This means that, for instance, a user with such obtain will be able to browse the contents with the pg_authid desk in which authentication details is stored, and also read through any table data during the databases. For that reason, granting access to these functions need to be carefully deemed. https://fidelg073kkl1.bloguerosa.com/profile