Manpages are the first line of truth for feature discovery. When dealing with granular database roles, they reveal exactly how privileges are split, inherited, and revoked. You can see the role hierarchy, the scope of each permission, and the commands to create, alter, or drop them. Every flag, every optional parameter, is documented with clarity. This is not marketing copy. This is the operational canon.
Granular database roles exist to reduce risk while increasing flexibility. Instead of handing out broad superuser rights, you define roles matching the minimum needed authority for each process or team. Manpages for PostgreSQL, MySQL, and other engines detail how to bind these roles to users, set default privileges, and chain permissions through role inheritance. This structure lets you isolate schema operations, lock down specific tables, and grant fine-grained read or write capabilities — all without touching unrelated data.
The database’s manpages often cover commands like CREATE ROLE, GRANT, REVOKE, and advanced attributes such as NOLOGIN, CREATEROLE, or BYPASSRLS. They document role parameters for controlling connection limits, password policies, and search paths. When combined with granular permissions, these details form a concise security model you can audit and maintain with surgical precision.