to
>> database views and/or security restrictions based on database
>> roles.
> 
> Does  Veil cover some of those needs?
> http://veil.projects.postgresql.org/curdocs/index.html
> I've never used it, but from what I recall hearing about it, it
> did something similar (I thought).
 
Possibly.  The general tone of references to it, as well as the fact
that it's still classified as being in beta testing, with a release
number less than one, have put me off from looking at it closely. 
Is anyone using it in a situation where they have three thousand
directly connected users?  Or on a database backing a web site with
five million hits a day?  On a schema with over 300 tables
(normalized, no partitioning)?  If so, I'd be interested in hearing
about it.
 
-Kevin

-- 
Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-hackers

Reply via email to