@@ -5568,20 +5568,22 @@ COPY postgres_log FROM '/full/path/to/logfile.csv' WITH csv;
55685568 <para>
55695569 This variable controls if row security policies are to be applied
55705570 to queries which are run against tables that have row security enabled.
5571- The default is 'on'. When set to 'on', all users, except superusers
5572- and the owner of the table, will have the row policies for the table
5573- applied to their queries. The table owner and superuser can request
5574- that row policies be applied to their queries by setting this to
5575- 'force'. Lastly, this can also be set to 'off' which will bypass row
5576- policies for the table, if possible, and error if not.
5571+ The default is <literal>on</>. When set to <literal>on</>, all users,
5572+ except superusers and the owner of the table, will have the row
5573+ policies for the table applied to their queries. The table owner and
5574+ superuser can request that row policies be applied to their queries by
5575+ setting this to <literal>force</>. Lastly, this can also be set to
5576+ <literal>off</> which will bypass row policies for the table, if
5577+ possible, and error if not.
55775578 </para>
55785579
55795580 <para>
55805581 For a user who is not a superuser and not the table owner to bypass
5581- row policies for the table, they must have the BYPASSRLS role attribute.
5582- If this is set to 'off' and the user queries a table which has row
5583- policies enabled and the user does not have the right to bypass
5584- row policies then a permission denied error will be returned.
5582+ row policies for the table, they must have the <literal>BYPASSRLS</>
5583+ role attribute. If this is set to <literal>off</> and the user queries
5584+ a table which has row policies enabled and the user does not have the
5585+ right to bypass row policies then a permission denied error will be
5586+ returned.
55855587 </para>
55865588
55875589 <para>
0 commit comments