-
Type: Improvement
-
Resolution: Done
-
Priority: Minor - P4
-
None
-
Affects Version/s: 2.2.2
-
Component/s: Security
User authorisation is at the database level, and access is determined by authentication only.
It would enable greater security to also configure user permissions based on the connection source address. This would be particularly useful in locking down monitoring or backup accounts to their point of ingress only.