Yandex Cloud
Search
Contact UsGet started
  • Blog
  • Pricing
  • Documentation
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • ML & AI
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Customer Stories
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Education and Science
    • Yandex Cloud Partner program
  • Blog
  • Pricing
  • Documentation
© 2025 Direct Cursus Technology L.L.C.
Yandex Managed Service for Greenplum®
  • Getting started
    • Resource relationships
    • Host classes
    • Calculating the cluster configuration
    • Networking in Managed Service for Greenplum®
    • Quotas and limits
    • Backups
    • Resource groups
    • Sharding
    • Users and roles
    • User authentication
    • Command center
    • External tables
    • Managing connections
    • Expanding a cluster
    • Maintenance
    • Greenplum® settings
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Public materials
  • Release notes

In this article:

  • Attributes
  • Group roles
  • Privileges
  • The mdb_admin role instead of a superuser
  1. Concepts
  2. Users and roles

Users and roles in Managed Service for Greenplum®

Written by
Yandex Cloud
Updated at May 5, 2025
  • Attributes
  • Group roles
  • Privileges
  • The mdb_admin role instead of a superuser

Greenplum® manages database access rights using roles. Roles can own database objects, such as tables, and have attributes and privileges. You can assign privileges to other roles on behalf of a particular role.

In Greenplum®, a user is a role that can log in to the database. To this end, it is granted the LOGIN attribute.

An admin user with the mdb_admin role has the maximum privileges among all users.

AttributesAttributes

The role has attributes that define which jobs it can run in the database.

Attributes Description
SUPERUSER or NOSUPERUSER Defines whether the role is a superuser. In Managed Service for Greenplum®, the SUPERUSER attribute is assigned to the gpadmin and monitor service roles and is not available to service users.
CREATEDB or NOCREATEDB Determines whether a database may be created. The default value is NOCREATEDB.
CREATEROLE or NOCREATEROLE Determines whether other roles may be created and managed. The default value is NOCREATEROLE.
INHERIT or NOINHERIT Determines whether the role inherits the privileges of the roles it is a part of. The default value is INHERIT.
LOGIN or NOLOGIN Determines whether the role may log in to the system, i.e., whether it is a user. The default value is NOLOGIN.
CONNECTION LIMIT <value> Number of concurrent connections for the role with the LOGIN attribute. The default value is -1 (unlimited).
CREATEEXTTABLE or NOCREATEEXTTABLE Determines whether external tables may be created. The default value is NOCREATEEXTTABLE.
PASSWORD '<password>' Setting a password for the role. If no authentication is required for the role, you can skip this attribute.
ENCRYPTED or UNENCRYPTED Save the password as a hash string or plain text. The default value is ENCRYPTED. For more information about protecting authorization passwords, see the Greenplum® documentation.

Group rolesGroup roles

Some roles can become a part of other roles and inherit their privileges. When privileges of the parent role are changed, privileges of all roles within it are changed as well. For more information about group roles, see the Greenplum® documentation.

PrivilegesPrivileges

Privileges determine what a role can do with database objects.

Do not use the mdb_admin role for routine tasks, because an incorrect command sent on its behalf may cause the cluster to fail. For these tasks, create separate roles with the minimum required privileges:

Object type

Privileges

Tables, external tables, views

SELECT
INSERT
UPDATE
DELETE
REFERENCES
TRIGGER
TRUNCATE
ALL

Columns

SELECT
INSERT
UPDATE
REFERENCES
ALL

Sequences

USAGE
SELECT
UPDATE
ALL

Databases

CREATE
CONNECT
TEMPORARY
TEMP
ALL

Domains

USAGE
ALL

External data shells

USAGE
ALL

External servers

USAGE
ALL

Functions

EXECUTE
ALL

Procedural languages

USAGE
ALL

Schemas

CREATE
USAGE
ALL

Tablespaces

CREATE
ALL

Types

USAGE
ALL

Protocols

SELECT
INSERT
ALL

For more information about privileges and their management, see the Greenplum® documentation.

The mdb_admin role instead of a superuserThe mdb_admin role instead of a superuser

In a Managed Service for Greenplum® cluster, superuser permissions are not granted. Instead, you can work with databases as an admin user with the mdb_admin role. Such user is created along with the cluster and allows you the following operations:

  • Managing roles and users.

  • Managing resource groups.

  • Managing client processes and user sessions (a user with the mdb_admin role can access mdb_toolkit objects).

  • Accessing the pg_stat_activity view and getting information from it.

  • Managing database objects of other users, such as tables. A user with the mdb_admin role owns objects of all users.

  • Using the connection slot reserved for mdb_admin.

    If too many connections to a database are established, one more connection may cause an error. A user with the mdb_admin role helps to avoid that as it has a reserved connection slot.

  • Creating a database.

  • Working with the PXF protocol:

    • Creating external data sources.
    • Creating external tables.
    • Accessing user credentials. This data is transmitted over PXF in an open format.
  • Expanding the cluster: Adding segment hosts to it and redistributing data between them using gp_expand.

  • Connecting to the gpperfmon database and diagnosing cluster performance.

The admin username and password are created together with the cluster.

If you want to grant the admin user privileges to another user, assign the mdb_admin role to that user:

GRANT mdb_admin TO <username>;

Greenplum® and Greenplum Database® are registered trademarks or trademarks of VMware, Inc. in the United States and/or other countries.

Was the article helpful?

Previous
Sharding
Next
User authentication
© 2025 Direct Cursus Technology L.L.C.