3
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
4
<title>42.39.�pg_roles</title>
5
<link rel="stylesheet" href="stylesheet.css" type="text/css">
6
<link rev="made" href="pgsql-docs@postgresql.org">
7
<meta name="generator" content="DocBook XSL Stylesheets V1.70.0">
8
<link rel="start" href="index.html" title="PostgreSQL 8.1.4 Documentation">
9
<link rel="up" href="catalogs.html" title="Chapter�42.�System Catalogs">
10
<link rel="prev" href="view-pg-prepared-xacts.html" title="42.38.�pg_prepared_xacts">
11
<link rel="next" href="view-pg-rules.html" title="42.40.�pg_rules">
12
<link rel="copyright" href="ln-legalnotice.html" title="Legal Notice">
14
<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="sect1" lang="en">
15
<div class="titlepage"><div><div><h2 class="title" style="clear: both">
16
<a name="view-pg-roles"></a>42.39.�<code class="structname">pg_roles</code></h2></div></div></div>
17
<a name="id832014"></a><p> The view <code class="structname">pg_roles</code> provides access to
18
information about database roles. This is simply a publicly
20
<a href="catalog-pg-authid.html" title="42.8.�pg_authid"><code class="structname">pg_authid</code></a>
21
that blanks out the password field.
23
<p> This view explicitly exposes the OID column of the underlying table,
24
since that is needed to do joins to other catalogs.
27
<a name="id832049"></a><p class="title"><b>Table�42.39.�<code class="structname">pg_roles</code> Columns</b></p>
28
<div class="table-contents"><table summary="pg_roles Columns" border="1">
43
<td><code class="structfield">rolname</code></td>
44
<td><code class="type">name</code></td>
49
<td><code class="structfield">rolsuper</code></td>
50
<td><code class="type">bool</code></td>
52
<td>Role has superuser privileges</td>
55
<td><code class="structfield">rolinherit</code></td>
56
<td><code class="type">bool</code></td>
58
<td>Role automatically inherits privileges of roles it is a
62
<td><code class="structfield">rolcreaterole</code></td>
63
<td><code class="type">bool</code></td>
65
<td>Role may create more roles</td>
68
<td><code class="structfield">rolcreatedb</code></td>
69
<td><code class="type">bool</code></td>
71
<td>Role may create databases</td>
74
<td><code class="structfield">rolcatupdate</code></td>
75
<td><code class="type">bool</code></td>
77
<td> Role may update system catalogs directly. (Even a superuser may not do
78
this unless this column is true.)
82
<td><code class="structfield">rolcanlogin</code></td>
83
<td><code class="type">bool</code></td>
85
<td> Role may log in, that is, this role can be given as the initial
86
session authorization identifier.
90
<td><code class="structfield">rolconnlimit</code></td>
91
<td><code class="type">int4</code></td>
93
<td> For roles that can log in, this sets maximum number of concurrent
94
connections this role can make. -1 means no limit.
98
<td><code class="structfield">rolpassword</code></td>
99
<td><code class="type">text</code></td>
101
<td>Not the password (always reads as <code class="literal">********</code>)</td>
104
<td><code class="structfield">rolvaliduntil</code></td>
105
<td><code class="type">timestamptz</code></td>
107
<td>Password expiry time (only used for password authentication);
108
NULL if no expiration</td>
111
<td><code class="structfield">rolconfig</code></td>
112
<td><code class="type">text[]</code></td>
114
<td>Session defaults for run-time configuration variables</td>
117
<td><code class="structfield">oid</code></td>
118
<td><code class="type">oid</code></td>
119
<td><code class="literal"><a href="catalog-pg-authid.html" title="42.8.�pg_authid"><code class="structname">pg_authid</code></a>.oid</code></td>
125
<br class="table-break">