<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>OpenText Analytics Database 26.2.x – GRANT statements</title>
    <link>/en/sql-reference/statements/grant-statements/</link>
    <description>Recent content in GRANT statements on OpenText Analytics Database 26.2.x</description>
    <generator>Hugo -- gohugo.io</generator>
    
	  <atom:link href="/en/sql-reference/statements/grant-statements/index.xml" rel="self" type="application/rss+xml" />
    
    
      
        
      
    
    
    <item>
      <title>Sql-Reference: GRANT (authentication)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-authentication/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-authentication/</guid>
      <description>
        
        
        &lt;p&gt;Associates an authentication record to one or more &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;users&lt;/a&gt; and &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;roles&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT AUTHENTICATION &lt;span class=&#34;code-variable&#34;&gt;auth-method-name&lt;/span&gt; TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;parameters&#34;&gt;Parameters&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;auth-method-name&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Name of the authentication method to associate with one or more users or roles.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Specifies who is associated with the authentication method, one of the following:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;User name&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;Role&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;: The default role of all users.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Superuser&lt;/p&gt;
&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Associate &lt;code&gt;v_ldap&lt;/code&gt; authentication with user &lt;code&gt;jsmith&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT AUTHENTICATION v_ldap TO jsmith;
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Associate &lt;code&gt;v_gss&lt;/code&gt; authentication to the role &lt;code&gt;DBprogrammer&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;
=&amp;gt; CREATE ROLE DBprogrammer;
=&amp;gt; GRANT AUTHENTICATION v_gss TO DBprogrammer;
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Associate client authentication method &lt;code&gt;v_localpwd&lt;/code&gt; with role &lt;code&gt;PUBLIC&lt;/code&gt;, which is assigned by default to all users:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT AUTHENTICATION v_localpwd TO PUBLIC;
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-authentication/#&#34;&gt;REVOKE (authentication)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/#&#34;&gt;Granting and revoking privileges&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (data loader)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-data-loader/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-data-loader/</guid>
      <description>
        
        
        &lt;p&gt;Grants privileges on automatic data loaders to &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;users&lt;/a&gt; and &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;roles&lt;/a&gt;. By default, only superusers and the owner can &lt;a href=&#34;../../../../en/sql-reference/statements/execute-data-loader/&#34;&gt;execute&lt;/a&gt; or &lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-data-loader/&#34;&gt;alter&lt;/a&gt; a data loader.&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT { &lt;span class=&#34;code-variable&#34;&gt;privilege&lt;/span&gt;[,...] | ALL [ PRIVILEGES ] }
   ON DATA LOADER [&lt;span class=&#34;code-variable&#34;&gt;schema&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;name&lt;/span&gt;
   TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
   [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;arguments&#34;&gt;Arguments&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;privilege&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;One of the following privileges:
&lt;ul&gt;
&lt;li&gt;EXECUTE: Enables &lt;a href=&#34;../../../../en/sql-reference/statements/execute-data-loader/#&#34;&gt;EXECUTE DATA LOADER&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;ALTER: Enables &lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-data-loader/#&#34;&gt;ALTER DATA LOADER&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;DROP: Enables &lt;a href=&#34;../../../../en/sql-reference/statements/drop-statements/drop-data-loader/#&#34;&gt;DROP DATA LOADER&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ALL [PRIVILEGES]&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Grants all privileges. Inherited privileges must be granted explicitly.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;schema&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Schema containing the data loader. The default schema is &lt;code&gt;public&lt;/code&gt;.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;name&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Name of the data loader.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superusers, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Owner.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Privileges grantee given the option (&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;) of granting privileges to other users or roles.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-data-loader/#&#34;&gt;REVOKE (data loader)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/#&#34;&gt;Granting and revoking privileges&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (database)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-db/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-db/</guid>
      <description>
        
        
        &lt;p&gt;Grants database privileges to &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;users&lt;/a&gt; and &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;roles&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT { &lt;span class=&#34;code-variable&#34;&gt;privilege&lt;/span&gt;[,...] | ALL [ PRIVILEGES ] }
   ON DATABASE &lt;span class=&#34;code-variable&#34;&gt;db-spec&lt;/span&gt;
   TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
   [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;parameters&#34;&gt;Parameters&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;privilege&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The following privileges are valid for a database:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;CREATE&lt;/code&gt;: Create schemas.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;TEMP&lt;/code&gt;: Create temporary tables. By default, all users are granted this privilege through their &lt;code&gt;DEFAULT&lt;/code&gt; role.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ALL [PRIVILEGES]&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Grants all database privileges that also belong to the grantor. Grantors cannot grant privileges that they themselves lack.
&lt;p&gt;The optional keyword &lt;code&gt;PRIVILEGES&lt;/code&gt; conforms with the SQL standard.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;db-spec&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Specifies the current database, set to the database name or &lt;code&gt;DEFAULT&lt;/code&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superuser: Privileges grantee given the option (&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;) of granting privileges to other users or roles.&lt;/p&gt;
&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;The following example grants user Fred the right to create schemas in the current database.&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT CREATE ON DATABASE DEFAULT TO Fred;
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-db/#&#34;&gt;REVOKE (database)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/#&#34;&gt;Granting and revoking privileges&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (key)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-key/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-key/</guid>
      <description>
        
        
        &lt;p&gt;Grants privileges on a cryptographic key to a user or role.&lt;/p&gt;

&lt;div class=&#34;admonition important&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Important&lt;/h4&gt;
Because certificates depend on their underlying key, DROP privileges on a key effectively act as DROP privileges on its associated certificate when used with &lt;a href=&#34;../../../../en/sql-reference/statements/drop-statements/drop-key/&#34;&gt;DROP KEY...CASCADE&lt;/a&gt;.
&lt;/div&gt;

&lt;p&gt;To revoke granted privileges, see &lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-key/#&#34;&gt;REVOKE (key)&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Superusers have limited access to cryptographic objects that they do not own. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/db-object-privileges/#&#34;&gt;Database object privileges&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT { &lt;span class=&#34;code-variable&#34;&gt;privilege&lt;/span&gt;[,...] | ALL [ PRIVILEGES ] [ EXTEND ] } ON KEY
    &lt;span class=&#34;code-variable&#34;&gt;key_name&lt;/span&gt;[,...]
    TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
    [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;parameters&#34;&gt;Parameters&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;privilege&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;A privilege, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;USAGE: Allows a user to perform the following actions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/system-tables/v-catalog-schema/cryptographic-keys/&#34;&gt;View&lt;/a&gt; the contents of the key.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/create-statements/create-certificate/&#34;&gt;Create or sign&lt;/a&gt; certificates using the key.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;USAGE on the key also gives implicit USAGE privileges on a certificate that uses it as its private key. Users can also get these privileges from ownership of the key or certificate. USAGE privileges on a certificate allow a user to perform the following actions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/system-tables/v-catalog-schema/certificates/&#34;&gt;View&lt;/a&gt; the contents of the certificate.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Add (with &lt;a href=&#34;../../../../en/sql-reference/statements/create-statements/create-tls-config/&#34;&gt;CREATE&lt;/a&gt; or &lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-tls-config/&#34;&gt;ALTER&lt;/a&gt;) the certificate to a TLS Configuration.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Reuse the CA certificate when importing certificates signed by it. For example, if a user imports a chain of certificates &lt;code&gt;A &amp;gt; B &amp;gt; C&lt;/code&gt; and have USAGE on &lt;code&gt;B&lt;/code&gt;, the database reuses &lt;code&gt;B&lt;/code&gt; (as opposed to creating a duplicate of &lt;code&gt;B&lt;/code&gt;).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Specify that the CA certificate signed an imported certificate. For example, if certificate &lt;code&gt;B&lt;/code&gt; signed certificate &lt;code&gt;C&lt;/code&gt;, USAGE on &lt;code&gt;B&lt;/code&gt; allows a user to import &lt;code&gt;C&lt;/code&gt; and specify that it was &lt;a href=&#34;../../../../en/sql-reference/statements/create-statements/create-certificate/&#34;&gt;SIGNED BY&lt;/a&gt; &lt;code&gt;B&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/drop-statements/drop-key/&#34;&gt;DROP&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;ALTER: Allows a user to see the &lt;a href=&#34;../../../../en/sql-reference/system-tables/v-catalog-schema/cryptographic-keys/&#34;&gt;key&lt;/a&gt; and its associated &lt;a href=&#34;../../../../en/sql-reference/system-tables/v-catalog-schema/certificates/&#34;&gt;certificates&lt;/a&gt; in their respective system tables, but not their contents.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;key_name&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The target &lt;a href=&#34;../../../../en/sql-reference/statements/create-statements/create-key/&#34;&gt;key&lt;/a&gt;.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superuser:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Owner&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Privileges grantee given the option (&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;) of granting privileges to other users or roles.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;The following example grants USAGE privileges on a private key to a user, which then allows the user to add the self-signed CA certificate to the &lt;code&gt;server&lt;/code&gt; TLS Configuration:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; CREATE KEY new_ca_key TYPE &amp;#39;RSA&amp;#39; LENGTH 2048;
=&amp;gt; CREATE CA CERTIFICATE new_ca_cert
    SUBJECT &amp;#39;/C=US/ST=Massachusetts/L=Cambridge/O=Micro Focus/OU=Vertica/CN=Vertica example CA&amp;#39;
    VALID FOR 3650
    EXTENSIONS &amp;#39;authorityKeyIdentifier&amp;#39; = &amp;#39;keyid:always,issuer&amp;#39;, &amp;#39;nsComment&amp;#39; = &amp;#39;new CA&amp;#39;
    KEY new_ca_key;

=&amp;gt; CREATE USER u1;
=&amp;gt; GRANT USAGE ON KEY new_ca_key TO u1;
=&amp;gt; GRANT ALTER ON TLS CONFIGURATION data_channel TO u1;

=&amp;gt; \c - u1

=&amp;gt; ALTER TLS CONFIGURATION data_channel ADD CA CERTIFICATES new_ca_cert;

-- clean up:
=&amp;gt; \c
=&amp;gt; ALTER TLS CONFIGURATION data_channel REMOVE CA CERTIFICATES new_ca_cert;
=&amp;gt; DROP KEY new_ca_key CASCADE;
=&amp;gt; DROP USER u1;
&lt;/code&gt;&lt;/pre&gt;
      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (library)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-library/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-library/</guid>
      <description>
        
        
        &lt;p&gt;Grants privileges on one or more libraries to &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;users&lt;/a&gt; and &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;roles&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;For example, when working with the Connector Framework Service, you might need to grant a user usage privileges to a library to be able to set UDSession parameters. For more information see &lt;a href=&#34;../../../../en/security-and-authentication/connector-framework-service/implementing-cfs/#&#34;&gt;Implementing CFS&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT &lt;span class=&#34;code-variable&#34;&gt;privilege&lt;/span&gt;
   ON LIBRARY [[&lt;span class=&#34;code-variable&#34;&gt;database&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;schema&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;library&lt;/span&gt;[,...]
   TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
   [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;arguments&#34;&gt;Arguments&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;privilege&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Privilege to grant, one of:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;USAGE&lt;/code&gt;: Grants access to functions in the specified libraries.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;DROP&lt;/code&gt;: Grants permission to drop libraries that the grantee created.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;ALL [PRIVILEGES] [EXTEND]&lt;/code&gt;: Grants all library privileges that also belong to the grantor. Grantors cannot grant privileges that they themselves lack.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;You can qualify &lt;code&gt;ALL&lt;/code&gt; with two optional keywords:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PRIVILEGES&lt;/code&gt; conforms with the SQL standard.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;EXTEND&lt;/code&gt; extends the semantics of &lt;code&gt;ALL&lt;/code&gt; to include DROP privileges. An unqualified &lt;code&gt;ALL&lt;/code&gt; excludes this privilege. This option enables backward compatibility with &lt;code&gt;GRANT ALL&lt;/code&gt; usage in pre-9.2.1 OpenText™ Analytics Database releases.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class=&#34;admonition important&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Important&lt;/h4&gt;
To execute functions inside the library, users must also have separate &lt;code&gt;EXECUTE&lt;/code&gt; privileges on them, and &lt;code&gt;USAGE&lt;/code&gt; privileges on their respective schemas.
&lt;/div&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;[&lt;/code&gt;&lt;em&gt;&lt;code&gt;database&lt;/code&gt;&lt;/em&gt;&lt;code&gt;.]&lt;/code&gt;&lt;em&gt;&lt;code&gt;schema&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Database and &lt;a href=&#34;../../../../en/admin/configuring-db/designing-logical-schema/using-multiple-schemas/setting-search-paths/&#34;&gt;schema&lt;/a&gt;. The default schema is &lt;code&gt;public&lt;/code&gt;. If you specify a database, it must be the current database.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;library&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The target library.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superusers require &lt;a href=&#34;../../../../en/sql-reference/statements/grant-statements/grant-schema/&#34;&gt;USAGE on the schema&lt;/a&gt; and one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Owner&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Privileges grantee given the option (&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;) of granting privileges to other users or roles.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;Grant USAGE privileges on the &lt;code&gt;MyFunctions&lt;/code&gt; library to &lt;code&gt;Fred&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT USAGE ON LIBRARY MyFunctions TO Fred;
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-library/#&#34;&gt;REVOKE (library)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/#&#34;&gt;Granting and revoking privileges&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (model)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-model/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-model/</guid>
      <description>
        
        
        &lt;p&gt;Grants usage privileges on a model to &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;users&lt;/a&gt; and &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;roles&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT { &lt;span class=&#34;code-variable&#34;&gt;privilege&lt;/span&gt;[,...] | ALL [ PRIVILEGES ] [ EXTEND ] }
   ON MODEL [[&lt;span class=&#34;code-variable&#34;&gt;database&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;schema&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;model-name&lt;/span&gt;[,...]
   TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
   [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;parameters&#34;&gt;Parameters&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;privilege&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The following privileges are valid for models:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;USAGE&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-model/&#34;&gt;ALTER&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/drop-statements/drop-model/&#34;&gt;DROP&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ALL [PRIVILEGES][EXTEND]&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Grants all model privileges that also belong to the grantor. Grantors cannot grant privileges that they themselves lack.
&lt;p&gt;You can qualify &lt;code&gt;ALL&lt;/code&gt; with two optional keywords:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PRIVILEGES&lt;/code&gt; conforms with the SQL standard.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;EXTEND&lt;/code&gt; extends the semantics of &lt;code&gt;ALL&lt;/code&gt; to include ALTER and DROP privileges. An unqualified &lt;code&gt;ALL&lt;/code&gt; excludes these two privileges. This option enables backward compatibility with &lt;code&gt;GRANT ALL&lt;/code&gt; usage in pre-9.2.1 Vertica releases.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;[&lt;/code&gt;&lt;em&gt;&lt;code&gt;database&lt;/code&gt;&lt;/em&gt;&lt;code&gt;.]&lt;/code&gt;&lt;em&gt;&lt;code&gt;schema&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Database and &lt;a href=&#34;../../../../en/admin/configuring-db/designing-logical-schema/using-multiple-schemas/setting-search-paths/&#34;&gt;schema&lt;/a&gt;. The default schema is &lt;code&gt;public&lt;/code&gt;. If you specify a database, it must be the current database.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;model-name&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The model on which to grant the privilege.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superusers require &lt;a href=&#34;../../../../en/sql-reference/statements/grant-statements/grant-schema/&#34;&gt;USAGE on the schema&lt;/a&gt; and one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Owner&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Privileges grantee given the option (&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;) of granting privileges to other users or roles.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;This example grants USAGE privileges on the mySvmClassModel model to user1:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT USAGE ON MODEL mySvmClassModel TO user1;
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-model/#&#34;&gt;REVOKE (model)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/data-analysis/ml-predictive-analytics/model-management/managing-model-security/#&#34;&gt;Managing model security&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (procedure)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-procedure/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-procedure/</guid>
      <description>
        
        
        &lt;p&gt;Grants privileges on a &lt;a href=&#34;../../../../en/extending/stored-procedures/&#34;&gt;stored procedure&lt;/a&gt; or &lt;a href=&#34;../../../../en/extending/external-procedures/&#34;&gt;external procedure&lt;/a&gt; to a &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;user&lt;/a&gt; or &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;role&lt;/a&gt;.

&lt;div class=&#34;admonition important&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Important&lt;/h4&gt;
External procedures that you create with &lt;a href=&#34;../../../../en/sql-reference/statements/create-statements/create-procedure-external/#&#34;&gt;CREATE PROCEDURE (external)&lt;/a&gt; are always run with Linux dbadmin privileges. If a dbadmin or pseudosuperuser grants a non-dbadmin permission to run a procedure using &lt;a href=&#34;../../../../en/sql-reference/statements/grant-statements/grant-procedure/#&#34;&gt;GRANT (procedure)&lt;/a&gt;, be aware that the non-dbadmin user runs the procedure with full Linux dbadmin privileges.
&lt;/div&gt;&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT { EXECUTE | ALL [ PRIVILEGES ] }
   ON PROCEDURE [[&lt;span class=&#34;code-variable&#34;&gt;database&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;schema&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;procedure&lt;/span&gt;( [&lt;span class=&#34;code-variable&#34;&gt;arg-list&lt;/span&gt;] )[,...]
   TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
   [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;parameters&#34;&gt;Parameters&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;code&gt;EXECUTE&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Enables grantees to run the specified &lt;em&gt;&lt;code&gt;procedure&lt;/code&gt;&lt;/em&gt;.&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ALL [PRIVILEGES]&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Grants all procedure privileges that also belong to the grantor. Grantors cannot grant privileges that they themselves lack.
&lt;p&gt;The optional keyword &lt;code&gt;PRIVILEGES&lt;/code&gt; conforms with the SQL standard.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;[&lt;/code&gt;&lt;em&gt;&lt;code&gt;database&lt;/code&gt;&lt;/em&gt;&lt;code&gt;.]&lt;/code&gt;&lt;em&gt;&lt;code&gt;schema&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Database and &lt;a href=&#34;../../../../en/admin/configuring-db/designing-logical-schema/using-multiple-schemas/setting-search-paths/&#34;&gt;schema&lt;/a&gt;. The default schema is &lt;code&gt;public&lt;/code&gt;. If you specify a database, it must be the current database.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;procedure&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The target procedure.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;arg-list&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;A comma-delimited list of procedure arguments, where each argument is specified as follows:
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[ &lt;span class=&#34;code-variable&#34;&gt;argname&lt;/span&gt; ] &lt;span class=&#34;code-variable&#34;&gt;argtype&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;If the procedure is defined with no arguments, supply an empty argument list.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superuser, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Owner&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Privileges grantee given the option (&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;) of granting privileges to other users or roles&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;Grant EXECUTE privileges on the &lt;code&gt;tokenize&lt;/code&gt; procedure to users &lt;code&gt;Bob&lt;/code&gt; and &lt;code&gt;Jules&lt;/code&gt;, and to the role &lt;code&gt;Operator&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT EXECUTE ON PROCEDURE tokenize(varchar) TO Bob, Jules, Operator;
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-procedure/#&#34;&gt;REVOKE (procedure)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/#&#34;&gt;Granting and revoking privileges&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (Resource pool)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-resource-pool/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-resource-pool/</guid>
      <description>
        
        
        &lt;p&gt;Grants USAGE privileges on resource pools to &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;users&lt;/a&gt; and &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;roles&lt;/a&gt;. Users can access their resource pools with &lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-user/#&#34;&gt;ALTER USER&lt;/a&gt; or &lt;a href=&#34;../../../../en/sql-reference/statements/set-statements/set-session-resource-pool/&#34;&gt;SET SESSION RESOURCE POOL&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT USAGE
   ON RESOURCE POOL &lt;span class=&#34;code-variable&#34;&gt;resource-pool&lt;/span&gt;[,...]
   [FOR SUBCLUSTER &lt;span class=&#34;code-variable&#34;&gt;subcluster&lt;/span&gt; | FOR CURRENT SUBCLUSTER]
   TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
   [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;parameters&#34;&gt;Parameters&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;code&gt;USAGE&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Enables grantees to acess the specified resource pools.&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ALL [PRIVILEGES]&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Grants all resource pool privileges that also belong to the grantor. Grantors cannot grant privileges that they themselves lack.
&lt;p&gt;The optional keyword &lt;code&gt;PRIVILEGES&lt;/code&gt; conforms with the SQL standard.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;resource-pool&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;A resource pool on which to grant the specified privileges.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;subcluster&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The subcluster for the resource pool.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superuser, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Ownership&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/&#34;&gt;GRANT OPTION&lt;/a&gt; on the object&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;Grant user &lt;code&gt;Joe&lt;/code&gt; USAGE privileges on resource pool &lt;code&gt;Joe_pool&lt;/code&gt;.&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; CREATE USER Joe;
CREATE USER
=&amp;gt; CREATE RESOURCE POOL Joe_pool;
CREATE RESOURCE POOL
=&amp;gt; GRANT USAGE ON RESOURCE POOL Joe_pool TO Joe;
GRANT PRIVILEGE
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Grant user &lt;code&gt;Joe&lt;/code&gt; USAGE privileges on resource pool &lt;code&gt;Joe_pool&lt;/code&gt; for subcluster &lt;code&gt;sub1&lt;/code&gt;.&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT USAGE on RESOURCE POOL Joe_pool FOR SUBCLUSTER sub1 TO Joe;
GRANT PRIVILEGE
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-resource-pool/#&#34;&gt;REVOKE (Resource pool)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/#&#34;&gt;Granting and revoking privileges&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (Role)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-role/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-role/</guid>
      <description>
        
        
        &lt;p&gt;Assigns roles to &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;users&lt;/a&gt; or other &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;roles&lt;/a&gt;.

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

Granting a role does not activate the role automatically; you must &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/enabling-roles/&#34;&gt;enable it&lt;/a&gt; with the &lt;a href=&#34;../../../../en/sql-reference/statements/set-statements/set-role/#&#34;&gt;SET ROLE&lt;/a&gt; statement or specify it as a default role to enable it automatically.

&lt;/div&gt;&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT &lt;span class=&#34;code-variable&#34;&gt;role&lt;/span&gt;[,...] TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...] [ WITH ADMIN OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;arguments&#34;&gt;Arguments&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;role&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;A role to grant&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;User or role to be granted the specified roles, one of the following:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;User name&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;Role&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/&#34;&gt;PUBLIC&lt;/a&gt;: The default role of all users.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH ADMIN OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Gives &lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt; the privilege to grant the specified roles to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superuser: If WITH GRANT OPTION is used, can grant the same roles to other users or roles.&lt;/p&gt;
&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;See &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/granting-db-roles/#&#34;&gt;Granting database roles&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-role/#&#34;&gt;REVOKE (Role)&lt;/a&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (schema)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-schema/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-schema/</guid>
      <description>
        
        
        &lt;p&gt;Grants schema privileges to &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;users&lt;/a&gt; and &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;roles&lt;/a&gt;. By default, only superusers and the schema owner have the following schema privileges:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Create objects within a schema.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-schema/&#34;&gt;Alter&lt;/a&gt; and &lt;a href=&#34;../../../../en/sql-reference/statements/drop-statements/drop-schema/&#34;&gt;drop&lt;/a&gt; a schema.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

By default, new users cannot access schema PUBLIC. You must explicitly grant all new users USAGE privileges on the PUBLIC schema.

&lt;/div&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT { &lt;span class=&#34;code-variable&#34;&gt;privilege&lt;/span&gt;[,...] | ALL [ PRIVILEGES ] [ EXTEND ] }
   ON SCHEMA [{&lt;span class=&#34;code-variable&#34;&gt;namespace&lt;/span&gt;. | &lt;span class=&#34;code-variable&#34;&gt;database&lt;/span&gt;. }]&lt;span class=&#34;code-variable&#34;&gt;schema&lt;/span&gt;[,...]
   TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
   [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;parameters&#34;&gt;Parameters&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;privilege&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;One of the following privileges:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;USAGE: Enables access to objects in the specified schemas. Grantees can then be granted privileges on individual objects in these schemas in order to access them, for example, with &lt;a href=&#34;../../../../en/sql-reference/statements/grant-statements/grant-table/&#34;&gt;GRANT TABLE&lt;/a&gt; and &lt;a href=&#34;../../../../en/sql-reference/statements/grant-statements/grant-view/&#34;&gt;GRANT VIEW&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CREATE: Create and rename objects in the specified schemas, and move objects from other schemas.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;You can also grant the following privileges on a schema, to be inherited by tables and their projections, and by views of that schema. If inheritance is enabled &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/inherited-privileges/enabling-db-inheritance/&#34;&gt;for the database&lt;/a&gt; and &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/inherited-privileges/enabling-schema-inheritance/&#34;&gt;schema&lt;/a&gt;, these privileges are automatically granted to those objects on creation:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;SELECT: &lt;a href=&#34;../../../../en/sql-reference/statements/select/&#34;&gt;Query&lt;/a&gt; tables and views. SELECT privileges are granted by default to the PUBLIC role.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;INSERT: &lt;a href=&#34;../../../../en/sql-reference/statements/insert/&#34;&gt;Insert&lt;/a&gt; rows, or and load data into tables with 
&lt;code&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/copy/#&#34;&gt;COPY&lt;/a&gt;&lt;/code&gt;.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

&lt;code&gt;COPY FROM STDIN&lt;/code&gt; is allowed for users with INSERT privileges, while &lt;code&gt;COPY FROM &lt;/code&gt;&lt;em&gt;&lt;code&gt;file&lt;/code&gt;&lt;/em&gt; requires admin privileges.

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;UPDATE: &lt;a href=&#34;../../../../en/sql-reference/statements/update/&#34;&gt;Update&lt;/a&gt; table rows.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;DELETE: &lt;a href=&#34;../../../../en/sql-reference/statements/delete/&#34;&gt;Delete&lt;/a&gt; table rows.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;REFERENCES: Create &lt;a href=&#34;../../../../en/admin/constraints/supported-constraints/foreign-key-constraints/&#34;&gt;foreign key constraints&lt;/a&gt; on this table. This privilege must be set on both referencing and referenced tables.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;TRUNCATE: &lt;a href=&#34;../../../../en/sql-reference/statements/truncate-table/&#34;&gt;Truncate&lt;/a&gt; table contents. Non-owners of tables can also execute the following partition operations on them:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;

&lt;code&gt;&lt;a href=&#34;../../../../en/sql-reference/functions/management-functions/partition-functions/drop-partitions/#&#34;&gt;DROP_PARTITIONS&lt;/a&gt;&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;

&lt;code&gt;&lt;a href=&#34;../../../../en/sql-reference/functions/management-functions/partition-functions/swap-partitions-between-tables/#&#34;&gt;SWAP_PARTITIONS_BETWEEN_TABLES&lt;/a&gt;&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;

&lt;code&gt;&lt;a href=&#34;../../../../en/sql-reference/functions/management-functions/partition-functions/move-partitions-to-table/#&#34;&gt;MOVE_PARTITIONS_TO_TABLE&lt;/a&gt;&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;ALTER: Modify the DDL of tables and views with 
&lt;code&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-table/#&#34;&gt;ALTER TABLE&lt;/a&gt;&lt;/code&gt; and 
&lt;code&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-view/#&#34;&gt;ALTER VIEW&lt;/a&gt;&lt;/code&gt;, respectively.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;DROP: Drop tables and views.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ALL [PRIVILEGES][EXTEND]&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Grants USAGE AND CREATE privileges. Inherited privileges must be granted explicitly.
&lt;p&gt;You can qualify &lt;code&gt;ALL&lt;/code&gt; with two optional keywords:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PRIVILEGES&lt;/code&gt; conforms with the SQL standard.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;EXTEND&lt;/code&gt; extends the semantics of &lt;code&gt;ALL&lt;/code&gt; to include ALTER and DROP privileges. An unqualified &lt;code&gt;ALL&lt;/code&gt; excludes these two privileges. This option enables backward compatibility with &lt;code&gt;GRANT ALL&lt;/code&gt; usage in pre-9.2.1 Vertica releases.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/dd&gt;
&lt;/dl&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;code&gt;{ &lt;/code&gt;&lt;em&gt;&lt;code&gt;database&lt;/code&gt;&lt;/em&gt; &lt;code&gt;|&lt;/code&gt; &lt;em&gt;&lt;code&gt;namespace&lt;/code&gt;&lt;/em&gt;&lt;code&gt; }&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Name of the database or &lt;a href=&#34;../../../../en/architecture/eon-concepts/shards-and-subscriptions/&#34;&gt;namespace&lt;/a&gt; that contains &lt;em&gt;&lt;code&gt;schema&lt;/code&gt;&lt;/em&gt;:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Database name: If specified, it must be the current database.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Namespace name (Eon Mode only): You must specify the namespace of objects in non-default namespaces. If no namespace is provided, it is assumed the object is in the default namespace.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;schema&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Name of the schema, by default &lt;code&gt;public&lt;/code&gt;.
&lt;p&gt;If you specify a schema name that contains a period, the part before the period cannot be the same as the name of an existing namespace.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superusers, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Schema owner&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Privileges grantee given the option (&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;) of granting privileges to other users or roles.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;Grant user Joe USAGE privilege on schema &lt;code&gt;online_sales&lt;/code&gt;.&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; CREATE USER Joe;
CREATE USER
=&amp;gt; GRANT USAGE ON SCHEMA online_sales TO Joe;
GRANT PRIVILEGE
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-schema/#&#34;&gt;REVOKE (schema)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/#&#34;&gt;Granting and revoking privileges&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (sequence)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-sequence/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-sequence/</guid>
      <description>
        
        
        &lt;p&gt;Grants &lt;a href=&#34;../../../../en/admin/working-with-native-tables/sequences/&#34;&gt;sequence&lt;/a&gt; privileges to &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;users&lt;/a&gt; and &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;roles&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT { &lt;span class=&#34;code-variable&#34;&gt;privilege&lt;/span&gt;[,...] | ALL [ PRIVILEGES ] [ EXTEND ] }
   ON {
     SEQUENCE [[&lt;span class=&#34;code-variable&#34;&gt;database&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;schema&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;sequence&lt;/span&gt;[,...]
     | ALL SEQUENCES IN SCHEMA [&lt;span class=&#34;code-variable&#34;&gt;database&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;schema&lt;/span&gt;[,...] }
   TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
   [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;parameters&#34;&gt;Parameters&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;privilege&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The following privileges are valid for sequences:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;SELECT: Execute functions &lt;a href=&#34;../../../../en/sql-reference/functions/data-type-specific-functions/sequence-functions/currval/#&#34;&gt;CURRVAL&lt;/a&gt; and &lt;a href=&#34;../../../../en/sql-reference/functions/data-type-specific-functions/sequence-functions/nextval/#&#34;&gt;NEXTVAL&lt;/a&gt; on the specified sequences.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;ALTER: Modify a sequence&#39;s DDL with &lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-sequence/#&#34;&gt;ALTER SEQUENCE&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;DROP: Drop this sequence with &lt;a href=&#34;../../../../en/sql-reference/statements/drop-statements/drop-sequence/#&#34;&gt;DROP SEQUENCE&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ALL [PRIVILEGES][EXTEND]&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Grants all &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/db-object-privileges/&#34;&gt;sequence privileges &lt;/a&gt;that also belong to the grantor. Grantors cannot grant privileges that they themselves lack
&lt;p&gt;You can qualify &lt;code&gt;ALL&lt;/code&gt; with two optional keywords:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PRIVILEGES&lt;/code&gt; conforms with the SQL standard.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;EXTEND&lt;/code&gt; extends the semantics of &lt;code&gt;ALL&lt;/code&gt; to include ALTER and DROP privileges. An unqualified &lt;code&gt;ALL&lt;/code&gt; excludes these two privileges. This option enables backward compatibility with &lt;code&gt;GRANT ALL&lt;/code&gt; usage in pre-9.2.1 Vertica releases.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;[&lt;/code&gt;&lt;em&gt;&lt;code&gt;database.&lt;/code&gt;&lt;/em&gt;&lt;code&gt;]&lt;/code&gt;&lt;em&gt;&lt;code&gt;schema&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Database and &lt;a href=&#34;../../../../en/admin/configuring-db/designing-logical-schema/using-multiple-schemas/setting-search-paths/&#34;&gt;schema&lt;/a&gt;. The default schema is &lt;code&gt;public&lt;/code&gt;. If you specify a database, it must be the current database.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;SEQUENCE &lt;/code&gt;&lt;em&gt;&lt;code&gt;sequence&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Specifies the sequence on which to grant privileges.&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ALL SEQUENCES IN SCHEMA &lt;/code&gt;&lt;em&gt;&lt;code&gt;schema &lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Grants the specified privileges on all sequences in schema &lt;em&gt;&lt;code&gt;schema&lt;/code&gt;&lt;/em&gt;.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superusers require &lt;a href=&#34;../../../../en/sql-reference/statements/grant-statements/grant-schema/&#34;&gt;USAGE on the schema&lt;/a&gt; and one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Owner&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Privileges grantee given the option (&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;) of granting privileges to other users or roles.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;This example shows how to grant user &lt;code&gt;Joe&lt;/code&gt; all privileges on sequence &lt;code&gt;my_seq&lt;/code&gt;.&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; CREATE SEQUENCE my_seq START 100;
CREATE SEQUENCE
=&amp;gt; GRANT ALL PRIVILEGES ON SEQUENCE my_seq TO Joe;
GRANT PRIVILEGE
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-sequence/#&#34;&gt;REVOKE (sequence)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/#&#34;&gt;Granting and revoking privileges&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/admin/working-with-native-tables/sequences/named-sequences/creating-and-using-named-sequences/#&#34;&gt;Creating and using named sequences&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (storage location)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-storage-location/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-storage-location/</guid>
      <description>
        
        
        &lt;p&gt;Grants privileges to &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;users&lt;/a&gt; and &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;roles&lt;/a&gt; on a USER-defined storage location. For details, see &lt;a href=&#34;../../../../en/admin/managing-storage-locations/creating-storage-locations/#&#34;&gt;Creating storage locations&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT { &lt;span class=&#34;code-variable&#34;&gt;privilege&lt;/span&gt;[,...] | ALL [ PRIVILEGES ] }
   ON LOCATION &amp;#39;&lt;span class=&#34;code-variable&#34;&gt;path&lt;/span&gt;&amp;#39; [ ON &lt;span class=&#34;code-variable&#34;&gt;node&lt;/span&gt; ]
   TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
   [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;parameters&#34;&gt;Parameters&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;privilege&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The following privileges are valid for storage locations:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;READ&lt;/code&gt;: Copy data from files in the storage location into a table.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;WRITE&lt;/code&gt;: Export data from the database to the storage location. With &lt;code&gt;WRITE&lt;/code&gt; privileges, grantees can also save &lt;code&gt;COPY&lt;/code&gt; statement rejected data and exceptions files to the storage location.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ALL [PRIVILEGES]&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Grants all storage location privileges that also belong to the grantor. Grantors cannot grant privileges that they themselves lack.
&lt;p&gt;The optional keyword &lt;code&gt;PRIVILEGES&lt;/code&gt; conforms with the SQL standard.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ON LOCATION &#39;&lt;/code&gt;&lt;em&gt;&lt;code&gt;path&lt;/code&gt;&lt;/em&gt;&lt;code&gt;&#39; [ ON &lt;/code&gt;&lt;em&gt;&lt;code&gt;node&lt;/code&gt;&lt;/em&gt;&lt;code&gt;]&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Specifies the path name mount point of the storage location. If qualified by &lt;code&gt;ON NODE&lt;/code&gt;, OpenText™ Analytics Database grants access to the storage location residing on &lt;em&gt;&lt;code&gt;node&lt;/code&gt;&lt;/em&gt;.
&lt;p&gt;If no node is specified, the grant operation applies to all nodes on the specified path. All nodes must be on the specified path; otherwise, the entire grant operation rolls back.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;&lt;p&gt;Non-superuser, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Ownership&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/&#34;&gt;GRANT OPTION&lt;/a&gt; on the object&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

Only a superuser can add, alter, retire, drop, and restore a location.

&lt;/div&gt;&lt;/p&gt;
&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;Create a storage location:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; CREATE LOCATION &amp;#39;/home/dbadmin/UserStorage/BobStore&amp;#39; NODE &amp;#39;v_mcdb_node0007&amp;#39; USAGE &amp;#39;USER&amp;#39;;
CREATE LOCATION
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Grant user &lt;code&gt;Bob&lt;/code&gt; all available privileges to the &lt;code&gt;/BobStore&lt;/code&gt; location:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT ALL ON LOCATION &amp;#39;/home/dbadmin/UserStorage/BobStore&amp;#39; TO Bob;
GRANT PRIVILEGE
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Revoke all storage location privileges from Bob:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; REVOKE ALL ON LOCATION &amp;#39;/home/dbadmin/UserStorage/BobStore&amp;#39; FROM Bob;
REVOKE PRIVILEGE
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Grant privileges to &lt;code&gt;Bob&lt;/code&gt; on the &lt;code&gt;BobStore&lt;/code&gt; location again, specifying a node:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT ALL ON LOCATION &amp;#39;/home/dbadmin/UserStorage/BobStore&amp;#39; ON v_mcdb_node0007 TO Bob;
GRANT PRIVILEGE
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Revoke all storage location privileges from &lt;code&gt;Bob&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; REVOKE ALL ON LOCATION &amp;#39;/home/dbadmin/UserStorage/BobStore&amp;#39; ON v_mcdb_node0007 FROM Bob;
REVOKE PRIVILEGE
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/sql-reference/functions/management-functions/storage-functions/#&#34;&gt;Storage functions&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-storage-location/#&#34;&gt;REVOKE (storage location)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/#&#34;&gt;Granting and revoking privileges&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (table)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-table/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-table/</guid>
      <description>
        
        
        &lt;p&gt;Grants table privileges to &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;users&lt;/a&gt; and &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;roles&lt;/a&gt;. Users must also be &lt;a href=&#34;../../../../en/sql-reference/statements/grant-statements/grant-schema/&#34;&gt;granted USAGE on the table schema&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT { &lt;span class=&#34;code-variable&#34;&gt;privilege&lt;/span&gt;[,...] | ALL [ PRIVILEGES ] [ EXTEND ] }
   ON {
     [ TABLE ] [[{&lt;span class=&#34;code-variable&#34;&gt;namespace&lt;/span&gt;. | &lt;span class=&#34;code-variable&#34;&gt;database&lt;/span&gt;. }]&lt;span class=&#34;code-variable&#34;&gt;schema.&lt;/span&gt;]&lt;span class=&#34;code-variable&#34;&gt;table&lt;/span&gt;[,...]
     | ALL TABLES IN SCHEMA [{&lt;span class=&#34;code-variable&#34;&gt;namespace&lt;/span&gt;. | &lt;span class=&#34;code-variable&#34;&gt;database&lt;/span&gt;. }]&lt;span class=&#34;code-variable&#34;&gt;schema&lt;/span&gt;[,...] }
   TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
   [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;parameters&#34;&gt;Parameters&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;privilege&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The following privileges are valid for tables:

&lt;div class=&#34;admonition important&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Important&lt;/h4&gt;
Only SELECT privileges are valid for system tables.
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;SELECT: &lt;a href=&#34;../../../../en/sql-reference/statements/select/&#34;&gt;Quer&lt;/a&gt;y tables. SELECT privileges are granted by default to the PUBLIC role.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;INSERT: Insert table rows with &lt;a href=&#34;../../../../en/sql-reference/statements/insert/#&#34;&gt;INSERT&lt;/a&gt;, and load data with 
&lt;code&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/copy/#&#34;&gt;COPY&lt;/a&gt;&lt;/code&gt;.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

&lt;code&gt;COPY FROM STDIN&lt;/code&gt; is allowed for users with INSERT privileges, while &lt;code&gt;COPY FROM &lt;/code&gt;&lt;em&gt;&lt;code&gt;file&lt;/code&gt;&lt;/em&gt; requires admin privileges.

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;UPDATE: &lt;a href=&#34;../../../../en/sql-reference/statements/update/&#34;&gt;Update&lt;/a&gt; table rows.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;DELETE: &lt;a href=&#34;../../../../en/sql-reference/statements/delete/&#34;&gt;Delete&lt;/a&gt; table rows.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;REFERENCES: Create &lt;a href=&#34;../../../../en/admin/constraints/supported-constraints/foreign-key-constraints/&#34;&gt;foreign key constraints&lt;/a&gt; on this table. This privilege must be set on both referencing and referenced tables.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;TRUNCATE: &lt;a href=&#34;../../../../en/sql-reference/statements/truncate-table/&#34;&gt;Truncate&lt;/a&gt; table contents. Non-owners of tables can also execute the following partition operations on them:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;

&lt;code&gt;&lt;a href=&#34;../../../../en/sql-reference/functions/management-functions/partition-functions/drop-partitions/#&#34;&gt;DROP_PARTITIONS&lt;/a&gt;&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;

&lt;code&gt;&lt;a href=&#34;../../../../en/sql-reference/functions/management-functions/partition-functions/swap-partitions-between-tables/#&#34;&gt;SWAP_PARTITIONS_BETWEEN_TABLES&lt;/a&gt;&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;

&lt;code&gt;&lt;a href=&#34;../../../../en/sql-reference/functions/management-functions/partition-functions/move-partitions-to-table/#&#34;&gt;MOVE_PARTITIONS_TO_TABLE&lt;/a&gt;&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;ALTER: Modify a table&#39;s DDL with 
&lt;code&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-table/#&#34;&gt;ALTER TABLE&lt;/a&gt;&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;DROP: &lt;a href=&#34;../../../../en/sql-reference/statements/drop-statements/drop-table/&#34;&gt;Drop a table&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ALL [PRIVILEGES][EXTEND]&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Invalid for system tables, grants all &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/db-object-privileges/&#34;&gt;table privileges &lt;/a&gt;that also belong to the grantor. Grantors cannot grant privileges that they themselves lack.
&lt;p&gt;You can qualify &lt;code&gt;ALL&lt;/code&gt; with two optional keywords:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PRIVILEGES&lt;/code&gt; conforms with the SQL standard.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;EXTEND&lt;/code&gt; extends the semantics of &lt;code&gt;ALL&lt;/code&gt; to include ALTER and DROP privileges. An unqualified &lt;code&gt;ALL&lt;/code&gt; excludes these two privileges. This option enables backward compatibility with &lt;code&gt;GRANT ALL&lt;/code&gt; usage in pre-9.2.1 Vertica releases.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/dd&gt;
&lt;/dl&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;code&gt;{ &lt;/code&gt;&lt;em&gt;&lt;code&gt;database&lt;/code&gt;&lt;/em&gt; &lt;code&gt;|&lt;/code&gt; &lt;em&gt;&lt;code&gt;namespace&lt;/code&gt;&lt;/em&gt;&lt;code&gt; }&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Name of the database or &lt;a href=&#34;../../../../en/architecture/eon-concepts/shards-and-subscriptions/&#34;&gt;namespace&lt;/a&gt; that contains &lt;em&gt;&lt;code&gt;table&lt;/code&gt;&lt;/em&gt;:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Database name: If specified, it must be the current database.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Namespace name (Eon Mode only): You must specify the namespace of objects in non-default namespaces. If no namespace is provided, it is assumed the object is in the default namespace.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;schema&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Name of the schema, by default &lt;code&gt;public&lt;/code&gt;. If you specify the namespace or database name, you must provide the schema name, even if the schema is &lt;code&gt;public&lt;/code&gt;.
&lt;p&gt;If you specify a schema name that contains a period, the part before the period cannot be the same as the name of an existing namespace.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

&lt;dl&gt;
&lt;dt&gt;&lt;code&gt;TABLE &lt;/code&gt;&lt;em&gt;&lt;code&gt;table&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Specifies the table on which to grant privileges.

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

The table can be a global temporary table, but not a local temporary table. See &lt;a href=&#34;../../../../en/admin/working-with-native-tables/creating-temporary-tables/#&#34;&gt;Creating temporary tables&lt;/a&gt;.

&lt;/div&gt;&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ON ALL TABLES IN SCHEMA &lt;/code&gt;&lt;em&gt;&lt;code&gt;schema &lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Grants the specified privileges on all tables and views in schema &lt;em&gt;&lt;code&gt;schema&lt;/code&gt;&lt;/em&gt;.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superusers require &lt;a href=&#34;../../../../en/sql-reference/statements/grant-statements/grant-schema/&#34;&gt;USAGE on the schema&lt;/a&gt; and one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Owner&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Privileges grantee given the option (&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;) of granting privileges to other users or roles.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;Grant user &lt;code&gt;Joe&lt;/code&gt; all privileges on table &lt;code&gt;customer_dimension&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; CREATE USER Joe;
CREATE USER
=&amp;gt; GRANT ALL PRIVILEGES ON TABLE customer_dimension TO Joe;
GRANT PRIVILEGE
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Grant user &lt;code&gt;Joe&lt;/code&gt; SELECT privileges on all system tables:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT SELECT on all tables in schema V_MONITOR, V_CATALOG TO Joe;
GRANT PRIVILEGE
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-table/#&#34;&gt;REVOKE (table)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/#&#34;&gt;Granting and revoking privileges&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (TLS configuration)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-tls-config/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-tls-config/</guid>
      <description>
        
        
        &lt;p&gt;Grants privileges on a TLS Configuration to a user or role.&lt;/p&gt;
&lt;p&gt;To revoke granted privileges, see &lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-tls-config/#&#34;&gt;REVOKE (TLS configuration)&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Superusers have limited access to cryptographic objects that they do not own. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/db-object-privileges/#&#34;&gt;Database object privileges&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT { &lt;span class=&#34;code-variable&#34;&gt;privilege&lt;/span&gt;[,...] } ON TLS CONFIGURATION
    &lt;span class=&#34;code-variable&#34;&gt;tls_configuration&lt;/span&gt;[,...]
    TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
    [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;parameters&#34;&gt;Parameters&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;privilege&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;A privilege, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;USAGE: Allows the user to set the TLS Configuration for a type of connection and view its contents in the system table &lt;a href=&#34;../../../../en/sql-reference/system-tables/v-monitor-schema/tls-configs/#&#34;&gt;TLS_CONFIGURATIONS&lt;/a&gt;. For details, see &lt;a href=&#34;../../../../en/sql-reference/config-parameters/security-parameters/#&#34;&gt;Security parameters&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/drop-statements/drop-tls-config/&#34;&gt;DROP&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-tls-config/&#34;&gt;ALTER&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;tls_configuration&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The target TLS Configuration.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superuser:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Owner&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Privileges grantee given the option (&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;) of granting privileges to other users or roles.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;You can grant ALTER on a TLS Configuration to a user or role to delegate management of that TLS context, which includes adding and removing certificates, setting the TLSMODE, etc. For example, the following statement grants &lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-tls-config/&#34;&gt;ALTER&lt;/a&gt; privileges on the TLS CONFIGURATION &lt;code&gt;server&lt;/code&gt; to the role &lt;code&gt;client_server_tls_manager&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT ALTER ON TLS CONFIGURATION server TO client_server_tls_manager;
&lt;/code&gt;&lt;/pre&gt;
      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (user defined extension)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-user-defined-extension/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-user-defined-extension/</guid>
      <description>
        
        
        &lt;p&gt;Grants privileges on a &lt;a href=&#34;../../../../en/extending/udxs/&#34;&gt;user-defined extensions&lt;/a&gt; (UDx) to &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;users&lt;/a&gt; and &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;roles&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT { &lt;span class=&#34;code-variable&#34;&gt;privilege&lt;/span&gt;[,...] | ALL [ PRIVILEGES ] [ EXTEND ] }
   ON {
       &lt;span class=&#34;code-variable&#34;&gt;UDx-type&lt;/span&gt; [[&lt;span class=&#34;code-variable&#34;&gt;database&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;schema&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;function&lt;/span&gt;( [&lt;span class=&#34;code-variable&#34;&gt;arg-list&lt;/span&gt;] )[,...]
       | ALL FUNCTIONS IN SCHEMA &lt;span class=&#34;code-variable&#34;&gt;schema&lt;/span&gt;[,...] }
   TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
   [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;arguments&#34;&gt;Arguments&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;privilege&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The following privileges are valid for user-defined extensions:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;EXECUTE&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-function-statements/alter-function-scalar/&#34;&gt;ALTER&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/drop-statements/drop-function/&#34;&gt;DROP&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

Users can only call a UDx function on which they have EXECUTE privilege, and USAGE privilege on its schema.

&lt;/div&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ALL [PRIVILEGES] [EXTEND]&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Grants all &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/db-object-privileges/&#34;&gt;function privileges &lt;/a&gt;that also belong to the grantor. Grantors cannot grant privileges that they themselves lack
&lt;p&gt;You can qualify &lt;code&gt;ALL&lt;/code&gt; with two optional keywords:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PRIVILEGES&lt;/code&gt; conforms with the SQL standard.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;EXTEND&lt;/code&gt; extends the semantics of &lt;code&gt;ALL&lt;/code&gt; to include ALTER and DROP privileges. An unqualified &lt;code&gt;ALL&lt;/code&gt; excludes these two privileges. This option enables backward compatibility with &lt;code&gt;GRANT ALL&lt;/code&gt; usage in pre-9.2.1 Vertica releases.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ON &lt;/code&gt;&lt;em&gt;&lt;code&gt;UDx-type&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Type of the user-defined extension (UDx), one of the following:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;FUNCTION&lt;/code&gt; (scalar function)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;AGGREGATE FUNCTION&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;ANALYTIC FUNCTION&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;TRANSFORM FUNCTION&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;FILTER&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PARSER&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;SOURCE&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;[&lt;/code&gt;&lt;em&gt;&lt;code&gt;database&lt;/code&gt;&lt;/em&gt;&lt;code&gt;.]&lt;/code&gt;&lt;em&gt;&lt;code&gt;schema&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Database and &lt;a href=&#34;../../../../en/admin/configuring-db/designing-logical-schema/using-multiple-schemas/setting-search-paths/&#34;&gt;schema&lt;/a&gt;. The default schema is &lt;code&gt;public&lt;/code&gt;. If you specify a database, it must be the current database.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;function&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Name of the user-defined function on which to grant privileges.&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ON ALL FUNCTIONS IN SCHEMA&lt;/code&gt;&lt;em&gt;&lt;code&gt;schema&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Grants privileges on all functions in the specified schema.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;arg-list&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;Required for all polymorphic functions, a comma-delimited list of function arguments, where each argument is specified as follows:
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[ &lt;span class=&#34;code-variable&#34;&gt;argname&lt;/span&gt; ] &lt;span class=&#34;code-variable&#34;&gt;argtype&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;If the procedure is defined with no arguments, supply an empty argument list.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

Grantees must have &lt;code&gt;USAGE&lt;/code&gt; privileges on the schema.

&lt;/div&gt;&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superusers require &lt;a href=&#34;../../../../en/sql-reference/statements/grant-statements/grant-schema/&#34;&gt;USAGE on the schema&lt;/a&gt; and one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Owner&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Privileges grantee given the option (&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;) of granting privileges to other users or roles.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;Grant &lt;code&gt;EXECUTE&lt;/code&gt; privileges on the &lt;code&gt;myzeroifnull&lt;/code&gt; SQL function to users &lt;code&gt;Bob&lt;/code&gt; and &lt;code&gt;Jules&lt;/code&gt;, and to the role &lt;code&gt;Operator&lt;/code&gt;. The function takes one integer argument:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT EXECUTE ON FUNCTION myzeroifnull (x INT) TO Bob, Jules, Operator;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Grant &lt;code&gt;EXECUTE&lt;/code&gt; privileges on all functions in the &lt;code&gt;zero-schema&lt;/code&gt; schema to user &lt;code&gt;Bob&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT EXECUTE ON ALL FUNCTIONS IN SCHEMA zero-schema TO Bob;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Grant &lt;code&gt;EXECUTE&lt;/code&gt; privileges on the &lt;code&gt;tokenize&lt;/code&gt; transform function to user &lt;code&gt;Bob&lt;/code&gt; and the role &lt;code&gt;Operator&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT EXECUTE ON TRANSFORM FUNCTION tokenize(VARCHAR) TO Bob, Operator;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Grant &lt;code&gt;EXECUTE&lt;/code&gt; privileges on the &lt;code&gt;ExampleSource()&lt;/code&gt; source to user &lt;code&gt;Alice&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; CREATE USER Alice;
=&amp;gt; GRANT USAGE ON SCHEMA hdfs TO Alice;
=&amp;gt; GRANT EXECUTE ON SOURCE ExampleSource() TO Alice;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Grant all privileges on the &lt;code&gt;ExampleSource()&lt;/code&gt; source to user &lt;code&gt;Alice&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT ALL ON SOURCE ExampleSource() TO Alice;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Grant all privileges on polymorphic function &lt;code&gt;Pagerank&lt;/code&gt; to the dbadmin role:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; GRANT ALL ON TRANSFORM FUNCTION Pagerank(z varchar) to dbadmin;
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-user-defined-extension/#&#34;&gt;REVOKE (user defined extension)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/#&#34;&gt;Granting and revoking privileges&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/extending/developing-udxs/#&#34;&gt;Developing user-defined extensions (UDxs)&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (view)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-view/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-view/</guid>
      <description>
        
        
        &lt;p&gt;Grants view privileges to &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;users&lt;/a&gt; and &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;roles&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT { &lt;span class=&#34;code-variable&#34;&gt;privilege&lt;/span&gt;[,...] | ALL [ PRIVILEGES ] [ EXTEND ] }
   ON [[&lt;span class=&#34;code-variable&#34;&gt;database&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;schema&lt;/span&gt;.]&lt;span class=&#34;code-variable&#34;&gt;view&lt;/span&gt;[,...]
   TO &lt;span class=&#34;code-variable&#34;&gt;grantee&lt;/span&gt;[,...]
   [ WITH GRANT OPTION ]
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;parameters&#34;&gt;Parameters&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;privilege&lt;/code&gt;&lt;/em&gt;``&lt;/dt&gt;
&lt;dd&gt;The following privileges are valid for views:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/select/&#34;&gt;SELECT&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/alter-statements/alter-view/&#34;&gt;ALTER&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../../en/sql-reference/statements/drop-statements/drop-view/&#34;&gt;DROP&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;ALL [PRIVILEGES][EXTEND]&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;Grants all &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/db-object-privileges/&#34;&gt;view privileges &lt;/a&gt;that also belong to the grantor. Grantors cannot grant privileges that they themselves lack.
&lt;p&gt;You can qualify &lt;code&gt;ALL&lt;/code&gt; with two optional keywords:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PRIVILEGES&lt;/code&gt; conforms with the SQL standard.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;EXTEND&lt;/code&gt; extends the semantics of &lt;code&gt;ALL&lt;/code&gt; to include ALTER and DROP privileges. An unqualified &lt;code&gt;ALL&lt;/code&gt; excludes these two privileges. This option enables backward compatibility with &lt;code&gt;GRANT ALL&lt;/code&gt; usage in pre-9.2.1 Vertica releases.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;[&lt;/code&gt;&lt;em&gt;&lt;code&gt;database&lt;/code&gt;&lt;/em&gt;&lt;code&gt;.]&lt;/code&gt;&lt;em&gt;&lt;code&gt;schema&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Database and &lt;a href=&#34;../../../../en/admin/configuring-db/designing-logical-schema/using-multiple-schemas/setting-search-paths/&#34;&gt;schema&lt;/a&gt;. The default schema is &lt;code&gt;public&lt;/code&gt;. If you specify a database, it must be the current database.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;view&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The target view.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;grantee&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Who is granted privileges, one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/#&#34;&gt;user-name&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;span class=&#34;code-variable&#34;&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/#&#34;&gt;role&lt;/a&gt;&lt;/span&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;
&lt;code&gt;&lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/public/#&#34;&gt;PUBLIC&lt;/a&gt;&lt;/code&gt;: Default role of all users&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;&lt;p&gt;Allows the grantee to grant and revoke the same privileges to other users or roles. For details, see &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-privileges/granting-and-revoking-privileges/granting-privileges/#&#34;&gt;Granting privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt;&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Non-superusers require &lt;a href=&#34;../../../../en/sql-reference/statements/grant-statements/grant-schema/&#34;&gt;USAGE on the schema&lt;/a&gt; and one of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Owner&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Privileges grantee given the option (&lt;code&gt;WITH GRANT OPTION&lt;/code&gt;) of granting privileges to other users or roles.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

&lt;p&gt;As view owner, you can grant other users SELECT privilege on the view only if one of the following is true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;You own the view&#39;s base table.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;You have SELECT...WITH GRANT OPTION privilege on the view&#39;s base table.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/div&gt;&lt;/p&gt;
&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;Grant user &lt;code&gt;Joe&lt;/code&gt; all privileges on view &lt;code&gt;ship&lt;/code&gt;.&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; CREATE VIEW ship AS SELECT * FROM public.shipping_dimension;
CREATE VIEW
=&amp;gt; GRANT ALL PRIVILEGES ON ship TO Joe;
GRANT PRIVILEGE
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;a href=&#34;../../../../en/sql-reference/statements/revoke-statements/revoke-view/#&#34;&gt;REVOKE (view)&lt;/a&gt;

      </description>
    </item>
    
    <item>
      <title>Sql-Reference: GRANT (workload)</title>
      <link>/en/sql-reference/statements/grant-statements/grant-workload/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/sql-reference/statements/grant-statements/grant-workload/</guid>
      <description>
        
        
        &lt;p&gt;Grants privileges to a &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;user&lt;/a&gt; or &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;role&lt;/a&gt; to use a &lt;a href=&#34;../../../../en/admin/managing-client-connections/connection-load-balancing/workload-routing/&#34;&gt;workload&lt;/a&gt;, routing its queries to its associated &lt;a href=&#34;../../../../en/sql-reference/statements/create-statements/create-routing-rule/&#34;&gt;subclusters&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;syntax&#34;&gt;Syntax&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;GRANT USAGE ON WORKLOAD &lt;span class=&#34;code-variable&#34;&gt;workload&lt;/span&gt; TO {&lt;span class=&#34;code-variable&#34;&gt;role&lt;/span&gt; | &lt;span class=&#34;code-variable&#34;&gt;user&lt;/span&gt;}
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;parameters&#34;&gt;Parameters&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;workload&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;A workload defined by a &lt;a href=&#34;../../../../en/sql-reference/statements/create-statements/create-routing-rule/&#34;&gt;routing rule&lt;/a&gt;. For details, see &lt;a href=&#34;../../../../en/admin/managing-client-connections/connection-load-balancing/workload-routing/#&#34;&gt;Workload routing&lt;/a&gt;.&lt;/dd&gt;
&lt;dt&gt;&lt;em&gt;&lt;code&gt;user&lt;/code&gt;&lt;/em&gt; | &lt;em&gt;&lt;code&gt;role&lt;/code&gt;&lt;/em&gt;&lt;/dt&gt;
&lt;dd&gt;The &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-users/&#34;&gt;user&lt;/a&gt; or &lt;a href=&#34;../../../../en/admin/db-users-and-privileges/db-roles/&#34;&gt;role&lt;/a&gt; permitted to use the workload.&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;privileges&#34;&gt;Privileges&lt;/h2&gt;
&lt;p&gt;Superuser&lt;/p&gt;
&lt;h2 id=&#34;examples&#34;&gt;Examples&lt;/h2&gt;
&lt;p&gt;The following example grants the USAGE privilege on the &lt;code&gt;analytics&lt;/code&gt; workload to users with the &lt;code&gt;analytics_role&lt;/code&gt; role:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-sql&#34; data-lang=&#34;sql&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;=&amp;gt;&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;k&#34;&gt;GRANT&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;k&#34;&gt;USAGE&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;k&#34;&gt;ON&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;n&#34;&gt;WORKLOAD&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;n&#34;&gt;analytics&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;k&#34;&gt;TO&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;n&#34;&gt;analytics_role&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt;&lt;span class=&#34;w&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Similarly, this example grants the USAGE privilege on the &lt;code&gt;analytics&lt;/code&gt; workload to the user &lt;code&gt;jacob&lt;/code&gt;:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-sql&#34; data-lang=&#34;sql&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;=&amp;gt;&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;k&#34;&gt;GRANT&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;k&#34;&gt;USAGE&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;k&#34;&gt;ON&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;n&#34;&gt;WORKLOAD&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;n&#34;&gt;analytics&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;k&#34;&gt;TO&lt;/span&gt;&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;&lt;span class=&#34;n&#34;&gt;jacob&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt;&lt;span class=&#34;w&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;For more examples, see &lt;a href=&#34;../../../../en/admin/managing-client-connections/connection-load-balancing/workload-routing/#&#34;&gt;Workload routing&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
  </channel>
</rss>
