Summary
In this chapter, you learned how to create users and manage users, including locking and unlocking accounts, setting passwords, and adding resource constraints. You learned how to manage permissions by using the GRANT
statement to grant specific permissions to a user and the REVOKE
statement to revoke those permissions. You learned how to use roles to manage the permissions more easily for a group of people.
This allows you to control who has access to the information stored inside the database. This is a critical part of securing access to the database.
In the next chapter, you will learn how to create logical backups, which can be used to restore data after a server has crashed or after data that has been deleted by accident. Besides that, it can also be used in migrations, setting up replication, or for copying data to a development or acceptance environment.