Skip to content

Commit

Permalink
doc: minor fixes to rls page (#4142)
Browse files Browse the repository at this point in the history
  • Loading branch information
a8m authored Jul 15, 2024
1 parent 9f61938 commit 3b3f84c
Showing 1 changed file with 4 additions and 1 deletion.
5 changes: 4 additions & 1 deletion doc/md/migration/rls.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -10,18 +10,21 @@ Row-level security (RLS) in PostgreSQL enables tables to implement policies that
according to the user's role, enhancing the basic SQL-standard privileges provided by `GRANT`.

Once activated, every standard access to the table has to adhere to these policies. If no policies are defined on the table,
it defaults to a deny-all, meaning no rows can be seen or mutated. These policies can be tailored to specific commands,
it defaults to a deny-all rule, meaning no rows can be seen or mutated. These policies can be tailored to specific commands,
roles, or both, allowing for detailed management of who can access or change data.

This guide explains how to attach Row-Level Security (RLS) Policies to your Ent types (objects) and configure the schema
migration to manage both the RLS and the Ent schema as a single migration unit using Atlas.

:::info [Atlas Pro Feature](https://atlasgo.io/features#pro-plan)

Atlas support for [Row-Level Security Policies](https://atlasgo.io/atlas-schema/hcl#row-level-security-policy) used in
this guide is available exclusively to Pro users. To use this feature, run:

```
atlas login
```

:::

## Install Atlas
Expand Down

0 comments on commit 3b3f84c

Please sign in to comment.