On 6/19/19 3:07 PM, Miles Elam wrote:
Hi Adrian, thanks for responding.How would I restrict access to the SECURITY DEFINER function? If it can be called by the trigger, it can be called by the user as well I would think. Same issue as access to the table itself only now with a superuser intermediary, right?
Should have also mentioned, if you are not adverse to a third party solution there is PGAudit:
https://www.pgaudit.org/ -- Adrian Klaver adrian.klaver@xxxxxxxxxxx